You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/monitor-kubernetes.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ The following table lists the services that are commonly used by the network eng
61
61
Following are common scenarios for monitoring the network.
62
62
63
63
- Create [flow logs](../../network-watcher/network-watcher-nsg-flow-logging-overview.md) to log information about the IP traffic flowing through network security groups used by your cluster and then use [traffic analytics](../../network-watcher/traffic-analytics.md) to analyze and provide insights on this data. You'll most likely use the same Log Analytics workspace for traffic analytics that you use for Container insights and your control plane logs.
64
-
- Using traffic analytics, you can determine if any traffic is flowing either to or from any unexpected ports used by the cluster and also if any traffic is flowing over public IPs that shouldn't be exposed. Use this information to determine whether your network rules need modification.
64
+
- Using [traffic analytics](../../network-watcher/traffic-analytics.md), you can determine if any traffic is flowing either to or from any unexpected ports used by the cluster and also if any traffic is flowing over public IPs that shouldn't be exposed. Use this information to determine whether your network rules need modification.
65
65
66
66
67
67
## Platform engineer
@@ -229,7 +229,6 @@ Following are common scenarios for monitoring your managed Kubernetes components
229
229
**Troubleshooting**<br>
230
230
- For troubleshooting scenarios, you can access kubelet logs using the process described at [Get kubelet logs from Azure Kubernetes Service (AKS) cluster nodes](../../aks/kubelet-logs.md).
231
231
232
-
233
232
### Monitor level 4 - Kubernetes objects and workloads
234
233
235
234
The Kubernetes objects and workloads level includes the following components:
@@ -243,6 +242,7 @@ The Kubernetes objects and workloads level includes the following components:
243
242
Following are common scenarios for monitoring your Kubernetes objects and workloads.
244
243
245
244
245
+
246
246
**Container insights**<br>
247
247
- Use the **Nodes** and **Controllers** views to see the health and performance of the pods running on them and drill down to the health and performance of their containers.
248
248
- Use the **Containers** view to see the health and performance for the containers. For more information on analyzing container health and performance, see [Monitor your Kubernetes cluster performance with Container Insights](container-insights-analyze.md#analyze-nodes-controllers-and-container-health).
@@ -251,11 +251,9 @@ Following are common scenarios for monitoring your Kubernetes objects and worklo
251
251
**Grafana dashboards**<br>
252
252
- Multiple [Kubernetes dashboards](https://grafana.com/grafana/dashboards/?search=kubernetes) are available that visualize the performance and health of your nodes based on data stored in Prometheus.
253
253
254
-
255
254
**Live data**
256
255
- In troubleshooting scenarios, Container Insights provides access to live AKS container logs (stdout/stderror), events and pod metrics. For more information about this feature, see [How to view Kubernetes logs, events, and pod metrics in real-time](container-insights-livedata-overview.md).
257
256
258
-
259
257
### Alerts for the platform engineer
260
258
261
259
[Alerts in Azure Monitor](..//alerts/alerts-overview.md) proactively notify you of interesting data and patterns in your monitoring data. They allow you to identify and address issues in your system before your customers notice them. If you have an existing [ITSM solution](../alerts/itsmc-overview.md) for alerting, you can [integrate it with Azure Monitor](../alerts/itsmc-overview.md). You can also [export workspace data](../logs/logs-data-export.md) to send data from your Log Analytics workspace to another location that supports your current alerting solution.
@@ -283,18 +281,21 @@ In addition to developing the application, the *developer* maintains the applica
283
281
The following table lists the services that are commonly used by the developer to monitor the health and performance of the Kubernetes cluster and its components.
284
282
285
283
284
+
286
285
| Service | Description |
287
286
|:---|:---|
288
287
| [Application insights](../app/app-insights-overview.md) | Feature of Azure Monitor that provides application performance monitoring (APM) to monitor applications running on your Kubernetes cluster from development, through test, and into production. Quickly identify and mitigate latency and reliability issues using distributed traces. Supports [OpenTelemetry](../app/opentelemetry-overview.md#opentelemetry) for vendor-neutral instrumentation. |
289
288
290
289
290
+
291
291
See [Data Collection Basics of Azure Monitor Application Insights](../app/opentelemetry-overview.md) for options on configuring data collection from the application running on your cluster and decision criteria on the best method for your particular requirements.
292
292
293
293
### Monitor level 5 - Application
294
294
295
295
Following are common scenarios for monitoring your application.
296
296
297
297
298
+
298
299
**Application performance**<br>
299
300
- Use the **Performance** view in Application insights to view the performance of different operations in your application.
300
301
- Use [Profiler](../profiler/profiler-overview.md) to capture and view performance traces for your application.
@@ -317,8 +318,8 @@ Following are common scenarios for monitoring your application.
317
318
318
319
- For AKS clusters, deploy the [Istio-based service mesh add-on](../../aks/istio-about.md) which provides observability to your microservices architecture. [Istio](https://istio.io/) is an open-source service mesh that layers transparently onto existing distributed applications. The add-on assists in the deployment and management of Istio for AKS.
319
320
320
-
321
321
## See also
322
322
323
323
- See [Monitoring AKS](../../aks/monitor-aks.md) for guidance on monitoring specific to Azure Kubernetes Service (AKS).
0 commit comments