Kubernetes install
SUSE Observability Self-hosted
Before you start
Extra notes for installing on:
Kubernetes clusters with limited permissions: Read the required permissions.
OpenShift: Refer to the OpenShift installation instructions.
Before you start the installation of SUSE Observability:
Check the requirements to make sure that your Kubernetes environment fits the setup that you will use (recommended, minimal or non- high availability).
Check that you have the required permissions.
Add the SUSE Observability helm repository to the local helm client:
Install SUSE Observability
For environments without internet access, also known as air-gapped environments, first follow these extra instructions.
Also make sure to follow the air-gapped installation instructions whenever those are present for a step.
Create namespace
Start by creating the namespace where you want to install SUSE Observability and deploy the secret in that namespace. In our walkthrough we will use the namespace suse-observability
:
Generate baseConfig_values.yaml
and sizing_values.yaml
baseConfig_values.yaml
and sizing_values.yaml
The baseConfig_values.yaml
file is required to deploy StackState with Helm. It contains your StackState license key, StackState Receiver API key and other important information. The sizing_values.yaml
file is recommended to deploy StackState with Helm as it contains information about the resources that StackState will be provisioned with according to the size on the landscape you want to observe.
Before you continue: Make sure you have the latest version of the Helm charts with helm repo update
.
The SUSE Observability baseConfig_values.yaml
and sizing_values.yaml
files can be generated by running a separate Helm Chart, the suse-observability/suse-observability-values
chart. A sample command line is:
This command will generate a $VALUES_DIR/suse-observability-values/templates/baseConfig_values.yaml
and a $VALUES_DIR/suse-observability-values/templates/sizing_values.yaml
file which contains the necessary configuration for installing the SUSE Observability Helm Chart.
The SUSE Observability administrator passwords will be autogenerated by the above command and are output as comments in the generated basicConfig.yaml
file. The actual values contain the bcrypt
hashes of those passwords so that they're securely stored in the Helm release in the cluster.
The values that can be passed to this chart are:
Configuration | Value | Description |
---|---|---|
Basic Config generate |
| Switch on or off the generation of the |
Receiver API Key |
| The API key used by SUSE Observability to receive data from agents. This is a secret key that should be kept private. If you omit this, a random key will be generated for you. |
Base URL |
| The |
Username and password** |
| The username and password used by SUSE Observability to pull images. For air-gapped environments these need to be the username and password for the local contaier registry. |
License key |
| The SUSE Observability license key. |
Admin API password |
| The password for the admin API. Note that this API contains system maintenance functionality and should only be accessible by the maintainers of the SUSE Observability installation. If you omit this, a random password will be generated for you. If you do pass this value and it's not bcrypt hashed, the chart will hash it for you. |
Default password |
| The password for the default user ( |
Image Registry |
| The registry where the SUSE Observability images are hosted. If not provided, the default value will be 'quay.io' |
Pull Secret Username |
| The username used to pull images from the Docker registry where the SUSE Observability images are hosted. Only needed for custom registries. |
Pull Secret Password |
| The password used to pull images from the Docker registry where the SUSE Observability images are hosted. Only needed for custom registries. |
Sizing generate |
| Switch on or off the generation of the |
Sizing profile |
| OneOf trial, 10-nonha, 20-nonha, 50-nonha, 100-nonha, 150-ha, 250-ha, 500-ha. Based on this profiles the |
Store the generated basicConfig.yaml
and sizing_values.yaml
files somewhere safe. You can reuse this files for upgrades, which will save time and (more importantly) will ensure that SUSE Observability continues to use the same API key. This is desirable as it means Agents and other data providers for SUSE Observability won't need to be updated. The files can be regenerated independently using the switches basicConfig.generate=false
and sizing.generate=false
to disable any of them while still keeping the previosuly generated version of the file in the output-dir
.
Deploy SUSE Observability with Helm
The recommended deployment of SUSE Observability is a production ready, high availability setup with many services running redundantly. If required, it's also possible to run SUSE Observability in a non-redundant setup, where each service has only a single replica. This setup is only recommended for a test environment.
For air-gapped environments follow the instructions for the air-gapped installations.
To deploy SUSE Observability on Kubernetes:
Deploy the latest SUSE Observability version to the
suse-observability
namespace with the following command:
After the install, the SUSE Observability release should be listed in the SUSE Observability namespace and all pods should be running:
Access the SUSE Observability UI
After SUSE Observability has been deployed you can check if all pods are up and running:
When all pods are up, you can enable a port-forward:
SUSE Observability will now be available in your browser at https://localhost:8080
. Log in with the username admin
and the default password provided in the values.yaml
file.
Next steps are
Give your co-workers access.
Last updated