Difference between revisions of "TLM/Current/TLMPEGuide/Deploy"
From Genesys Documentation
(Published) |
(Published) |
||
Line 9: | Line 9: | ||
|Status=No | |Status=No | ||
}}{{Section | }}{{Section | ||
− | |sectionHeading=Deploy | + | |sectionHeading=Deploy the service |
|alignment=Vertical | |alignment=Vertical | ||
|structuredtext=To install the Telemetry Service, run the following command: | |structuredtext=To install the Telemetry Service, run the following command: | ||
Line 15: | Line 15: | ||
|Status=No | |Status=No | ||
}}{{Section | }}{{Section | ||
− | |sectionHeading=Validate the deployment | + | |sectionHeading=Validate the deployment |
|alignment=Vertical | |alignment=Vertical | ||
|structuredtext=To validate the installed release, run the following command: | |structuredtext=To validate the installed release, run the following command: | ||
− | < | + | <source lang="text">helm list –n tlm</source> |
Verify that details of the Telemetry Service deployment information is displayed. | Verify that details of the Telemetry Service deployment information is displayed. | ||
− | To check the installed Helm release, execute the following command: | + | To check the status of installed Helm release, execute the following command: |
− | < | + | <source lang="text">helm status telemetry-service -n tlm</source> |
Verify that the deployment status mentions 'STATUS: deployed'. | Verify that the deployment status mentions 'STATUS: deployed'. | ||
+ | |||
+ | To verify if the objects are created and available in the Telemetry namespace | ||
+ | <source lang="text">kubectl get all -n tlm</source> | ||
+ | Verify that all pods, services, and config maps are displayed. | ||
+ | |Status=No | ||
+ | }}{{Section | ||
+ | |sectionHeading=Expose ports for access | ||
+ | |alignment=Vertical | ||
+ | |structuredtext=To make the Telemetry service accessible from outside the cluster, you have to create ingress files for external and internal access points and apply them to the containers. | ||
+ | |||
+ | ====Configuring ports for external access==== | ||
+ | |||
+ | *Create an ingress file named '''tlm-ingress-cert.yaml''' and modify it to reflect your domain configurations: | ||
+ | <source lang="yaml"> | ||
+ | apiVersion: networking.k8s.io/v1 | ||
+ | kind: Ingress | ||
+ | metadata: | ||
+ | name: tlm-ingress | ||
+ | namespace: tlm | ||
+ | annotations: | ||
+ | cert-manager.io/cluster-issuer: <ca-cluster-issuer> | ||
+ | kubernetes.io/ingress.class: <nginx> | ||
+ | nginx.ingress.kubernetes.io/ssl-redirect: 'false' | ||
+ | nginx.ingress.kubernetes.io/use-regex: 'true' | ||
+ | spec: | ||
+ | tls: | ||
+ | - hosts: | ||
+ | - tlm.<$domain> | ||
+ | secretName: tlm-secret-ext | ||
+ | rules: | ||
+ | - host: tlm.<$domain> | ||
+ | http: | ||
+ | paths: | ||
+ | - path: /.* | ||
+ | pathType: ImplementationSpecific | ||
+ | backend: | ||
+ | service: | ||
+ | name: telemetry-service | ||
+ | port: | ||
+ | number: 8107 | ||
+ | </source> | ||
+ | |||
+ | *Apply the access rules: | ||
+ | |||
+ | kubectl apply -f tlm-ingress-cert.yaml -n tlm | ||
+ | |||
+ | ====Configuring ports for internal access==== | ||
+ | |||
+ | *Create an ingress file named '''tlm-ingress-int-cert.yaml''' and modify it to reflect your domain configurations: | ||
+ | <source lang="yaml"> | ||
+ | apiVersion: networking.k8s.io/v1 | ||
+ | kind: Ingress | ||
+ | metadata: | ||
+ | name: tlm-ingress-int | ||
+ | namespace: tlm | ||
+ | annotations: | ||
+ | cert-manager.io/cluster-issuer: ca-cluster-issuer | ||
+ | kubernetes.io/ingress.class: nginx | ||
