- Installation Overview
- Quickstart Install
- Airgapped Installation Options
- Output
- Additional Installer Resources
To install, you will download the installer binary and a values.yaml file, provide a few basic parameters, and launch the Installer. In a normal installation, the rest is automatically configured and deployed.
You can perform a quick install if your environment has access to the internet, or a partial or full airgapped installation, as needed. Each is described below.
The Sysdig Installer tool is a binary containing a collection of scripts that help automate the on-premises deployment of the Sysdig platform (Sysdig Monitor and/or Sysdig Secure), for environments using Kubernetes or OpenShift. Use the Installer to install or upgrade your Sysdig platform. It is recommended as a replacement for the earlier Kubernetes manual installation and upgrade procedures.
With Sysdig Platform 3.5.0, the installer has been simplified from previous versions. Upgrade differs from Install in that you run an installer diff
to discover the differences between the old and new versions and then installer deploy
for the new version.
If you are installing the Sysdig Platform for the first time, ignore the ForUpgradeOnly step in the process. If you are upgrading, See Upgrade notes for release-specific upgrade information.
Note
For Sysdig TAMs: If you are upgrading from much older versions and do not find that documentation in the GitHub folders yet, see our internal site https://github-push-sysdigdocs.netlify.app/en/on-prem-deploy-nov_4_2020.html.
- kubectl or oc binary
- A domain name you are in control of.
- Edited sysdig-chart/values.yaml, with airgap registry details updated
- Network and authenticated access to the private registry
- Network access to quay.io
- Sysdig license key (Monitor and/or Secure)
- Quay pull secret
You may use dynamic or static storage on a variety of platforms to store the Sysdig platform components (stateful sets). Different configuration parameters and values are used during the install, depending on which scenario you have.
Use Case 1: Default, undefined (AWS/GKE)
If you will use dynamic storage on AWS or GKE and haven't configured any storage class there yet, then the Quick Install streamlines the process for you.
-
storageclassProvision``er:
Enteraws
orgke
. The installer will create the appropriate storage class and then use it for all the Sysdig platform stateful sets. -
storageclassName
: Leave empty.
Use Case 2: Dynamic, predefined
It is also possible that you are using dynamic storage but have already created storage classes there. This dynamic storage could be AWS, GKE, or any other functioning dynamic storage you use. In this case, you would enter:
-
storageclassProvisioner
: Leave empty; anything put here would be ignored. -
storageclass``Name
: Provide the name of the pre-configured storage class you want to use. The installer will use this storage class for all the Sysdig platform stateful sets.
Use Case 3: Static Storage
In cases where dynamic storage is not available, you can use static storage for the Sysdig stateful sets. In this case, you would use:
-
storageclassProvisioner
: Enterhostpath
, then define the nodes for the four main Sysdig components: ElasticSearch, Cassandra, MySQL, and Postgres.storageclassProvisioner -
See Advanced Configurations for details.
This install assumes the Kubernetes cluster has network access to pull images from quay.io.
-
Have your Sysdig Technical Account Manager download the installer binary that matches your distribution.
-
For Upgrades Only: Preparing values.yaml
- Option1: Use the previous values.yaml used to install your current version (recommended)
- Option2: If you dont have a copy of previous values.yaml, use Installer's import function:
./installer-image import -n <namespace> --certs-directory certs -o values.yaml
Note
If you will be editing for an OpenShift installation and want to review a sample, see openshift-with-hostpath values.yaml.
-
Edit the following values:
-
size
: Specifies the size of the cluster. Size defines CPU, Memory, Disk, and Replicas. Valid options are: small, medium and large -
quaypullsecret
: quay.io provided with your Sysdig purchase confirmation mail -
storageClassProvider
: Review Storage Requirements, above. If you have the default use case, enteraws
orgke
in thestorageClassProvisioner
field. Otherwise, refer to Use Case 2 or 3. -
sysdig.license
: Sysdig license key provided with your Sysdig purchase confirmation mail -
sysdig.dnsName
: The domain name the Sysdig APIs will be served on. Note that the master node may not be used as the DNS name when using hostNetwork mode. -
sysdig.collector.dnsName
: (OpenShift installs only) Domain name the Sysdig collector will be served on. When not configured it defaults to whatever is configured for sysdig.dnsName. Note that the master node may not be used as the DNS name when using hostNetwork mode. -
deployment
: (OpenShift installs only) Adddeployment: openshift
to the root of thevalues.yaml
file. -
sysdig.ingressNetworking
: The networking construct used to expose the Sysdig API and collector.Options are:-
hostnetwork: sets the hostnetworking in the ingress daemonset and opens host ports for api and collector. This does not create a Kubernetes service.
