Info |
---|
This article instructs on explains how to create a DaemonSet in order to install and run 1 one sample of Cloudaware Breeze agent on every node of a cloud-managed Kubernetes cluster (Amazon EKS, Azure AKS, Google GKE). This allows to enable TunHub on the cluster and get the URL for further configuration of Kubernetes integration in Cloudaware. Linux only. |
Table of Contents |
---|
Prerequisites
Amazon EKS: ensure that Cloudaware has required permissions using this guide.
Azure AKS: ensure that Cloudaware has required permissions using this guide.
Description
DaemonSet starts the container with Breeze agent installer. The container has two bind mounts:
host:/opt > container:/opt
- used used for the Breeze agent installation from container to the host file systemhost:/ > container:/var/root
- used used for launching the agent in the chroot environment
The container runs two commands:
Install the Breeze agent to the
/opt
directory.Run the simple daemon which runs the Breeze agent every 15 minutes
...
.
Steps
1. Open Cloudaware Github GitHub repo with Kubernetes files. Clone the repo to your Github using the following command:
Code Block |
---|
git |
...
clone https://github.com/cloudaware/breeze-tools.git |
2. Log in to Cloudaware account . Select Admin under your username in the upper right corner. → Admin.
...
3. Locate Find Breeze in the list of DevOps Integrations. Click 1 Configured.
...
4. Download Select the Breeze installer file (for Linux)file for Linux*:
...
*This integration is for Linux only.
5. Untar the Breeze installer and copy the extracted files (./breeze-agent folder) into kubernetes/daemonset folder of the cloned reprepo:
Code Block |
---|
cd breeze-tools/kubernetes/daemonset && tar xvzfxzvf <DOWNLOADS_PATH>/breeze-agent.example.version.0.x86_64.linux.tgz |
...
WHERE
breeze-agent.example.version.0.x86_64.linux.tgz
should be replaced by the name of the dowloaded installer file (e.g. breeze-agent.1x11xx1xxxx11x11111x1x1x.11111111.0.x86_64.linux.tgz).
Code Block |
---|
cd ./kubernetes/daemonset && docker build -t ca-breeze-ds . |
7. Upload the result image to your private container registry. 6. Create a repository in your private container registry (e.g. AWS ECR, Azure ACR, Google GCR, etc.) named ca-breeze-ds. Upload the result image to your private container registry.
Code Block |
---|
docker tag ca-breeze-ds:latest <CONTAINER_REGISTRY_HOSTNAME>/ca-breeze-ds:latest |
Code Block |
---|
docker push <CONTAINER_REGISTRY_HOSTNAME>/ca-breeze-ds:latest |
WHERE
<CONTAINER_REGISTRY_HOSTNAME>
is a placeholder that needs to be replaced by your private container registry URI (e.g. 111111111111.dkr.ecr.us-east-1.amazonaws.com/breeze-agent).
87. Edit the DaemonSet configuration file ds-breeze-agent.yaml
replacing the placeholders with valid values. Ensure that image pull secret is added to Kubernetes Secrets.
98. Create the DaemonSet using the following command:
Code Block |
---|
kubectl create -f ds-breeze-agent.yaml |
109. To verify that the DaemonSet has been created, you may run the following command:
Code Block |
---|
kubectl get ds |
...