tencent cloud

Tencent Cloud Observability Platform

Release Notes and Announcements
Release Notes
Product Introduction
Overview
Strengths
Basic Features
Basic Concepts
Use Cases
Use Limits
Purchase Guide
Tencent Cloud Product Monitoring
Application Performance Management
Mobile App Performance Monitoring
Real User Monitoring
Cloud Automated Testing
Prometheus Monitoring
Grafana
EventBridge
PTS
Quick Start
Monitoring Overview
Instance Group
Tencent Cloud Product Monitoring
Application Performance Management
Real User Monitoring
Cloud Automated Testing
Performance Testing Service
Prometheus Getting Started
Grafana
Dashboard Creation
EventBridge
Alarm Service
Cloud Product Monitoring
Tencent Cloud Service Metrics
Operation Guide
CVM Agents
Cloud Product Monitoring Integration with Grafana
Troubleshooting
Practical Tutorial
Application Performance Management
Product Introduction
Access Guide
Operation Guide
Practical Tutorial
Parameter Information
FAQs
Mobile App Performance Monitoring
Overview
Operation Guide
Access Guide
Practical Tutorial
Tencent Cloud Real User Monitoring
Product Introduction
Operation Guide
Connection Guide
FAQs
Cloud Automated Testing
Product Introduction
Operation Guide
FAQs
Performance Testing Service
Overview
Operation Guide
Practice Tutorial
JavaScript API List
FAQs
Prometheus Monitoring
Product Introduction
Access Guide
Operation Guide
Practical Tutorial
Terraform
FAQs
Grafana
Product Introduction
Operation Guide
Guide on Grafana Common Features
FAQs
Dashboard
Overview
Operation Guide
Alarm Management
Console Operation Guide
Troubleshooting
FAQs
EventBridge
Product Introduction
Operation Guide
Practical Tutorial
FAQs
Report Management
FAQs
General
Alarm Service
Concepts
Monitoring Charts
CVM Agents
Dynamic Alarm Threshold
CM Connection to Grafana
Documentation Guide
Related Agreements
Application Performance Management Service Level Agreement
APM Privacy Policy
APM Data Processing And Security Agreement
RUM Service Level Agreement
Mobile Performance Monitoring Service Level Agreement
Cloud Automated Testing Service Level Agreement
Prometheus Service Level Agreement
TCMG Service Level Agreements
PTS Service Level Agreement
PTS Use Limits
Cloud Monitor Service Level Agreement
API Documentation
History
Introduction
API Category
Making API Requests
Monitoring Data Query APIs
Alarm APIs
Legacy Alert APIs
Notification Template APIs
TMP APIs
Grafana Service APIs
Event Center APIs
TencentCloud Managed Service for Prometheus APIs
Monitoring APIs
Data Types
Error Codes
Glossary

Integration with TKE Cluster

PDF
Mode fokus
Ukuran font
Terakhir diperbarui: 2024-08-07 22:08:34

What should I do if I can't access the TKE cluster over the private network?

When installing an agent, you need to access TKE over the private network. If private network access is not enabled for the corresponding TKE cluster, the installation will fail. You can solve this problem by following the steps below:
1. Log in to the TKE console and select a container cluster in the corresponding region.
2. Enable Private Network Access under Basic Information > Cluster APIServer Information.

What should I do if the status of all kube-proxy collection targets is "Down"?

In TKE, the launch parameter --metrics-bind-address is not specified for kube-proxy, and the default listening address of the metrics service is 127.0.0.1; therefore, the agent cannot pull metrics by Pod IP. You can solve this problem by following the steps below:
1. Log in to the TKE console and select a container cluster in the corresponding region.
2. Go to Basic Information > Cluster APIServer Information > Connecting to Kubernetes cluster through Kubectl to configure Kubectl as instructed.
3. Run kubectl edit ds kube-proxy -n kube-system and add the launch parameter --metrics-bind-address=0.0.0.0 in spec.template.spec.containers.args.

What should I do if the status of all component collection targets on the master node in a dedicated TKE cluster is "Down"?

The inbound rule of the default security group of the master node in a dedicated TKE cluster does not allow access to the metrics ports of some components. You can solve this problem by following the steps below:
1. Log in to the Security Group console and select the corresponding region.
2. Enter tke-master-security-for-<tke cluster id> in the security group search box. For example, if the cluster ID is cls-xxx, then enter tke-master-security-for-cls-xxx.
3. Click the returned security group ID to enter the Edit Inbound Rule window.
4. The protocol port column of the rule to be edited should include TCP:60001,60002. Select the rules one by one and add ports 10249, 10252, 10251, 9100, and 9153 for the following purposes respectively:
10249: kube-proxy metrics port
10252: kube-controller-manager metrics port
10251: kube-scheduler metrics port
9100: node-exporter metrics port
9153: core-dns metrics port

Bantuan dan Dukungan

Apakah halaman ini membantu?

masukan