Installing the agent on Red Hat OpenShift

You can install the Instana agent on a Red Hat OpenShift cluster by using different methods depending on your requirements. See the following list to check the prerequisite conditions, learn about all the available installation methods, and install the agent on Red Hat OpenShift:

Prerequisites

Before you install the agent, ensure that the prerequisites are met.

Choosing how you want to install the agent

You can install the Instana agent on a Red Hat OpenShift cluster by using the following methods:

Installing by using the operator

To install the Instana agent on Red Hat OpenShift by using the operator, complete the following steps:

  1. Complete the prerequisite steps before you proceed with installing the operator.

  2. Install the operator by using one of the following methods:

Prerequisites

You must first set up a project for the Instana agent and configure its permissions.

Create the instana-agent project, and set the policy permissions to ensure that the instana-agent service account is in the privileged security context. See the following example commands:

oc login -u system:admin
oc new-project instana-agent
oc adm policy add-scc-to-user privileged -z instana-agent -n instana-agent

Installing the operator by using OLM

To install the Instana agent on Red Hat OpenShift by using OLM, complete the following steps:

  1. Install the Instana agent operator from OperatorHub.io or the Red Hat OpenShift catalog of Containerized applications.

  2. If you don't already have a target namespace, create a namespace where the Instana agent must be installed. For example, you can create a namespace instana-agent to run the operator. The agent does not need to run in the same namespace as the operator.

  3. Follow Step 2 to Step 6 in the Installing the operator manually section to create the custom resource for the agent and apply the custom resource. The operator picks up the configuration from the custom resource and deploys the Instana agent.

Installing the operator manually

To install the operator manually on Red Hat OpenShift, complete the following steps:

  1. Deploy the latest operator version by using the following command:

    kubectl apply -f https://github.com/instana/instana-agent-operator/releases/latest/download/instana-agent-operator.yaml
    

    After you run this command, the operator is up and running in the namespace that you created, and waiting for the instana-agent custom resource to be created.

  2. On the home page of the Instana UI, click Deploy Agent.

  3. On the agent deployment catalog page, click the tile OpenShift - Operator.

  4. Enter the cluster name and (optionally) the agent zone that you want the cluster to be part of.

    The cluster name (<your_cluster_name>) is the customized name of the cluster that is monitored by this DaemonSet.

    The agent zone (<your_zone_name>) is used to customize the zone grouping, which is displayed on the infrastructure map.

  5. Create a custom resource YAML file by copying the YAML template provided in the Instana UI.

    The YAML template is pre-filled with your agent key, host agent endpoint, cluster name, and agent zone.

  6. Edit the custom resource YAML file. For an example of the YAML file, see instana_v1_extended_instanaagent.yaml.

    1. The Instana agent custom resource supports the exact same configuration as the Instana Helm chart. For a detailed list of all the configuration parameters and examples, see Instana Helm chart.

      Also see the following topics:

    2. If you want to install the agent in a self-hosted environment, and the agent key does not have authority to download from the Instana public artifactory, add the download key as downloadKey: <your_download_key>. For example:

    agent:
      key: wPYpH7EGK0ucLaO0Nu7BYw
      downloadKey: m007YDoWNload6kE42yukg
      endpointHost: ...
    
    1. If you want to add TLS encryption for the agent endpoint, use an existing secret or use a certificate and private key:

      Using existing secret

      You can use an existing secret of the type kubernetes.io/tls for TLS encryption. But the agent.tls.secretName must be provided in the custom resource YAML file.

      Use a certificate and private key

      Instead of an existing secret, a certificate and a private key can be used. The certificate and private key must be base64-encoded.

      To use this variant, add the following two parameters to the custom resource YAML file:

      • agent.tls.certificate
      • agent.tls.key

      If agent.tls.secretName is set, then agent.tls.certificate and agent.tls.key are ignored.

    2. Optional: You can replace the following values:

      • agent.env: Use this field to specify environment variables for the agent, such as the proxy configuration for the agent. For more possible environment values, see agent configuration. See the following example:

        spec:
            agent:
              env:
               INSTANA_AGENT_TAGS: staging
        
      • agent.configuration_yaml: Use this field to specify an agent configuration file configuration.yaml. See the following example:

        spec:
            agent:
              configuration_yaml: |
                # Example of configuration yaml template
                # Host
                com.instana.plugin.host:
                  tags:
                    - 'dev'
                    - 'app1'
        

        For more information, see Configuring host agents by using the agent configuration file.

