...
Panel | ||
---|---|---|
| ||
VMware vSphereA user is required for the operation of the BVQ VMware Scanner, who should at least have read-only access to the VMware vCenter system. The read-only permission for the user must be defined at the vCenter level. Permissions in a lower level (e.g. Datacenter, Cluster, ...) will lead to scan errors. Please create this user before configuring the BVQ Scanner. We recommend to name the user: bvq Create or select the right user role
Create the BVQ User for the vCenter
Add the right vCenter Statistics
Gather information for BVQ Scanner configuration BVQ scanners need the following information to be configured for each vCenter system:
Preparation for the BVQ Server For BVQ Servers which are gathering information from NetApps and vCenters, the correct DNS configuration is important. This is required to match the DNS-Name of the NFS Datastores to the corresponding IP Adresses of the NFS file shares on NetApp systems. |
Panel | ||
---|---|---|
| ||
KubernetesKubernetes (k8s) clusters are scanned via 2 different methods:
To gain access to the k8s API server the following preparations must be made:
ℹ Use |
Panel | |||||
---|---|---|---|---|---|
| |||||
CustomResourceDefinition Create a CustomResourceDefinition (CRD) to set up a k8s cluster as master grouping object (MGO) definition for BVQ mgo-crd.yaml
|
Panel | |||||
---|---|---|---|---|---|
| |||||
MasterGroupingObject Create a MasterGroupingObject instance (binded to the CRD) for the k8s cluster ℹ Edit/adjust the values for clusterName, customer, location, dc, contact, email & phone to the required information IMPORTANT: clusterName will represent the name of the k8s cluster within BVQ, so choose a meaningful name (example would be: Prod-Cluster-01) mgo-instance.yaml
|
Panel | |||||
---|---|---|---|---|---|
| |||||
ClusterRole Create a ClusterRole to get read-only (get, list, watch) access to the k8s cluster ℹ Read only permissions (get, list, watch) are required
cluster-role-bvqscan.yaml
|
Panel | |||||
---|---|---|---|---|---|
| |||||
ServiceAccount Create a ServiceAccount for authentication ℹ The Token created for this ServiceAccount is needed to set up a BVQ scanner config for the k8s cluster
IMPORTANT: With k8s version 1.24 the LegacyServiceAccountTokenNoAutoGeneration feature gate is beta, and enabled by default (see here). Use this guide to create a non-expiring token (recommended) bvq-serviceaccount.yaml
|
Panel | |||||
---|---|---|---|---|---|
| |||||
ClusterRoleBinding Create a ClusterRoleBinding to bind the Compute_layer#ServiceAccount to the Compute_layer#ClusterRole cluster-role-binding-bvqscan-sa.yaml
|
Panel | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
BVQ Prometheus Server To get performance and topology data a custom bvq-prometheus stack must be deployed in the k8s cluster via helm. This helm chart will install a bvq-prometheus server as a deployment with a 8GB persistent volume (configurable via See Execute the following steps to deploy the bvq-prometheus helm chart to the k8s cluster:
|
Panel | ||
---|---|---|
| ||
Gather information for BVQ Scanner configuration BVQ scanners need the following information to be configured for each k8s cluster:
Preparation for the BVQ Server For BVQ Servers which are gathering information from Kubernetes clusters, the correct DNS configuration is important. |
...