oc
)stackstate
:helm
and kubectl
commands as the namespace name in the --namespace
flagvalues.yaml
values.yaml
file is required to deploy StackState with Helm. It contains your StackState license key, StackState Receiver API key and other important information.helm repo update
.generate_values.sh
script in the installation directory of the Helm chart will guide you through generating a values.yaml
file that can be used to deploy StackState. You can run the generate_values.sh
script in two ways:-n
to pass configuration on the command line, this is useful for scripting.-b
<STACKSTATE_BASE_URL>
. The external URL for StackState that users and agents will use to connect. For example https://stackstate.internal
. If you haven't decided on an Ingress configuration yet, use http://localhost:8080
. This can be updated later in the generated file.-u
-p
-l
-a
-d
admin
) to access StackState's UI. This can be omitted from the command line, the script will prompt for it.-k
values.yaml
file somewhere safe. You can reuse this file for upgrades, which will save time and (more importantly) will ensure that StackState continues to use the same API key. This is desirable as it means agents and other data providers for StackState will not need to be updated.openshift-values.yaml
openshift-values.yaml
with the following content and store it next to the generated values.yaml
file. This contains the values that are needed for an OpenShift deployment.helm install
command. The agent chart needs to add specific OpenShift SecurityContextConfiguration
objects to the OpenShift installation.cluster-agent.agent.scc.enabled
SecurityContextConfiguration
objects in OpenShift. Then ensure that you set the above configuration flag to false
.<CLUSTER_NAME>
: A name that StackState will use to identify the cluster<RANDOM_TOKEN>
: A 32 character random token. This can be generated by executing head -c32 < /dev/urandom | md5sum | cut -c-32
agent-values.yaml
and add it to the helm install
command to enable this feature.stackstate
namespace with the following command:stackstate
namespace with the following command:https://localhost:8080
. Log in with the username admin
and the default password provided in the values.yaml
file.SecurityContextConfiguration
objectsSecurityContextConfiguration
objects.SecurityContextConfiguration
needs to be applied:agent-scc.yaml
and apply it as an administrator of the OpenShift cluster using the following command:SecurityContextConfiguration
object: