Skip to content

Commit 4dd3a81

Browse files
committed
Freshness updates
1 parent 33b960e commit 4dd3a81

File tree

8 files changed

+122
-9
lines changed

8 files changed

+122
-9
lines changed

articles/azure-monitor/containers/container-insights-analyze.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Kubernetes monitoring with Container insights | Microsoft Docs
33
description: This article describes how you can view and analyze the performance of a Kubernetes cluster with Container insights.
44
ms.topic: conceptual
55
ms.date: 08/29/2022
6-
ms.reviewer: aul
6+
ms.reviewer: viviandiec
77
---
88

99
# Monitor your Kubernetes cluster performance with Container insights

articles/azure-monitor/containers/container-insights-cost.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Monitoring cost for Container insights | Microsoft Docs
33
description: This article describes the monitoring cost for metrics & inventory data collected by Container insights to help customers manage their usage and associated costs.
44
ms.topic: conceptual
55
ms.date: 08/29/2022
6-
ms.reviewer: aul
6+
ms.reviewer: viviandiec
77

88
---
99
# Understand monitoring costs for Container insights
@@ -190,9 +190,9 @@ If you are utilizing [Prometheus metric scraping](container-insights-prometheus-
190190
191191
### Configure Basic Logs
192192
193-
Because Basic Logs is primarily used for debugging, troubleshooting, and auditing, it offers a low-cost alternative to standard analytics logs due to reduced cost for ingestion. For more information, see [Configure Basic Logs (preview)](../best-practices-cost.md#configure-basic-logs-preview). ContainerLogV2 is the configured version of Basic Logs that Container Insights uses and which include verbose text-based log records.
193+
You can save on data ingestion costs by configuring certain tables in your Log Analytics workspace that you primarily use for debugging, troubleshooting, and auditing as Basic Logs. For more information, see [Configure Basic Logs (preview)](../best-practices-cost.md#configure-basic-logs-preview). ContainerLogV2 is the configured version of Basic Logs that Container Insights uses. ContainerLogV2 includes verbose text-based log records.
194194
195-
You must be on the ContainerLogV2 schema to configure Basic Logs. For more information, see [Enable the ContainerLogV2 schema (preview)](container-insights-logging-v2.md). To configure Basic Logs for ContainerLogv2, see [Configure Basic Logs in Azure Monitor (Preview)](../logs/basic-logs-configure.md).
195+
You must be on the ContainerLogV2 schema to configure Basic Logs. For more information, see [Enable the ContainerLogV2 schema (preview)](container-insights-logging-v2.md).
196196
197197
#### Limitations
198198

articles/azure-monitor/containers/container-insights-onboard.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Enable Container insights
44
description: This article describes how to enable and configure Container insights so that you can understand how your container is performing and what performance-related issues have been identified.
55
ms.topic: conceptual
66
ms.date: 08/29/2022
7-
ms.reviewer: aul
7+
ms.reviewer: viviandiec
88
---
99

1010
# Enable Container insights
@@ -16,7 +16,8 @@ Container insights supports the following environments:
1616
- [Azure Kubernetes Service (AKS)](../../aks/index.yml)
1717
- [Azure Arc-enabled Kubernetes cluster](../../azure-arc/kubernetes/overview.md)
1818
- [Azure Stack](/azure-stack/user/azure-stack-kubernetes-aks-engine-overview) or on-premises
19-
- [AKS engine](https://github.com/Azure/aks-engine)
19+
- [AKS engine](https://github.com/Azure/aks-engine)
20+
- [Red Hat OpenShift](https://docs.openshift.com/container-platform/4.3/welcome/index.html) version 4.x
2021

2122
## Supported Kubernetes versions
2223
The versions of Kubernetes and support policy are the same as those [supported in Azure Kubernetes Service (AKS)](../../aks/supported-kubernetes-versions.md).

articles/azure-monitor/containers/container-insights-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes Container insights, which monitors the AKS C
44
ms.topic: conceptual
55
ms.custom: references_regions
66
ms.date: 08/29/2022
7-
ms.reviewer: aul
7+
ms.reviewer: viviandiec
88
---
99

1010
# Container insights overview

articles/azure-monitor/containers/containers.md

Lines changed: 114 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: conceptual
55
author: bwren
66
ms.author: bwren
77
ms.date: 08/29/2022
8-
ms.reviewer: aul
8+
ms.reviewer: viviandiec
99

1010
---
1111

@@ -26,8 +26,9 @@ The solution shows which containers are running, what container image they’re
2626
- DC/OS
2727
- Service Fabric
2828

29-
We recommend using Azure Monitor Container insights for monitoring your Kubernetes:
29+
We recommend using Azure Monitor Container insights for monitoring your Kubernetes and Red Hat OpenShift:
3030
- AKS ([Configure Container insights for AKS](container-insights-enable-existing-clusters.md))
31+
- Red Hat OpenShift ([Configure Container insights using Azure Arc](container-insights-enable-arc-enabled-clusters.md))
3132

3233
If you have containers deployed in [Azure Service Fabric](../../service-fabric/service-fabric-overview.md), we recommend enabling both the [Service Fabric solution](../../service-fabric/service-fabric-diagnostics-oms-setup.md) and this solution to include monitoring of cluster events. Before enabling the Service Fabric solution, review [Using the Service Fabric solution](../../service-fabric/service-fabric-diagnostics-event-analysis-oms.md) to understand what it provides and how to use it.
3334

@@ -70,6 +71,7 @@ The following table outlines the Docker orchestration and operating system monit
7071
- CentOS 7.2 and 7.3
7172
- SLES 12
7273
- RHEL 7.2 and 7.3
74+
- Red Hat OpenShift Container Platform (OCP) 3.4 and 3.5
7375
- ACS Mesosphere DC/OS 1.7.3 to 1.8.8
7476
- ACS Kubernetes 1.4.5 to 1.6
7577
- Kubernetes events, Kubernetes inventory, and container processes are only supported with version 1.4.1-45 and later of the Log Analytics agent for Linux
@@ -99,6 +101,7 @@ Use the following information to install and configure the solution.
99101
- On CoreOS, you cannot run the Log Analytics agent for Linux. Instead, you run a containerized version of the Log Analytics agent for Linux. Review Linux container hosts including CoreOS or Azure Government Linux container hosts including CoreOS if you are working with containers in Azure Government Cloud.
100102
- On Windows Server 2016 and Windows 10, install the Docker Engine and client then connect an agent to gather information and send it to Azure Monitor. Review [Install and configure Windows container hosts](#install-and-configure-windows-container-hosts) if you have a Windows environment.
101103
- For Docker multi-host orchestration:
104+
- If you have a Red Hat OpenShift environment, review Configure a Log Analytics agent for Red Hat OpenShift.
102105
- If you have a Kubernetes cluster using the Azure Container Service:
103106
- Review [Configure a Log Analytics Linux agent for Kubernetes](#configure-a-log-analytics-linux-agent-for-kubernetes).
104107
- Review [Configure an Log Analytics Windows agent for Kubernetes](#configure-a-log-analytics-windows-agent-for-kubernetes).
@@ -179,6 +182,115 @@ For Docker Swarm, once the secret for Workspace ID and Primary Key is created, u
179182
sudo docker service create --name omsagent --mode global --mount type=bind,source=/var/run/docker.sock,destination=/var/run/docker.sock --mount type=bind,source=/var/lib/docker/containers,destination=/var/lib/docker/containers --secret source=WSID,target=WSID --secret source=KEY,target=KEY -p 25225:25225 -p 25224:25224/udp --restart-condition=on-failure mcr.microsoft.com/azuremonitor/containerinsights/ciprod:microsoft-oms-latest
180183
```
181184
185+
#### Configure a Log Analytics agent for Red Hat OpenShift
186+
187+
There are three ways to add the Log Analytics agent to Red Hat OpenShift to start collecting container monitoring data.
188+
189+
* [Install the Log Analytics agent for Linux](../vm/monitor-virtual-machine.md) directly on each OpenShift node
190+
* [Enable Log Analytics VM Extension](../vm/monitor-virtual-machine.md) on each OpenShift node residing in Azure
191+
* Install the Log Analytics agent as an OpenShift daemon-set
192+
193+
In this section we cover the steps required to install the Log Analytics agent as an OpenShift daemon-set.
194+
195+
1. Sign on to the OpenShift master node and copy the yaml file [ocp-omsagent.yaml](https://github.com/Microsoft/OMS-docker/blob/master/OpenShift/ocp-omsagent.yaml) from GitHub to your master node and modify the value with your Log Analytics Workspace ID and with your Primary Key.
196+
2. Run the following commands to create a project for Azure Monitor and set the user account.
197+
198+
```
199+
