oracle-quickstart / oci-kubernetes-monitoring

Kubernetes Monitoring with OCI Observability & Management Platform
https://www.oracle.com/manageability/logging-analytics/
Universal Permissive License v1.0
43 stars 33 forks source link
dashboards docker fluentd k8s kubernetes log-analytics logging logging-analytics logs monitoring observability

OCI Kubernetes Monitoring Solution

OCI Kubernetes Monitoring Solution is a turn-key Kubernetes monitoring and management package based on OCI Logging Analytics cloud service, OCI Monitoring, OCI Management Agent and Fluentd.

It enables DevOps, Cloud Admins, Developers, and Sysadmins to

across their entire environment - using Logs, Metrics, and Object metadata.

It does extensive enrichment of logs, metrics and object information to enable cross correlation across entities from different tiers in OCI Logging Analytics. A collection of dashboards is provided to get users started quickly.

Solution UI

Kubernetes Solution - List Clusters View Kubernetes Solution - Cluster View

Dashboards

Kubernetes Cluster Summary Dashboard

Expand for more dashboard screenshots ![Kubernetes Nodes Dashboard](logan/images/kubernetes-nodes-dashboard.png) ![Kubernetes Workloads Dashboard](logan/images/kubernetes-workloads-dashboard.png) ![Kubernetes Pods Dashboard](logan/images/kubernetes-pods-dashboard.png)

Get Started :rocket:

:stop_sign: Upgrading to a major version (like 2.x to 3.x)? See upgrade section below for details. :warning:

Pre-requisites

Installation instructions

Multiple methods of installation are available, with following differences:

Deployment Method Supported Environments Solution UI Dashboards Customisations Comments
OCI Logging Analytics Connect Cluster OKE*** :heavy_check_mark: Manual Partial Control (Recommended) Customisations are possible through Helm once deployed using Logging Analytics Connect Cluster flow from Console, which is applicable for both Automatic and Manual Deployment modes. We recommend choosing Manual Deployment mode for OKE clusters with Private API Server endpoint, as support for the automatic deployment for the same would be available soon.
Helm All* :heavy_check_mark:** Manual Full Control (Recommended)
OCI Resource Manager OKE :heavy_check_mark:** :heavy_check_mark: Partial Control Customisations are possible through Helm once deployed using OCI Resource Manager.
Terraform OKE :heavy_check_mark:** :heavy_check_mark: Partial Control Customisations are possible through Helm once deployed using Terraform.
kubectl All* :heavy_check_mark:** Manual Full Control (Not recommended)

* For some environments, modification of the configuration may be required.

** Solution UI experience including Topology and other visualisations are available for customers deploying the solution using methods other than OCI Logging Analytics Connect Cluster, only if some additional steps are followed as mentioned in their individual sections.

*** Connect cluster support for EKS and clusters other than OKE (partially automated flow) would be available soon. Meanwhile, if you would like to experience the Solution for EKS, use helm or other deployment methods.

OCI Logging Analytics Connect Cluster

This newly launched UI based workflow from Logging Analytics Console is the recommended approach to start enabling Kubernetes Monitoring Solution for your OKE clusters. In this approach, you would go through a guided flow to enable the monitoring. It has support for both Automatic and Manual deployment modes to install helm charts onto your OKE clusters. The creation of various OCI resources like Logging Analytics LogGroup, Entity, Management Agent Install Key is automatically taken care in this approach irrespective of the deployment method that you choose. The required IAM Dynamic Group and Policies for the collection of logs, metrics, objects discovery data into OCI, can be optionally enabled when using this flow.

Customisations are possible through helm once deployed using Logging Analytics Connect Cluster flow from Console, which is applicable for both Automatic and Manual Deployment modes. We recommend choosing Manual Deployment mode for OKE clusters with Private API Server endpoint, as support for the automatic deployment for the same would be available soon.

Refer this doc for complete instructions on using this approach.

:hourglass_flowing_sand: Connect cluster support for EKS and clusters other than OKE (partially automated flow) would be available soon. Meanwhile, if you would like to experience the Solution for EKS, use helm or other deployment methods.

Helm

0 Pre-requisites
1 Create Logging Analytics Entity of type Kubernetes Cluster
2 Create Logging Analytics LogGroup

Create OCI Logging Analytics LogGroup(s) if not done already. Refer Create Log Group for details.

3 Download helm chart
4 Update values.yaml

Note that for the Logging Analytics Solution UI to work properly, you must keep all your OCI resources like Logging Analytics LogGroup, Logging Analytics Entity, Management Agent Install Key under the same compartment.

5.a Install helm release

Use the following helm install command to the install the chart. Provide a desired release name, path to override_values.yaml and path to helm chart (oci-onm chart).

helm install <release-name> --values <path-to-override-values.yaml> <path-to-helm-chart>

Refer this for further details on helm install.

