Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

This feature is only available on Kubernetes installations.

Table of Contents
minLevel1
maxLevel7

This feature is only available on Kubernetes

Kfuse Knight collects and aggregates dynamic data on nodes, using eBPF. It runs as a daemonset on a Kubernetes cluster. It can automatically trace protocol-specific network traffic to/from the containers to generate RED metrics. By default, http protocol tracing is enabled. Please contact us, for enabling collection of other protocols.

The RED metrics are exposed as a Prometheus metrics endpoint from the Kfuse Knight pod and can be discovered/scraped by Prometheus and/or Datadog agent.

Install Instructions

Code Block
# Create a namespace.
kubectl create namespace kfuse-knight

# Get the container registry key from kloudfuse <token>.json -- (uploaded to the page)

# Make sure to create a k8s secret to use this registry access token which helm will use to upgrade/install
kubectl
config# set-context --current --namespace=kfuse-knight

# On ubuntuOn ubuntu (execute lines 9 through 13)
cat token.json | docker login -u _json_key  --password-stdin https://us-east-east11-docker.pkg.dev
kubectl create secret docker-registry kfuse-image-pull-credentials \
        --namespace='kfuse-knight' --docker-server 'us.gcr.io' --docker-username _json_key \
        --docker-email 'container-registry@mvp-demo-301906.iam.gserviceaccount.com' \
        --docker-password=''"$(cat token.json)"''

# On windows (execute lines 16 through 18)
type token.json | helm registry login -u _json_key  --password-stdin https://us-east-east11-docker.pkg.dev

$service_json = (Get-Content token.json).replace("\n", "").replace('"', '\"')
kubectl create secret docker-registry kfuse-image-pull-credentials --namespace=kfuse-knight --docker-server 'us.gcr.io' --docker-username _json_key --docker-email 'container-registry@mvp-demo-301906.iam.gserviceaccount.com' --docker-password=""$service_json""
        
# Get the latest knight chart version
helm upgrade --install knight oci://us-east-east11-docker.pkg.dev/mvp-demo-301906/kfuse-helm/kfuse-knight --version=0.1.0-acb11f59688fac -n kfuse-knight

Customizing the metrics to emit

The Kfuse-Knight helm values can be customized to control protocols traced by knight and any information extracted and tagged into the generated metrics. The config section of the helm values contains a section of what gets extracted by default. It can be adjusted accordingly.

Code Block
config:
  http:
    metrics:
      # The tags to include/exclude when emitting logs
      # Exact field names can be specified.
      # Regex pattern can be specified.
      # If both includes and excludes are given, then a field is only included
      # if it matches an includes rule and does not match an exclude rule..
      # If a field is json formatted, then subfields can be extracted using
      # the following format: field_name$JSON$<json pointer>
      tags_include:
        - request_type
        - response_code
        - request_path
        - request_headers$JSON$/Accept
        - request_headers$JSON$/Host
      tags_exclude:

Scraping of Metrics

Since Knight exposes a prometheus endpoint , autodiscovery of prometheus endpoint using Datadog or Prometheus should work.If using Datadog, then for its collected metrics. However, it is recommended to use Datadog agent to scrape the metrics, in order to automatically enrich the collected metrics with cloud and Kubernetes labels. In addition to the the configurations specified in Collecting Data Using Datadog Agent already enables collection of Knight metrics. At the minimum, the following config is needed: Datadog Agent setup for Kubernetes, add the following configuration in the Datadog agent yaml file.

Code Block
datadog:
  kubeStateMetricsEnabled: true
  kubeStateMetricsCore:
    enabled: true
    ignoreLegacyKSMCheck: false
  prometheusScrape:
    enabled: true
    version: 1
    additionalConfigs:
      - configurations:
        - send_monotonic_counter: false
          send_distribution_counts_as_monotonic: false
          send_distribution_sums_as_monotonic: false
          send_histograms_buckets: true
          max_returned_metrics: 999999
          min_collection_interval: 15
        autodiscovery:
          kubernetes_annotations:
            exclude:
              app: knight
              prometheus.io/scrape: "false"
      - configurations:
        - send_monotonic_counter: false
          send_distribution_counts_as_monotonic: false
          send_distribution_sums_as_monotonic: false
          send_histograms_buckets: true
          max_returned_metrics: 999999
          min_collection_interval: 60
        autodiscovery:
          kubernetes_container_names:
            - knight