Table of Contents | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Panel | |||||
---|---|---|---|---|---|
| |||||
IBM PowerVMA user is required for the operation of the BVQ PowerVM Scanner who should at least have read-only (hmcviewer) access to the HMC. Please create this user before configuring the BVQ Scanner. We recommend to name the user "bvq" Please open the user properties dialogue and select "Allow remote access via the web"
BVQ can only collect performance statistics if "Data Collection" is enabled on the managed systems and all LPARs. Adjust System settings Enable "Performance Monitoring Data Collection for Managed Servers" To lower the system load and storage capacity usage on the HMC, we recommend to reduce the number of days to store performance data below the title "Performance Data Storage" to its minimum value of "1". BVQ takes over the role to store a longer history of that data. Adjust LPAR settings Switch on "Enable Performance Information Collection" on all LPARs You can check the state of the "Performance Collection" enablement per LPAR easily. Run the following script on the HMC to show all LPARs without enabled collection:
To configure a PowerVM scanner in BVQ the following information is required:
Starting with BVQ 2023.H1: Redundant HMCs managing the same systems must be configured in the same PowerVM scanner. Otherwise, the managed systems will appear twice in BVQ. Define the most powerful HMC first, because the order of HMCs determines the order in which they are scanned by BVQ. Additional HMCs managing other systems should be configured in an additional PowerVM scanner. Up to BVQ 2022.H2: Typically, two redundant HMCs manage the same IBM Power systems. Please ensure that only one scanner is created for one of the HMCs to avoid duplication in BVQ. |
...
Panel | ||
---|---|---|
| ||
VMware vSphereA user is required for the operation of the BVQ VMware Scanner, who should at least have read-only access to the VMware vCenter system. The read-only permission for the user must be defined at the vCenter level. Permissions in a lower level (e.g. Datacenter, Cluster, ...) will lead to scan errors. Please create this user before configuring the BVQ Scanner. We recommend to name the user: bvq Create or select the right user role
Create the BVQ User for the vCenter
Add the right vCenter Statistics
Gather information for BVQ Scanner configuration BVQ scanners need the following information to be configured for each vCenter system:
Preparation for the BVQ Server For BVQ Servers which are gathering information from NetApps and vCenters, the correct DNS configuration is important. This is required to match the DNS-Name of the NFS Datastores to the corresponding IP Adresses of the NFS file shares on NetApp systems. |
Panel | ||
---|---|---|
| ||
KubernetesKubernetes (k8s) clusters are scanned via 2 different methods:
To gain access to the k8s API server the following preparations must be made:
ℹ Use |
Panel | |||||
---|---|---|---|---|---|
| |||||
CustomResourceDefinition Create a CustomResourceDefinition (CRD) to set up a k8s cluster as master grouping object (MGO) definition for BVQ mgo-crd.yaml
|
Panel | |||||||
---|---|---|---|---|---|---|---|
|
Code Block | ||
---|---|---|
| ||
apiVersion: bvq.sva/v1
kind: MasterGroupingObject
metadata:
name: bvq-mgo-k8s
labels:
bvq: mgo
spec:
clusterName: Prod-Cluster-01
customer: Customer Inc.
location: Berlin, Germany
dc: Example-DC-01
contact: Max Mustermann
email: max.mustermann@customer.de
phone: +49-171-1234-56789 |
bgColor | #EAE6FF |
---|
ClusterRole
Create a ClusterRole to get read-only (get, list, watch) access to the k8s cluster
ℹ Read only permissions (get, list, watch) are required
apiGroups
may be applied via a wildcard ('*') to get access to all api groups, otherwise apiGroups given in the example must be set
cluster-role-bvqscan.yaml
Code Block | ||
---|---|---|
| ||
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: bvq-scanner-rl rules: - verbs: - get - watch - list apiGroups: - '' - apiextensions.k8s.io - apps - batch - bvq.sva - networking.k8s.io - storage.k8s.io - discovery.k8s.io - scheduling.k8s.io resources: - '*' |
Panel | |||||
---|---|---|---|---|---|
| |||||
ServiceAccount Create a ServiceAccount for authentication ℹ The Token created for this ServiceAccount is needed to set up a BVQ scanner config for the k8s cluster
IMPORTANT: With k8s version 1.24 the LegacyServiceAccountTokenNoAutoGeneration feature gate is beta, and enabled by default (see here). Use this guide to create a non-expiring token (recommended) bvq-serviceaccount.yaml
|
Panel | |||||
---|---|---|---|---|---|
| |||||
ClusterRoleBinding Create a ClusterRoleBinding to bind the Compute_layer#ServiceAccount to the Compute_layer#ClusterRole cluster-role-binding-bvqscan-sa.yaml
|
Panel | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
BVQ Prometheus Server To get performance and topology data a custom bvq-prometheus stack must be deployed in the k8s cluster via helm. This helm chart will install a bvq-prometheus server as a deployment with a 8GB persistent volume (configurable via See Execute the following steps to deploy the bvq-prometheus helm chart to the k8s cluster:
|
Panel | ||
---|---|---|
| ||
Gather information for BVQ Scanner configuration BVQ scanners need the following information to be configured for each k8s cluster:
Preparation for the BVQ Server For BVQ Servers which are gathering information from Kubernetes clusters, the correct DNS configuration is important. |