oc adm new-project omslogging --node-selector='zone=default'
200+
oc project omslogging
201+
oc create serviceaccount omsagent
202+
oc adm policy add-cluster-role-to-user cluster-reader system:serviceaccount:omslogging:omsagent
203+
oc adm policy add-scc-to-user privileged system:serviceaccount:omslogging:omsagent
204+
```
205+
206+
3. To deploy the daemon-set, run the following:
207+
208+
`oc create -f ocp-omsagent.yaml`
209+
210+
4. To verify it is configured and working correctly, type the following:
211+
212+
`oc describe daemonset omsagent`
213+
214+
and the output should resemble:
215+
216+
```
217+
[ocpadmin@khm-0 ~]$ oc describe ds oms
218+
Name: oms
219+
Image(s): mcr.microsoft.com/azuremonitor/containerinsights/ciprod:microsoft-oms-latest
220+
Selector: name=omsagent
221+
Node-Selector: zone=default
222+
Labels: agentVersion=1.4.0-12
223+
dockerProviderVersion=10.0.0-25
224+
name=omsagent
225+
Desired Number of Nodes Scheduled: 3
226+
Current Number of Nodes Scheduled: 3
227+
Number of Nodes Misscheduled: 0
228+
Pods Status: 3 Running / 0 Waiting / 0 Succeeded / 0 Failed
229+
No events.
230+
```
231+
232+
If you want to use secrets to secure your Log Analytics Workspace ID and Primary Key when using the Log Analytics agent daemon-set yaml file, perform the following steps.
233+
234+
1. Sign on to the OpenShift master node and copy the yaml file [ocp-ds-omsagent.yaml](https://github.com/Microsoft/OMS-docker/blob/master/OpenShift/ocp-ds-omsagent.yaml) and secret generating script [ocp-secretgen.sh](https://github.com/Microsoft/OMS-docker/blob/master/OpenShift/ocp-secretgen.sh) from GitHub. This script will generate the secrets yaml file for Log Analytics Workspace ID and Primary Key to secure your secrete information.
235+
2. Run the following commands to create a project for Azure Monitor and set the user account. The secret generating script asks for your Log Analytics Workspace ID `<WSID>` and Primary Key `<KEY>` and upon completion, it creates the ocp-secret.yaml file.
236+
237+
```
238+
oc adm new-project omslogging --node-selector='zone=default'
239+
oc project omslogging
240+
oc create serviceaccount omsagent
241+
oc adm policy add-cluster-role-to-user cluster-reader system:serviceaccount:omslogging:omsagent
242+
oc adm policy add-scc-to-user privileged system:serviceaccount:omslogging:omsagent
243+
```
244+
245+
3. Deploy the secret file by running the following:
246+
247+
`oc create -f ocp-secret.yaml`
248+
249+
4. Verify deployment by running the following:
250+
251+
`oc describe secret omsagent-secret`
252+
253+
and the output should resemble:
254+
255+
```
256+
[ocpadmin@khocp-master-0 ~]$ oc describe secret omsagent-secret
257+
Name: omsagent-secret
258+
Namespace: omslogging
259+
Labels: <none>
260+
Annotations: <none>
261+
Type: Opaque
262+
Data
263+
====
264+
KEY: 89 bytes
265+
WSID: 37 bytes
266+
```
267+
268+
5. Deploy the Log Analytics agent daemon-set yaml file by running the following:
269+
270+
`oc create -f ocp-ds-omsagent.yaml`
271+
272+
6. Verify deployment by running the following:
273+
274+
`oc describe ds oms`
275+
276+
and the output should resemble:
277+
278+
```
279+
[ocpadmin@khocp-master-0 ~]$ oc describe ds oms
280+
Name: oms
281+
Image(s): mcr.microsoft.com/azuremonitor/containerinsights/ciprod:microsoft-oms-latest
282+
Selector: name=omsagent
283+
Node-Selector: zone=default
284+
Labels: agentVersion=1.4.0-12
285+
dockerProviderVersion=10.0.0-25
286+
name=omsagent
287+
Desired Number of Nodes Scheduled: 3
288+
Current Number of Nodes Scheduled: 3
289+
Number of Nodes Misscheduled: 0
290+
Pods Status: 3 Running / 0 Waiting / 0 Succeeded / 0 Failed
291+
No events.
292+
```
293+
182294
#### Configure a Log Analytics Linux agent for Kubernetes
183295
184296
For Kubernetes, you use a script to generate the secrets yaml file for your Workspace ID and Primary Key to install the Log Analytics agent for Linux. At the [Log Analytics Docker Kubernetes GitHub](https://github.com/Microsoft/OMS-docker/tree/master/Kubernetes) page, there are files that you can use with or without your secret information.
-18.7 KB
Loading
220 KB
Loading
47.5 KB
Loading

0 commit comments

Comments
 (0)