OpenShift Monitoring
Consider usage of our brand new full-stack infrastructure monitoring tool XorMon Next Generation as LPAR2RRD replacement.
It brings a new level of infrastructure monitoring by relying on a modern technology stack.
In particular, reporting, exporting, alerting and presentation capabilities are unique on the market.
# su - lpar2rrd $ tar xvf lpar2rrd-7.XX.tar $ cd lpar2rrd-7.XX $ ./install.sh $ cd /home/lpar2rrd/lpar2rrd
cd /home/lpar2rrd/lpar2rrd . etc/lpar2rrd.cfg; $PERL bin/perl_modules_check.plIf there is missing "LWP::Protocol::https" then check this docu to fix it
su - lpar2rrd umask 022 cd /home/lpar2rrd/lpar2rrd cp html/.htaccess www cp html/.htaccess lpar2rrd-cgi
$ crontab -l | grep load.sh $
$ crontab -e # LPAR2RRD UI 0,30 * * * * /home/lpar2rrd/lpar2rrd/load.sh > /home/lpar2rrd/lpar2rrd/load.out 2>&1Assure there is just one such entry in crontab.
# echo "lpar2rrd" >> /etc/cron.allow
$ crontab -l | grep "load_openshift.sh" $
$ crontab -e # RedHat OpenShift support 0,20,40 * * * * /home/lpar2rrd/lpar2rrd/load_openshift.sh > /home/lpar2rrd/lpar2rrd/load_openshift.out 2>&1
$ cd /home/lpar2rrd/lpar2rrd $ ./load.sh
tail /var/log/httpd/error_log # Apache error log tail /var/log/httpd/access_log # Apache access log tail /var/tmp/lpar2rrd-realt-error.log # STOR2RRD CGI-BIN log tail /var/tmp/systemd-private*/tmp/lpar2rrd-realt-error.log # STOR2RRD CGI-BIN log when Linux has enabled private temp
umask 022 cd /home/lpar2rrd/lpar2rrd/ cp bin/test-healthcheck-cgi.sh lpar2rrd-cgi/go to the web browser: http://<your web server>/lpar2rrd/test.html
apiVersion: v1 kind: ServiceAccount metadata: name: lpar2rrd namespace: default
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: lpar2rrd rules: - apiGroups: ["","metrics.k8s.io","apps","config.openshift.io","machine.openshift.io","machineconfiguration.openshift.io","monitoring.coreos.com","project.openshift.io","route.openshift.io","storage.k8s.io"] resources: ["*"] verbs: ["get", "watch", "list"] - nonResourceURLs: ["/metrics"] verbs: ["get"]
$ crontab -l | grep "load_openshift.sh" $
$ crontab -e # Openshift support 0,20,40 * * * * /home/lpar2rrd/lpar2rrd/load_openshift.sh > /home/lpar2rrd/lpar2rrd/load_openshift.out 2>&1
$ kubectl create serviceaccount lpar2rrd
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: lpar2rrd rules: - apiGroups: ["","metrics.k8s.io","apps","config.openshift.io","machine.openshift.io","machineconfiguration.openshift.io","monitoring.coreos.com","project.openshift.io","route.openshift.io","storage.k8s.io"] resources: ["*"] verbs: ["get", "watch", "list"] - nonResourceURLs: ["/metrics"] verbs: ["get"]Apply it by:
$ kubectl apply -f ClusterRole.yml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: lpar2rrd subjects: - kind: ServiceAccount name: lpar2rrd namespace: default roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: lpar2rrdApply it by:
$ kubectl apply -f ClusterRoleBinding.yml
$ kubectl get serviceaccounts lpar2rrd -o yaml
$ kubectl describe secret lpar2rrd-token-fkkxp
$ kubectl config view
$ crontab -l | grep "load_openshift.sh" $
$ crontab -e # Openshift support 0,20,40 * * * * /home/lpar2rrd/lpar2rrd/load_openshift.sh > /home/lpar2rrd/lpar2rrd/load_openshift.out 2>&1