-
loadbalancer: creates a service of type loadbalancer and expects that your Kubernetes cluster can provision a load balancer with your cloud provider.
-
nodeport: creates a service of type nodeport.The node ports can be customized with:
-
sysdig.ingressNetworkingInsecureApiNodePort
-
sysdig.ingressNetworkingApiNodePort
-
sysdig.ingressNetworkingCollectorNodePort
When not configured,
sysdig.ingressNetworking
defaults tohostnetwork
.Note
If doing an airgapped install, you would also edit the following values:
-
-
-
airgapped_registry_name
: The URL of the airgapped (internal) docker registry. This URL is used for installations where the Kubernetes cluster can not pull images directly from Quay -
airgapped_repository_prefix
: This defines custom repository prefix for airgapped_registry. Tags and pushes images asairgapped_registry_name/airgapped_repository_prefix``/image_name:tag
-
airgapped_registry_password
: The password for the configured airgapped_registry_username. Ignore this parameter if the registry does not require authentication. -
airgapped_registry_username
: The username for the configured airgapped_registry_name. Ignore this parameter if the registry does not require authentication.
-
-
[For Upgrades Only] Generate and review the diff of changes the installer is about to introduce:
./installer diff
This will generate the differences between the installed environment and the upgrade version. The changes will be displayed in your terminal. If you want to override a change, based on your environment's custom settings, then contact Sysdig Support for assistance.
-
Run the installer:
./installer deploy
-
See Output (below) to finish.
Note
Save the
values.yaml
file in a secure location; it will be used for future upgrades.There will also be a generated directory containing various Kubernetes configuration
yaml
files that were applied by the Installer against your cluster. It is not necessary to keep the generated directory, as the Installer can regenerate it consistently with the samevalues.yaml
file.
The Installer can be used to install in airgapped environments, either with a multi-homed installation machine that has internet access, or in an environment with no internet access.
This assumes a private docker registry is used and the installation machine has network access to pull from quay.io and push images to the private registry.
The Prerequisites and workflow are the same as in the Quickstart Install, with the following exceptions:
- In step 2, add the airgap registry information.
- After step 3, make the installer push sysdig images to the airgapped registry by running:
That will pull all the images into
./installer airgap
images_archive
directory astar
files and push them to the airgapped registry - Run the Installer.
- If you are upgrading, run the diff as directed in Step 4.
./installer deploy
This assumes a private docker registry is used and the installation machine does not have network access to pull from quay.io, but can push images to the private registry.
In this situation, a machine with network access (called the “jump machine”) will pull an image containing a self-extracting tarball which can be copied to the installation machine.
- Sysdig license key (Monitor and/or Secure)
- Quay pull secret
- Anchore license file (if Sysdig Secure is licensed)
- Network access to quay.io
- Docker
- jq
-
Network access to Kubernetes cluster
-
Docker
-
Network and authenticated access to the private registry
-
Edited sysdig-chart/values.yaml, with airgap registry details updated
-
Host Disk Space Requirements:
/tmp
> 4 GB; directory from which the installer is run >8GB; and/var/lib/docker
> 4GB.NOTE:
The environment variable
TMPDIR
can be used to override the/tmp
directory.
Retrieve Quay username and password from Quay pull secret and login using credentials.
AUTH=$(echo REPLACE_WITH_quaypullsecret | base64 --decode | jq -r '.auths."quay.io".auth'| base64 --decode)
QUAY_USERNAME=${AUTH%:*}
QUAY_PASSWORD=${AUTH#*:}
docker login -u "$QUAY_USERNAME" -p "$QUAY_PASSWORD" quay.io
- Follow the Docker Log In to quay.io steps, above.
- Pull the image containing the self-extracting tar:
docker pull quay.io/sysdig/installer:4.0.4-1-uber
- Extract the tarball:
docker create --name uber_image quay.io/sysdig/installer:4.0.4-1-uber docker cp uber_image:/sysdig_installer.tar.gz . docker rm uber_image
- Copy the tarball to the installation machine.
