Skip to main content
Version: 2.7

Enable monitoring service

After installing Portworx Central on-premises, follow the steps in this topic to enable the monitoring server component.

Prerequisites

  • Deploy the Portworx Central chart and ensure all components are in running state.

  • If you run Portworx on Openshift, then add a new service account to the privileged SCC. Enter the oc edit scc privileged command and add the following line to the users section, replacing <YOUR_NAMESPACE> with your namespace.

    system:serviceaccount:<YOUR_NAMESPACE>:px-monitor
  • Depending on how you access the px-backup-ui service, one of the following ports must be open:

    • HTTP port 80 - if you use an Ingress rule or a load balancer endpoint
    • Port specified in the spec.type:NodePort section of the px-backup-ui service - if you use the Portworx Central endpoint
note

Ensure the px-central-ui endpoint is accessible from pods that run Portworx Central to ensure that monitoring/grafana services are available.

Prepare air-gapped environments

If your cluster is internet-connected, skip this section. If your cluster is air-gapped, then pull the monitoring service and related Docker images to either your Docker registry or directly onto your nodes.

  1. Pull the following required Docker images onto your air-gapped environment:

    • docker.io/portworx/cortex:v1.13.1
    • docker.io/portworx/cassandra:4.0.7-debian-11-r34
    • docker.io/portworx/nginx:1.23.3-alpine-slim
    • docker.io/portworx/consul:1.14.4-debian-11-r4
    • docker.io/portworx/go-dnsmasq:release-1.0.7-v3
    • docker.io/portworx/grafana:9.1.3
    • docker.io/portworx/prometheus:v2.35.0
    • docker.io/portworx/prometheus-config-reloader:v0.56.3
    • docker.io/portworx/prometheus-operator:v0.56.3
    • docker.io/portworx/memcached-exporter:v0.10.0
    • docker.io/portworx/memcached:1.6.17-alpine
    • docker.io/portworx/px-operator:1.10.5
  2. To pull the above Docker images and push them to an internal registry, download the pxcentral-ag-install-monitor.sh air-gapped bootstrap Portworx Central install script:

    curl -o pxcentral-ag-install-monitor.sh -L "https://install.portworx.com/pxcentral-air-gapped?px-monitor=true"

    You can also download the install script for a specific release by specifying a version query. For example:

    curl -o pxcentral-ag-install-monitor.sh -L "https://install.portworx.com/pxcentral-air-gapped?version=2.7.3&px-monitor=true"
  3. Execute the below command for the install script:

    chmod +x pxcentral-ag-install-monitor.sh
  4. Pull the container images using the pxcentral-ag-install-monitor.sh script:

    ./pxcentral-ag-install-monitor.sh pull
  5. Push the images to a local registry server accessible by the air-gapped nodes. Replace <repo> with your registry location:

    ./pxcentral-ag-install-monitor.sh push <repo>

Enable the monitoring service

  1. Generate the install spec using the License Server and Monitoring spec generator. If you use Portworx to install Portworx Central, select the Use storage class checkbox under the Configuration section of the Spec Details tab. In the Storage Class Name text box, enter the name of the storage class you used to install Portworx Central.
  • Select the Monitoring on PX-Central checkbox under Select Components section. Additionally, select the SSL Enabled checkbox if Portworx is SSL enabled.

  • Select the Use custom registry checkbox under the Custom Registry section, and enter the following information:

    • Custom Registry: The hostname of your custom registry
    • Image Repository: The path to the required Docker images
    • Image Pull Secret(s) (Optional): A comma-separated list of your image pull secrets.

  1. Using Helm, add the Portworx Enterprise repository to your cluster and update it.

    helm repo add <repo-name> portworx http://charts.portworx.io/ && helm repo update
  2. Enable the monitoring service using either the --set flag or the values.yaml file provided in the Step 2 section of the Complete tab of the spec generator.