Configure the PKS adapter to monitor the Kubernetes clusters created using PKS. The Kubernetes adapter instance is automatically created once you configure the PKS adapter. If you are deploying the Kubernetes cluster through PKS, do not configure the Kubernetes adapter instance.
- Verify that you have installed vRealize Operations Management Pack for Container Monitoring.
- Verify that the PKS API Hostname (FQDN) is accessible and resolvable.
Verify that the Kubernetes Clusters available in the PKS Environment have the cAdvior DaemonSet configured on port 31194.
- You must have the pks.cluster.admin role assigned to you to use the LDAP credentials.
- From the main menu of vRealize Operations Manager, click Administration, and then in the left pane, click Solutions.
- From the Solutions list, select VMware vRealize Operations Management Pack for Container Monitoring.
- Click the Configure icon to edit an object.
- Select PKS Adapter from the Adapter list and configure the adapter instance.
Field Name Action
Enter the display name of the adapter.
(Optional) Enter a description for the instance.
PKS API Hostname (FQDN)
Enter the API URL for the PKS instance.
PKS Instance Alias
Enter the alias name for the adapter instance.
Select the credential you want to use to sign on to the environment from the drop-down menu. To add new credentials, click the plus sign.
Provide proxy details in the following fields if accessing the PKS API requires proxy authentication.
Credential Name. The name by which you are identifying the configured credentials.
- PKS Username. The user name to access the PKS API.
- PKS UAA Management Admin Client's secret. The PKS UAA Management Admin client secret.
The User Account and Authention or Lightweight Directory Access Protocol credentials is used to communicate with the PKS UAA server to obtain authentication token and to configure the Kubernetes adapter instance with the authentication model using the bearer token.
- Proxy HostName
- Proxy Port
- Proxy Username
- Proxy Password
Note: The LDAP credentials are required only if OpenID Connect authentication service is enabled in PKS.
- UAA/LDAP Username
- UAA/LDAP Password
Click Test Connection to validate the connection.
Use Advance Setting to define the following:
- Collectors/Groups. Select the collector or collector group on which you want to run the adapter instance.
This option is set to the optimal collector by default.
- Auto Configure Kubernetes Adapter Instance. Select the Enabled option to discover the Kubernetes cluster in a PKS instance and create Kubernetes adapter instances automatically. Select the Disabled option to manually create the Kubernetes adapter instance.
- Auto-accept Kubernetes Cluster SSL Certificate. Select the Enabled option to accept the untrusted certificates presented by the K8s adapter instances by default. Select the Disabled option to manually accept the untrusted certificates for the auto-configured K8s adapter instances.
- Click Save Settings.
Note: By default, the PKS Adapter instance auto-discovers the Kubernetes clusters available in the PKS Environment. It creates an appropriate Kubernetes Cluster Resource and a Kubernetes Adapter instance against each cluster.