+ | nginx.ingress.kubernetes.io/ssl-redirect: 'false' | ||
+ | nginx.ingress.kubernetes.io/use-regex: 'true' | ||
+ | spec: | ||
+ | tls: | ||
+ | - hosts: | ||
+ | - tlm.<$domain> | ||
+ | secretName: tlm-secret-int | ||
+ | rules: | ||
+ | - host: tlm.<$domain> | ||
+ | http: | ||
+ | paths: | ||
+ | - path: /metrics | ||
+ | pathType: ImplementationSpecific | ||
+ | backend: | ||
+ | service: | ||
+ | name: telemetry-service | ||
+ | port: | ||
+ | number: 9107 | ||
+ | </source> | ||
+ | |||
+ | *Apply the access rules: | ||
+ | |||
+ | kubectl apply -f tlm-ingress-int-cert.yaml -n tlm | ||
+ | |||
+ | |||
+ | Verify if the routes are created correctly: | ||
+ | kubectl get ingress -n tlm | ||
<br /> | <br /> | ||
|Status=No | |Status=No |
Revision as of 17:20, December 22, 2021
This topic is part of the manual Telemetry Service Private Edition Guide for version Current of Telemetry Service.
Contents
Learn how to deploy Telemetry Service.
Related documentation:
RSS:
Important
Make sure to review Before you begin for the full list of prerequisites required to deploy Telemetry Service.Deploy the service
To install the Telemetry Service, run the following command:
helm install -f values-tlm.yaml telemetry-service telemetry-service/
Validate the deployment
To validate the installed release, run the following command:
helm list –n tlm
Verify that details of the Telemetry Service deployment information is displayed.
To check the status of installed Helm release, execute the following command:
helm status telemetry-service -n tlm
Verify that the deployment status mentions 'STATUS: deployed'.
To verify if the objects are created and available in the Telemetry namespace
kubectl get all -n tlm
Verify that all pods, services, and config maps are displayed.
Expose ports for access
To make the Telemetry service accessible from outside the cluster, you have to create ingress files for external and internal access points and apply them to the containers.
Configuring ports for external access
- Create an ingress file named tlm-ingress-cert.yaml and modify it to reflect your domain configurations:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: tlm-ingress
namespace: tlm
annotations:
cert-manager.io/cluster-issuer: <ca-cluster-issuer>
kubernetes.io/ingress.class: <nginx>
nginx.ingress.kubernetes.io/ssl-redirect: 'false'
nginx.ingress.kubernetes.io/use-regex: 'true'
spec:
tls:
- hosts:
- tlm.<$domain>
secretName: tlm-secret-ext
rules:
- host: tlm.<$domain>
http:
paths:
- path: /.*
pathType: ImplementationSpecific
backend:
service:
name: telemetry-service
port:
number: 8107
- Apply the access rules:
kubectl apply -f tlm-ingress-cert.yaml -n tlm
Configuring ports for internal access
- Create an ingress file named tlm-ingress-int-cert.yaml and modify it to reflect your domain configurations:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: tlm-ingress-int
namespace: tlm
annotations:
cert-manager.io/cluster-issuer: ca-cluster-issuer
kubernetes.io/ingress.class: nginx
nginx.ingress.kubernetes.io/ssl-redirect: 'false'
nginx.ingress.kubernetes.io/use-regex: 'true'
spec:
tls:
- hosts:
- tlm.<$domain>
secretName: tlm-secret-int
rules:
- host: tlm.<$domain>
http:
paths:
- path: /metrics
pathType: ImplementationSpecific
backend:
service:
name: telemetry-service
port:
number: 9107
- Apply the access rules:
kubectl apply -f tlm-ingress-int-cert.yaml -n tlm
Verify if the routes are created correctly:
kubectl get ingress -n tlm
Comments or questions about this documentation? Contact us for support!