Using BMC Helix Monitor Agent to collect data
BMC Helix Monitor Agent is a light-weight containerized collector that is pre-configured and is ready to be deployed. It has the following advantages:
- No Agent configurations are required after deployment.
- Knowledge modules (KMs) are already deployed within the container.
BMC provides you the following options in BMC Helix Monitor Agent:
- BMC Helix Monitor Agent-Containerized.
Monitor multiple environments by using the same Agent - Kubernetes multi-node deployment
Monitor Kubernetes clusters - OpenShift multi-node deployment
Monitor OpenShift clusters
BMC Helix Monitor Agent-Containerized
You can monitor the following knowledge modules by using BMC Helix Monitor Agent-Containerized:
Kubernetes multi-node deployment
This mode focuses on monitoring Kubernetes clusters and is bundled with only PATROL for Kubernetes 22.4.02 and PATROL for Linux 22.4.11. When you deploy this option of BMC Helix Monitor Agent to a Kubernetes cluster, a BMC Helix Monitor Agent container is deployed on each node of the cluster. It facilitates metrics collection from each node and associated pods.
System requirements
OpenShift multi-node deployment
This mode focuses on monitoring OpenShift clusters and is bundled with only PATROL for OpenShift 24.2.00 and PATROL for Linux 22.4.11. When you deploy this option of BMC Helix Monitor Agent to a OpenShift cluster, a BMC Helix Monitor Agent container is deployed on each node of the cluster. It facilitates metrics collection from each node and associated pods.
System requirements
Docker registry requirements
Direct access to BMC's Docker Trusted Repository (DTR) at https://containers.bmc.com is available. You can also use Local Harbor 2.1 or later synchronized with BMC's Docker Trusted Repository.
For information about installing a local Harbor repository synchronized with the BMC DTR, see Setting-up-a-Harbor-repository.
To use Helix Monitor Agent
- Download the BMC Helix Monitor Agent chart and container images.
- Deploy BMC Helix Monitor Agent.
- Verify the BMC Helix Monitor Agent deployment.
The following sections explain the steps in detail.
Downloading the BMC Helix Monitor Agent chart and container images
Log in to EPD by using your Support user ID and password. You might also be prompted to complete the Export Compliance Form. If you are accessing this site for the first time, create a new EPD profile to specify the languages and platforms that you want to download. For assistance with EPD, see EPD site help.
- Download the helix-monitor-agent-24.2.00.tar helm chart to a temporary directory.
- Download the container-token.bmc file that contains the Docker token.
Download link for the installation file
Contains of the downloaded file
Container images
BMC containers images are distributed from https://containers.bmc.com. You can access the containers for the licensed products by using your registered support account and a new password. This password is saved in a file which is downloaded with this PDF file. The password is shared among all the containerized BMC software that you have access to.
Check your downloads directory for the container-token.bmc file that contains your generated password. For step-by-step instructions on how to use this password to obtain the BMC container images, see Setting-up-a-Harbor-repository.
Deploying BMC Helix Monitor Agent
- Copy the downloaded helix-monitor-agent-24.2.00.tar file to the controller or bastion machine from where the Kubernetes and OpenShift cluster is accessible.
- Extract the tar file.
Create image pull secret by using one of the following commands:
For Kubernetes:
kubectl create secret docker-registry <image pull secret name> --docker-server=containers.bmc.com --docker-username=<docker registry user name> --docker-password=<docker registry password> --docker-email=<docker registry email>For OpenShift:
oc create secret docker-registry <image pull secret name> --docker-server=containers.bmc.com --docker-username=<docker registry user name> --docker-password=<docker registry password> --docker-email=<docker registry email>
There are three (3) helm charts available in the downloaded file. Extract the required file from the downloaded files by running the following command:
tar -zxf <filename>The default yaml file is helix-monitor-agent/values.yaml. You must replace all values starting and ending with __. Also, replace image pull secret name with the newly created secret name.
Open the values.yaml file in a text editor and edit the following details:
Yaml parameters
Configuration
Details
registryhost
The docker registry host containing the Helix Monitor Agent. The default value is containers.bmc.com.
namespace
Specify the namespace where you want to deploy the Helix Monitor Agent container.
imagePullSecrets
Secret to authenticate with a container registry to pull an image. For more information, see Pull an Image from a Private Registry.
name
The name of Secrets. Replace image pull secret name with the newly created secret name.
enabled
Set it true when you want to enable imagePullSecrets.
Image
repository
The location on the registry where the container image exists. Modify the parameter if you are using a local repository.
pullPolicy
Image pull policy for pod.
Options available:
- Always
- IfNotPresent
- Never
tag (Optional)
Container image tag. Modify the parameter only if you have created custom tags on containers.
Service
name
The Kubernetes or OpenShift deployment name. This name must be unique in a namespace.
ports (Optional)
The port used by PATROL Agent.
API Key
- In BMC Helix Operations Management, navigate to Administration > Repository.
Click Copy API key and paste it in the values.yaml file.
If you have configured a rotation interval for the API key in BMC Helix Portal, make sure that you use the latest API key each time the key rotates. For instructions about configuring a rotation interval, see Using API keys for external integrations.
BHOM tenant URL
Enter https:< BMC Helix Operations Management tenant URL>:443.
For example, https:example-hostname.bmc.com:443 .Certificate
Publishhostname
The hostname by which PATROL Agent is displayed in BMC Helix Operation Management. There should not be any other existing Agent with the same host name.
Tags (Optional)
Tags with which PATROL Agent identifies in the server.
maxlogsize (optional)
The maximum amount of ephemeral storage container consumes on Kubernetes or OpenShift for the logs folder.
Resources (Optional)
Limits (CPU, memory)
The upper limit of CPU and memory resources allotted for the container. For more information, see Resource Management.
Requests (CPU, memory)
The minimum CPU and memory resources allotted for the container. For more information, see Resource Management.
Forward Proxy configuration
If you have configured forward proxy server, enter the username, password, and the forward proxy URL.
Multi-node specific Kubernetes or OpenShift variable
enableNodeDeployment
Set the variable to true.
enableNodeFileSystemMonitoring
Set the variable to true.
enableNodeNetworkMonitoring
Set the variable to true.
Tags
Tags with which PATROL Agent identifies in the server. (Use tag name in agent selection criteria while creating monitor policy)
BMC_VE3_KM_INCLUDE_CLUSTER_NAME
1 => include cluster name and project name (Default)
2 => include only cluster name
0 => not include cluster nameBMC_VE3_KM_ENVIRONMENT_NAME
BMC_VE3_KM_CLUSTER_NAMEWhen configuring a monitoring policy for multiple clusters, set the following variables if you don’t want to use values mentioned in monitoring policy. For example:
BMC_VE3_KM_ENVIRONMENT_NAME: "bmc-env"
BMC_VE3_KM_CLUSTER_NAME: "bmc-cluster"
You have the option to either leave both values empty, which represents the default setting, or to specify both values. Using only one of these values is not allowed.Run the following command:
helm3 install -f <override values yaml file path> <helm deplyoment name> <container file name>For example, helm3 install -f helix-monitor-agent/values.yaml k8s-agent helix-monitor-agent-24.2.00.tgz
Verifying the deployment
Run the following command to check the helm chart deployment status:
helm3 list- In BMC Helix Operations Management, navigate to Configuration > Agents.
- Search for BMC Helix Monitor Agent by entering its name in the search box.
For a BMC Helix Monitor Agent, the version ends with letter c.
To uninstall BMC Helix Monitor Agent
- Run the following command:
helm3 uninstall <deployment name>
To verify the uninstallation, run the following command:
helm3 list
FAQs