    3. If you want to deploy the static agent, configure the custom resource YAML file with the static agent image. To list the static agent image, set agent.image.name to containers.instana.io/instana/release/agent/static. See the following example:

      spec:
       agent:
         image:
           name: containers.instana.io/instana/release/agent/static
      
  7. Apply the custom resource YAML file:

    kubectl apply -f instana-agent.customresource.yaml
    

    where instana-agent.customresource.yaml is the name of your custom resource YAML file.

    The operator picks up the configuration from the custom resource YAML file and deploys the Instana agent.

Now the agent is installed. For what you can do after the installation, go to the What to do next section.

To update the agent, see Updating an operator installation.

Installing by using the Helm chart

You can use the Helm chart to install the agent. The Helm chart adds the Instana agent to all nodes that can be scheduled in your cluster by using a DaemonSet.

To install the Instana agent by using Helm chart, you must first install or upgrade to Helm version 3.

The Instana agent Helm chart supports Red Hat OpenShift 4.x.

To install the Instana agent on Red Hat OpenShift by using the Helm chart, complete the following steps:

  1. On the home page of the Instana UI, click Deploy Agent.

  2. On the agent deployment catalog page, click the tile OpenShift - Helm chart.

  3. Enter the cluster name and (optionally) the agent zone that you want the cluster to be part of.

    The cluster name (<your_cluster_name>) is the customized name of the cluster that is monitored by this DaemonSet.

    The agent zone (<your_zone_name>) is used to customize the zone grouping displayed on the infrastructure map.

    The agent deployment code is updated with the values that you provide. All the other required parameters are pre-populated in the agent deployment code, which looks like the following example:

    INSTANA_AGENT_NAMESPACE=instana-agent
    oc login -u system:admin
    oc new-project ${INSTANA_AGENT_NAMESPACE}
    oc adm policy add-scc-to-user privileged -z instana-agent -n "${INSTANA_AGENT_NAMESPACE}"
    helm install instana-agent \
    --repo https://agents.instana.io/helm \
    --namespace ${INSTANA_AGENT_NAMESPACE} \
    --set agent.key='<your_agent_key>' \
    --set agent.endpointHost='<your_host_agent_endpoint>' \
    --set agent.endpointPort=443 \
    --set cluster.name='<your_cluster_name>' \
    --set zone.name='<your_zone_name>' \
    instana-agent
    
  4. Edit the agent deployment code.

    • To configure the installation, you can specify the values on the command line by using the --set flag or provide a YAML file with your values by using the -f flag. For a detailed list of all the configuration parameters and examples, see Instana Helm chart. Also, see the following topics:

    • Optional: To deploy the static agent, set the flag --set agent.image.name=containers.instana.io/instana/release/agent/static.

    • The Kubernetes service that is created by default exposes the following items to the cluster:

    • Optional: If you want to add TLS encryption for the agent endpoint, use an existing secret or use a certificate and private key:

      • Using existing secret of type kubernetes.io/tls

        You can use an existing secret of the type kubernetes.io/tls for TLS encryption. But you must specify the secretName with --set 'agent.tls.secretName=<YOUR_SECRET_NAME>' during the installation. The files from the provided secret is then included in the agent.

      • Use a certificate and private key

        The certificate and private key must be base64-encoded. To use this variant, run helm install with the following extra parameters:

        --set 'agent.tls.certificate=<YOUR_CERTIFICATE_BASE64_ENCODED>'
        --set 'agent.tls.key=<YOUR_PRIVATE_KEY_BASE64_ENCODED>'
        

        If agent.tls.secretName is set, then agent.tls.certificate and agent.tls.key are ignored.

  5. Copy and then run the agent deployment code.

Now the agent is installed. For what you can do after the installation, go to the What to do next section.

To update the agent, see Updating an operator installation.

Installing by using Helm chart in an air-gapped environment

Red Hat OpenShift provides an internal container registry that you can use in air-gapped environments to store images to run workloads in the cluster.

Make sure that you install the following software before installing the agent:

  • OpenShift CLI (oc)
  • jq
  • skopeo

The following steps are tested on Red Hat Enterprise Linux 9.4, and are applicable to most Linux distributions.