5.b Upgrade helm release

Use the following helm upgrade command if any further changes to override_values.yaml needs to be applied or a new chart version needs to be deployed.

helm upgrade <release-name> --values <path-to-override-values.yaml> <path-to-helm-chart>

Refer this for further details on helm upgrade.

Note : If you have lost the override_values.yaml that was used while installing the helm (OR) you need to get the default one that was used while installing using other approaches like OCI Logging Analytics Connect Cluster, OCI Resource Manager etc., then run the following command to generate the same.

helm get values <release-name> > override_values.yaml

\ => Replace with release name. The default release name used while installing through OCI Logging Analytics Connect Cluster is oci-kubernetes-monitoring.

5.c (Optional) Import Dashboards

Dashboards needs to be imported manually. Below is an example for importing Dashboards using OCI CLI.

  1. Download and configure OCI CLI or open cloud-shell where OCI CLI is pre-installed. Alternative methods like REST API, SDK, Terraform etc can also be used.

  2. Find the OCID of the compartment, where the dashboards need to be imported.

  3. Download the dashboard JSONs from here.

  4. Replace all the instances of the keyword - "${compartment_ocid}" in the JSONs with the Compartment OCID identified in previous step.

    • Following command is for quick reference that can be used in a linux/cloud-shell environment :

      sed -i "s/\${compartment_ocid}/<Replace-with-Compartment-OCID>/g" *.json
  5. Run the following commands to import the dashboards.

    oci management-dashboard dashboard import --from-json file://cluster.json
    oci management-dashboard dashboard import --from-json file://node.json
    oci management-dashboard dashboard import --from-json file://workload.json
    oci management-dashboard dashboard import --from-json file://pod.json
    oci management-dashboard dashboard import --from-json file://service-type-lb.json
Uninstall

Use the following helm uninstall command to uninstall the chart. Provide the release name used when creating the chart.

helm uninstall <release-name>

Refer this for further details on helm uninstall.

OCI Resource Manager

Launch OCI Resource Manager Stack in OCI Tenancy and Region of the OKE Cluster, which you want to monitor.

Launch OCI Resource Manager Stack

Instructions * Select the region and compartment where you want to deploy the stack. * Follow the on-screen prompts and instructions to create the stack. * After creating the stack, click Terraform Actions, and select Plan. * Wait for the job to be completed, and review the plan. * To make any changes, return to the Stack Details page, click Edit Stack, and make the required changes. Then, run the Plan action again. * If no further changes are necessary, return to the Stack Details page, click Terraform Actions, and select Apply.

Kubectl

While the recommended approach for installation is through helm, if you intend to use `kubectl` based installation, then the resource yaml files can still be generated through `helm` using the instructions provided below. ##### 0 Pre-requisites * Workstation or OCI Cloud Shell with access configured to the target k8s cluster. * Helm ([Installation instructions](https://helm.sh/docs/intro/install/)). * Kubectl ([Installation instructions](https://kubernetes.io/docs/tasks/tools/#kubectl)). * [OCI CLI](https://docs.oracle.com/en-us/iaas/Content/API/Concepts/cliconcepts.htm) ##### 1 Create Logging Analytics Entity of type Kubernetes Cluster Refer [here](1-create-logging-analytics-entity-of-type-kubernetes-cluster) ##### 2 Create Logging Analytics LogGroup Refer [here](2-create-logging-analytics-loggroup) ##### 3 Download helm chart Refer [here](#3-download-helm-chart). ##### 4 Update values.yaml Refer [here](#4-update-valuesyaml). ##### 5.a Generate yamls Use the following `helm template` command to generate the resource yaml files. Provide path to override_values.yaml, path to helm chart (oci-onm chart) and path to a dir where the yaml files to be generated. ``` helm template --values --output-dir ``` Refer [this](https://helm.sh/docs/helm/helm_template/) for further details on `helm template`. ##### 5.b Install Use `kubectl` tool to apply the yaml files generated in the previous step in the following order. * oci-onm-common ``` kubectl apply -f namespace.yaml kubectl apply -f clusterrole.yaml kubectl apply -f clusterrolebinding.yaml kubectl apply -f serviceAccount.yaml ``` * oci-onm-logan ``` kubectl apply -f logs-configmap.yaml kubectl apply -f objects-configmap.yaml kubectl apply -f fluentd-daemonset.yaml kubectl apply -f fluentd-deployment.yaml ``` _For non OKE or when you choose to use Config file based AuthZ for monitoring the logs, you may need to apply oci-config-secret.yaml before applying fluentd-daemonset.yaml & fluentd-deployment.yaml. Refer [here](docs/FAQ.md#how-to-use-configfile-based-authz-user-principal-instead-of-default-authz-instance-principal-) for how to configure Config based AuthZ._ * oci-onm-mgmt-agent ``` kubectl apply -f mgmt-agent-secrets.yaml kubectl apply -f metrics-configmap.yaml kubectl apply -f mgmt-agent-statefulset.yaml kubectl apply -f mgmt-agent-headless-service.yaml kubectl apply -f metric_server.yaml ``` ##### 5.c (Optional) Import Dashboards Refer [here](#3c-import-dashboards).

