Dynatrace obtains information about Kubernetes entities and metadata by querying the Kubernetes API. This information is used for out-of-the-box alerting for Kubernetes and to provide all observability signals in a proper Kubernetes context within the Dynatrace platform, for example, by creating relationships among applications, (micro-)services, databases, and Kubernetes entities such as pods, namespaces, and nodes.
Dynatrace Operator manages the lifecycle of all Dynatrace components within a Kubernetes cluster and can be configured by deploying a DynaKube Custom Resource. Dynatrace ActiveGate—the Dynatrace component required to monitor the Kubernetes API—offers a capability for Kubernetes API Monitoring.
Follow the steps below to enable Kubernetes API monitoring.
Install Dynatrace Operator in any deployment mode
Configure the ActiveGate values of the DynaKube according to the list of parameters and add kubernetes-monitoring
to the ActiveGate capabilities.
...activeGate:capabilities:- routing- kubernetes-monitoring...
You have two options:
See below for instructions for both options.
You can enable monitoring by connecting a containerized ActiveGate to a local Kubernetes API endpoint.
There are two ways to connect to the local Kubernetes API endpoint:
See below for details on both methods.
To connect to the public Kubernetes API, follow the instructions that apply to your Kubernetes version:
Get the Kubernetes API URL.
If you set enableIstio
to true
in the DynaKube custom resource, use the command below to get the Kubernetes API URL:
Create a file named token-secret.yaml
with the following content:
apiVersion: v1kind: Secretmetadata:name: dynatrace-kubernetes-monitoringannotations:kubernetes.io/service-account.name: "dynatrace-kubernetes-monitoring"type: kubernetes.io/service-account-token
Apply the file to create the dynatrace-kubernetes-monitoring
secret.
Get the bearer token.
Go to Kubernetes or Kubernetes Classic (latest Dynatrace) and select Connect manually.
On the Kubernetes cluster connection settings page, provide a Name, the Kubernetes API URL, and the Bearer token for the Kubernetes cluster.
Select Save changes.
Get the Kubernetes API URL.
If you set enableIstio
to true
in the DynaKube custom resource, use the command below to get the Kubernetes API URL:
Get the bearer token.
For Rancher distributions of Kubernetes, you need to use the bearer token and API URL of the Rancher server, because this server manages and secures traffic to the Kubernetes API server. Follow the steps below.
Get the Kubernetes API URL.
kubectl config view --minify -o jsonpath='{.clusters[0].cluster.server}'
Configure a user.
In the Rancher web UI, either create a new user or use an existing user to associate with the token. We recommend creating a new user.
Set permissions.
Make sure the user has either Owner or Custom permissions to the cluster you want to monitor.
Recommended: select Custom permissions, and be sure to select these two roles: View all Projects and View Nodes.
Create an API key.
Go to API & Keys and create a key either for your specific account (enter your cluster name) or for all clusters (enter No scope). For security reasons, we recommend selecting the first option.
Newly created keys display four fields. Make sure to use the content of the field called Bearer token to set up the connection to the Kubernetes API described in the next section.
Go to Kubernetes or Kubernetes Classic (latest Dynatrace) and select Connect manually.
On the Kubernetes cluster connection settings page, provide a Name, the Kubernetes API URL, and the Bearer token for the Kubernetes cluster.
For Rancher distributions, you need the bearer token that was created in the Rancher web UI, as described in Special instructions for Rancher distributions to get the API URL and the bearer token above.
Select Save changes.
Dynatrace recommends to use the containerized ActiveGate for Kubernetes API monitoring
You can change Kubernetes cluster connection and monitoring settings at any time from your Kubernetes cluster details page.
To delete the connection to a local Kubernetes API endpoint
ActiveGate is updated automatically on pod restart whenever there is a new version available, unless the image version is specified in cr.yaml
.