To install the Instana agent by using Helm chart in an air-gapped environment, complete the following steps:

  1. Log in to the Red Hat OpenShift cluster as administrator by running the following command:

    oc login --server=https://api.myopenshiftcluster.com:6443 -u kubeadmin -p $OPENSHIFT_PASSWORD 
    
  2. Expose the internal container registry to be accessible from your jump host:

    oc patch configs.imageregistry.operator.openshift.io/cluster --type merge -p '{"spec":{"defaultRoute":true}}'
    
  3. Retrieve the hostname that is used to access the registry externally:

    HOST=$(oc get route default-route -n openshift-image-registry --template='{{ .spec.host }}')
    
  4. Create a project 'instana' (if it is not created earlier) in the Red hat OpenShift cluster to enable pushing images to the specified namespace:

    oc get project instana || oc new-project instana
    
  5. Display the registry host information:

    echo "${HOST}" # default-route-openshift-image-registry.apps.myopenshiftcluster.com
    
  6. Obtain the certificate of the trusted ingress operator and add it in the certificate authority (CA) directory of the system:

    oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm
    

    Failing this step might result in certificate warnings (for example, tls: failed to verify certificate: x509: certificate signed by unknown authority) when you try to push the image to the target registry.

  7. Import the CA into the system's trusted certificate authority store by using the following commands:

    sudo mv tls.crt /etc/pki/ca-trust/source/anchors/
    sudo update-ca-trust
    
  8. Log in to both the source and destination registries by using Skopeo:

    skopeo login -u kubeadmin -p $(oc whoami -t) $HOST
    skopeo login -u _ -p $AGENT_DOWNLOAD_KEY containers.instana.io
    
  9. Determine the latest versions available for each component:

    LATEST_OPERATOR_VERSION=$(skopeo inspect docker://icr.io/instana/instana-agent-operator:latest | jq -r ".Labels.version")
    LATEST_AGENT_VERSION=$(skopeo inspect docker://containers.instana.io/instana/release/agent/static:latest | jq -r ".Labels.version")
    LATEST_K8S_SENSOR_VERSION=$(skopeo inspect docker://icr.io/instana/k8sensor:latest | jq -r '.Labels["com.instana.commit.id"]')
    
  10. Copy the required components to the local registry:

    skopeo copy docker://icr.io/instana/instana-agent-operator:latest "docker://${HOST}/instana/instana-agent-operator:${LATEST_OPERATOR_VERSION}"
    skopeo copy docker://containers.instana.io/instana/release/agent/static:latest "docker://${HOST}/instana/instana-agent-static:${LATEST_AGENT_VERSION}"
    skopeo copy docker://icr.io/instana/k8sensor:latest "docker://${HOST}/instana/k8sensor:${LATEST_K8S_SENSOR_VERSION}"
    

Deploying the agent Helm chart

To fetch the Helm chart, complete the following steps:

  1. Create a new namespace for the agent deployment:

    INSTANA_AGENT_NAMESPACE=instana-agent
    oc new-project ${INSTANA_AGENT_NAMESPACE}
    
  2. Fetch the Helm chart on the jump host:

    helm pull instana-agent --repo https://agents.instana.io/helm --untar
    

    If you're performing an upgrade instead of an initial installation, manually apply the CRDs (Custom Resource Definitions) from the crds folder that is located within the extracted Helm chart directory:

    oc apply -f instana-agent/crds/
    
  3. Create a new file custom-values.yaml to overwrite the default image references with those specific to your air-gapped environment:

    Note:

    When you deploy the Helm chart to the OCP cluster, you can use the internal registry URLs.

    • image-registry.openshift-image-registry.svc:5000/instana/instana-agent-operator:${LATEST_OPERATOR_VERSION}
    • image-registry.openshift-image-registry.svc:5000/instana/instana-agent-static:${LATEST_AGENT_VERSION}
    • image-registry.openshift-image-registry.svc:5000/instana/k8sensor:${LATEST_K8S_SENSOR_VERSION}

    See the following sample custom-values.yaml file:

    cluster:
      name: demo-cluster
    
    zone:
      name: airgapped-demo
    
    agent:
      endpointHost: ingress-red-saas.instana.io
      endpointPort: 443
      key: xxx
      image:
        name: image-registry.openshift-image-registry.svc:5000/instana/instana-agent-static
        tag: 1.290.20
    
      configuration_yaml: |
        # Manual a-priori configuration. Configuration will be only used when the sensor
        # is actually installed by the agent.
        # Host
        #com.instana.plugin.host:
        #  tags:
        #    - 'dev'
        #    - 'app1'
    
    k8s_sensor:
      image:
        name: image-registry.openshift-image-registry.svc:5000/instana/k8sensor
        tag: b4eac7d
    
    controllerManager:
      image:
        name: image-registry.openshift-image-registry.svc:5000/instana/instana-agent-operator
        tag: v2.1.20
    
  4. Grant the necessary permissions to the 'instana-agent' user or group to run the agent DaemonSet:

    oc adm policy add-scc-to-user privileged -z instana-agent -n ${INSTANA_AGENT_NAMESPACE}
    