Upgrading to a major version

2.x to 3.x

One of the major changes introduced in 3.0.0 is refactoring of helm chart where major features of the solution got split into separate sub-charts. 2.x has only support for logs and objects collection using Fluentd and OCI Logging Analytics and this is now moved into a separate chart oci-onm-logan and included as a sub-chart to the main chart oci-onm. This is a breaking change w.r.t the values.yaml and any customisations that you might have done on top of it. There is no breaking change w.r.t functionality offered in 2.x. For full list of changes in 3.x, refer to changelog.

You may fall into one of the below categories and may need to take actions accordingly.

Have no customisations to the existing chart or values.yaml

We recommend you to uninstall the release created using 2.x chart and follow the installation instructions mentioned here for installing the release using 3.x chart.

Sample 2.x values.yaml (external or override yaml to update the mandatory variables)
image:
   url: <Container Image URL>
   imagePullPolicy: Always
ociLANamespace: <OCI LA Namespace>
ociLALogGroupID: ocid1.loganalyticsloggroup.oc1.phx.amaaaaaa......
kubernetesClusterID: ocid1.cluster.oc1.phx.aaaaaaaaa.......
kubernetesClusterName: <Cluster Name>
Sample 3.x values.yaml
global:
  # -- OCID for OKE cluster or a unique ID for other Kubernetes clusters.
  kubernetesClusterID: ocid1.cluster.oc1.phx.aaaaaaaaa.......
  # -- Provide a unique name for the cluster. This would help in uniquely identifying the logs and metrics data at OCI Logging Analytics and OCI Monitoring respectively.
  kubernetesClusterName: <Cluster Name>

oci-onm-logan:
  # Go to OCI Logging Analytics Administration, click Service Details, and note the namespace value.
  ociLANamespace: <OCI LA Namespace>
  # OCI Logging Analytics Log Group OCID
  ociLALogGroupID: ocid1.loganalyticsloggroup.oc1.phx.amaaaaaa......
Have customisations to the existing chart or values.yaml

If you have modified values.yaml provided in helm chart directly, we recommend you to identify all the changes and move them to override_values.yaml and follow the instructions provided in install or upgrade sections under this. We recommend you to use override_values.yaml for updating values for any variables or to incorporate any customisations on top of existing values.yaml.

If you are already using a separate values.yaml for your customisations, you still need to compare 2.x vs 3.x variable hierarchy and make the necessary changes accordingly.

Examples ##### Example 1: Using docker runtime instead of default runtime (cri) **2.x** runtime: docker image: url: imagePullPolicy: Always ociLANamespace: ociLALogGroupID: ocid1.loganalyticsloggroup.oc1.phx.amaaaaaa...... kubernetesClusterID: ocid1.cluster.oc1.phx.aaaaaaaaa....... kubernetesClusterName: **3.x** global: # -- OCID for OKE cluster or a unique ID for other Kubernetes clusters. kubernetesClusterID: ocid1.cluster.oc1.phx.aaaaaaaaa....... # -- Provide a unique name for the cluster. This would help in uniquely identifying the logs and metrics data at OCI Logging Analytics and OCI Monitoring respectively. kubernetesClusterName: oci-onm-logan: runtime: docker # Go to OCI Logging Analytics Administration, click Service Details, and note the namespace value. ociLANamespace: # OCI Logging Analytics Log Group OCID ociLALogGroupID: ocid1.loganalyticsloggroup.oc1.phx.amaaaaaa...... ##### Example 2: Customisation of a specific log **2.x** ... ... custom-log1: path: /var/log/containers/custom-1.log ociLALogSourceName: "Custom1 Logs" #multilineStartRegExp: isContainerLog: true ... ... **3.x** ... ... oci-onm-logan: ... ... custom-log1: path: /var/log/containers/custom-1.log ociLALogSourceName: "Custom1 Logs" #multilineStartRegExp: isContainerLog: true ... ... ... ... *The difference is all about moving the required configuration (variable definitions) under oci-onm-logan section appropriately.*

Getting Help

Ask a question

Resources

:question: Frequently Asked Questions

Custom Logs Configuration

Building Custom Container Images

License

Copyright (c) 2023, Oracle and/or its affiliates. Licensed under the Universal Permissive License v1.0 as shown at https://oss.oracle.com/licenses/upl.

Contributors