...
Panel | ||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||||||||
VMware vSphereA user is required for the operation of the BVQ VMware Scanner, who should at least have read-only access to the VMware vCenter system. The read-only permission for the user must be defined at the vCenter level. Permissions in a lower level (e.g. Datacenter, Cluster, ...) will lead to scan errors. Please create this user before configuring the BVQ Scanner. We recommend to name the user: bvq Create or select the right user role
Create the BVQ User for the vCenter
Add the right vCenter Statistics Add the right vCenter Statistics
Gather information for BVQ Scanner configuration BVQ scanners need the following information to be configured for each vCenter system:
Preparation for the BVQ Server For BVQ Servers which are gathering information from NetApps and vCenters, the correct DNS configuration is important. This is required to match the DNS-Name of the NFS Datastores to the corresponding IP Adresses of the NFS file shares on NetApp systems. |
Panel | ||
---|---|---|
| ||
KubernetesKubernetes (k8s) clusters are scanned via 2 different methods:
To gain access to the k8s API server the following preparations must be made:
ℹ Use |
Panel | |||||
---|---|---|---|---|---|
| |||||
CustomResourceDefinition Create a CustomResourceDefinition (CRD) to set up a k8s cluster as master grouping object (MGO) definition for BVQ mgo-crd.yaml
| |||||
Panel | |||||
|
Code Block | ||
---|---|---|
| ||
apiVersion: bvq.sva/v1
kind: MasterGroupingObject
metadata:
name: bvq-mgo-k8s
labels:
bvq: mgo
spec:
clusterName: Prod-Cluster-01
customer: Customer Inc.
location: Berlin, Germany
dc: Example-DC-01
contact: Max Mustermann
email: max.mustermann@customer.de
phone: +49-171-1234-56789 |
plural: mastergroupingobjects
singular: mastergroupingobject
kind: MasterGroupingObject
shortNames:
- mgo |
Panel | |||||
---|---|---|---|---|---|
| |||||
ClusterRole Create a ClusterRole to get read-only (get, list, watch) access to the k8s cluster ℹ Read only permissions (get, list, watch) are required apiGroups may required
cluster-role-bvqscan.yaml
|
Panel | |||||
---|---|---|---|---|---|
| |||||
ServiceAccount Create a ServiceAccount for authentication ℹ The Token created for this ServiceAccount is needed to set up a BVQ scanner config for the k8s cluster namespace may cluster
IMPORTANT: With k8s version 1.24 the LegacyServiceAccountTokenNoAutoGeneration feature gate is beta, and enabled by default (see here). Use this guide to create a non-expiring token (recommended) bvq-serviceaccount.yaml
|
Panel | |||||
---|---|---|---|---|---|
| |||||
ClusterRoleBinding Create a ClusterRoleBinding to bind the Compute_layer#ServiceAccount to the Compute_layer#ClusterRole cluster-role-binding-bvqscan-sa.yaml
|
Panel | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
BVQ Prometheus Server To get performance and topology data a custom bvq-prometheus stack must be deployed in the k8s cluster via helm. This helm chart will install a bvq-prometheus server as a deployment with a 8GB persistent volume (configurable via See Execute the following steps to deploy the bvq-prometheus helm chart to the k8s cluster:
|
Panel | ||
---|---|---|
| ||
Gather information for BVQ Scanner configuration BVQ scanners need the following information to be configured for each k8s cluster:
Preparation for the BVQ Server For BVQ Servers which are gathering information from Kubernetes clusters, the correct DNS configuration is important. |