  5. Adjust the pull policy to enable all service accounts within the 'instana-agent' namespace to access images from the 'instana' namespace:

    oc policy add-role-to-group system:image-puller system:serviceaccounts:instana-agent -n instana
    
  6. Deploy the Helm chart that is located in the './instana-agent' directory into the newly created 'instana-agent' namespace by using the following commands:

    helm install instana-agent \
       --namespace ${INSTANA_AGENT_NAMESPACE} \
       -f custom-values.yaml \
       ./instana-agent
    

Validating the deployment

To validate the private images that are deployed to the cluster, complete the following steps:

  1. List all pods in the instana-agent namespace by running the following command:

    oc get pods -n instana-agent
    

    See the following sample response:

    NAME                                                READY   STATUS    RESTARTS   AGE
    instana-agent-6275r                                 1/1     Running   0          2m52s
    instana-agent-controller-manager-5c9bd89b7c-697mf   1/1     Running   0          3m
    instana-agent-k8sensor-5466f8cb4d-9j7p2             1/1     Running   0          2m52s
    instana-agent-k8sensor-5466f8cb4d-fdwsj             1/1     Running   0          2m52s
    instana-agent-k8sensor-5466f8cb4d-jstc4             1/1     Running   0          2m52s
    instana-agent-sjmtc                                 1/1     Running   0          2m52s
    instana-agent-z5plx                                 1/1     Running   0          2m52s
    

    Make sure that three k8sensor pods, and one instana-agent-controller-manager pod, and one instana-agent pod per each worker node are running.

  2. Validate the images by running the following command:

    oc get ds,deployment -o yaml | grep "image:"
    

    See the following sample response:

           image: image-registry.openshift-image-registry.svc:5000/instana/instana-agent-static:1.290.20
           image: image-registry.openshift-image-registry.svc:5000/instana/instana-agent-operator:v2.1.20
           image: image-registry.openshift-image-registry.svc:5000/instana/k8sensor:b4eac7d
    

Installing by using a static YAML file

Installing the Instana agent by using static YAML method is deprecated and is planned to be removed in the future versions of Instana. Instead, you are suggested to install the agent by using the Instana agent operator.

To install the Instana agent in your cluster by using a static YAML file, complete the following steps:

  1. On the home page of the Instana UI, click Deploy Agent.

  2. On the agent deployment catalog page, click the tile OpenShift - YAML.

  3. Enter the cluster name and (optionally) the agent zone that you want the cluster to be part of.

    The cluster name (<your_cluster_name>) is the customized name of the cluster that is monitored by this DaemonSet.

    The agent zone (<your_zone_name>) is used to customize the zone grouping displayed on the infrastructure map.

    The agent deployment code is updated with the values that you provide. All the other required parameters are pre-populated in the agent deployment code.

  4. Create a custom resource YAML file by copying the YAML template provided in the Instana UI. For example: deployment.yaml.

    The YAML template is pre-filled with your agent key, host agent endpoint, cluster name, and agent zone.

  5. Edit the YAML file as required.

    • The Instana agent requires the privileged Pod Security Standard. To enforce the Pod Security Standard with a built-in Pod Security Admission controller, run the following command:

      kubectl label --overwrite ns instana-agent pod-security.kubernetes.io/enforce=privileged
      
    • Optional: To deploy for Kubernetes versions before 1.8 with RBAC enabled, replace rbac.authorization.k8s.io/v1 with rbac.authorization.k8s.io/v1beta1 for RBAC API version.

    To grant your user the ability to create authorization roles, for example in Google Kubernetes Engine (GKE), run this command:

    kubectl create clusterrolebinding cluster-admin-binding \
    --clusterrole cluster-admin --user $(gcloud config get-value account)
    

    If you don't enable RBAC, you need to remove ClusterRole and ClusterRoleBinding from the instana-agent.yaml file.

    • Optional: To enable a PodSecurityPolicy for the Instana agent, complete the following steps:

      • Create a PodSecurityPolicy resource as defined in Helm chart.
      • Authorize that policy in the instana-agent ClusterRole. You need to enable RBAC with ClusterRole and ClusterRoleBinding resources that are created in the previously mentioned instana-agent.yaml file.
      • Enable the PodSecurityPolicy admission controller on your cluster. For existing clusters, you are recommended to add and authorize policies before you enable the admission controller..
  6. Install the Instana agent within your cluster by running the following command:

    kubectl apply -f deployment.yaml
    

    where deployment.yaml is the name of the file that you created in the previous step.

    If you make any more edits to the deployment.yaml file, you must re-apply the agent deployment.

Now the agent is installed. For what you can do after the installation, go to the What to do next section.

For more information about the agent endpoints, see Host Agent Configuration.