-
Copy the current version sysdig-chart/values.yaml to your working directory.
wget https://raw.githubusercontent.com/draios/onprem-install-docs/blob/main/4.0.4/values.yaml
-
Edit the following values:
size
: Specifies the size of the cluster. Size defines CPU, Memory, Disk, and Replicas. Valid options are: small, medium and largequaypullsecret
: quay.io provided with your Sysdig purchase confirmation mailstorageClassProvider
: Review Storage Requirements, above. If you have the default use case, enteraws
orgke
in thestorageClassProvisioner
field. Otherwise, refer to Use Case 2 or 3.sysdig.license
: Sysdig license key provided with your Sysdig purchase confirmation mailsysdig.dnsName
: The domain name the Sysdig APIs will be served on. Note that the master node may not be used as the DNS name when using hostNetwork mode.sysdig.collector.dnsName
: (OpenShift installs only) Domain name the Sysdig collector will be served on. When not configured it defaults to whatever is configured for sysdig.dnsName. Note that the master node may not be used as the DNS name when using hostNetwork mode.deployment
: (OpenShift installs only) Adddeployment: openshift
to the root of thevalues.yaml
file.sysdig.ingressNetworking
: The networking construct used to expose the Sysdig API and collector. Options are:- hostnetwork: sets the hostnetworking in the ingress daemonset and opens host ports for api and collector. This does not create a Kubernetes service.
- loadbalancer: creates a service of type loadbalancer and expects that your Kubernetes cluster can provision a load balancer with your cloud provider.
- nodeport: creates a service of type nodeport. The node ports can be
customized with:
sysdig: ingressNetworkingInsecureApiNodePort: 30001 ingressNetworkingApiNodePort: 30002 ingressNetworkingCollectorNodePort: 30002
airgapped_registry_name
: The URL of the airgapped (internal) docker registry. This URL is used for installations where the Kubernetes cluster can not pull images directly from Quay.airgapped_repository_prefix
: This defines custom repository prefix for airgapped_registry. Tags and pushes images as airgapped_registry_name/airgapped_repository_prefix/image_name:tagairgapped_registry_password
: The password for the configured airgapped_registry_username. Ignore this parameter if the registry does not require authentication.airgapped_registry_username
: The username for the configured airgapped_registry_name. Ignore this parameter if the registry does not require authentication.
-
Copy the tarball file to the directory where you have your values.yaml file.
-
Run:
installer airgap --tar-file sysdig_installer.tar.gz
Note:
The above step will extract the images into
images_archive
directory relative to where the installer was run and push the images to the airgapped_registry -
[For Upgrades Only] Generate and review the diff of changes the installer is about to introduce:
./installer diff
This will generate the differences between the installed environment and the upgrade version. The changes will be displayed in your terminal.
If you want to override a change, based on your environment's custom settings, then contact Sysdig Support for assistance.
-
Run the Installer:
./installer deploy
-
On successful run of Installer towards the end of your terminal you should see the below:
All Pods Ready.....Continuing Congratulations, your Sysdig installation was successful! You can now login to the UI at "https://awesome-domain.com:443" with: username: "[email protected]" password: "awesome-password"
NOTE:
Save the values.yaml file in a secure location; it will be used for future upgrades.
There will also be a generated directory containing various Kubernetes configuration yaml files which were applied by Installer against your cluster. It is not necessary to keep the generated directory, as the Installer can regenerate is consistently with the same values.yaml file.
A successful installation should display output in the terminal such as:
All Pods Ready.....Continuing
Congratulations, your Sysdig installation was successful!
You can now login to the UI at "https://awesome-domain.com:443" with:
username: "[email protected]"
password: "awesome-password"
There will also be a generated directory containing various Kubernetes configuration yaml
files which were applied by installer against your cluster. It is not necessary to keep the generated directory, as the installer can regenerate consistently with the same values.yaml
file.
-
See Release Notes for upgrade matrix, supported platforms & link to full feature notes
-
See Upgrade notes for release-specific upgrade information
-
See Frequently Used Options for additional configurations such as static storage and patching
-
See configuration_parameters.md for all the configuration parameters available, as well as their definitions, values, and examples
-
See Examples of single-node, openshift... values.yaml
-
See Agent Install for Installer agent install
-
See Permissions for running the Installer