Monitor Kubernetes
Monitor the different components of your container infrastructure using Site24x7's Kubernetes Monitoring and get a complete picture of the health and performance of your Kubernetes clusters.
- Add a monitor
DaemonSets | Helm chart | Sidecar Container | GKE Autopilot - Edit Monitor
- Dashboards
- Business View
- Performance metrics
- Reports
- Kubernetes logs
- Security
- Licensing
- FAQs
Add a Monitor
Site24x7 supports Kubernetes monitoring in the following platforms: Azure (Azure Kubernetes Engine), AWS (Elastic Kubernetes Service) and AWS Fargate, GCP (Google Kubernetes Engine), MicroK8s, and on-premises.
- Log in to your Site24x7 account and go to Server > Kubernetes > Clusters (+) > Add Kubernetes Monitor.
- Select the platform where your Kubernetes clusters are running: Azure (AKS), Google Cloud Platform (GKE), Amazon Web Services (EKS), MicroK8s, or on-premises.
- Configure Role-based Access Control (RBAC) permissions and install Site24x7 agent as DaemonSet:
- Download the site24x7-agent.yaml file from the Add Kubernetes Monitor page in the Site24x7 web client.
- Copy the downloaded file and save it in your Azure CLI/GCP Cloud Shell/AWS control plane/MicroK8s control plane/on-premises master node terminal.
- Replace the device key that is given in the Site24x7 web client.
- If you have a proxy, refer to the below section to configure it.
- Then, execute the following command:
kubectl apply -f site24x7-agent.yaml
- Configure kube-state-metrics: Download the site24x7-kube-state-metrics.yamlfile and save it in your Azure CLI/GCP Cloud shell/AWS control plane/MicroK8s control plane/on-premises master node terminal. Execute the following command to apply the YAML.
kubectl apply -f site24x7-kube-state-metrics.yamlAlternatively, you can execute the following command to download and configure the kube-state-metrics:curl -L -o kube-state-metrics-1.9.7.zip https://github.com/kubernetes/kube-state-metrics/archive/v1.9.7.zip && unzip kube-state-metrics-1.9.7.zip && kubectl apply -f kube-state-metrics-1.9.7/examples/standardThis is an optional step. But, this file is essential to view the complete set of performance metrics for nodes, pods, containers, deployments and other features like the Health dashboard.
Ensure the site24x7-agent pods are created and in running state. Please wait a few minutes for all of your nodes, containers, pods, deployments, HPA, and ReplicaSets to be added in Site24x7's web client. Once discovery is complete, you'll be directed to the Health Dashboard.
If the set up has proxy, uncomment the following lines under env in the site24x7-agent.yaml file and update the proxy value:
value: http://192.108.100.100:1118
- name: https_proxy
value: https://192.108.100.100:1118
Method 2: Helm chart
Follow the below steps to install your Site24x7 Kubernetes Agent using Helm chart:
- Install Helm.
- Add the Site24x7 Helm Repository by executing the following commands:
helm repo add site24x7 https://site24x7.github.io/helm-charts/
helm repo update - Fetch the Device Key from Admin > Developer > Device Key.
- Deploy the agent using the following command:
If you are using Helm version: 3 or above, use the below command:
helm install <RELEASE_NAME> --set site24x7.device_key='' site24x7/site24x7agent
If you are using Helm version: 2, use the below command:
helm install --name <RELEASE_NAME> --set site24x7.device_key='' site24x7/site24x7agent
Proxy configuration: Set the proxy configuration as one of the install parameters to the Helm install command.
Sample:
Sample with proxy authentication:

Choose a RELEASE_NAME for identifying the Helm chart. Example: site24x7-agent
The Helm chart adds Site24x7 Kubernetes Agent to all the nodes in your cluster via a DaemonSet. In addition, it also deploys the kube-state-metrics as a deployment for fetching performance metrics.
Once the kube-state-metrics is deployed, Site24x7 Kubernetes Agent reports the hosts and the metrics data in your account.
Configure role-based Access Control (RBAC) permissions and deploy the Site24x7 Server Monitoring agent as a Sidecar Container to your Application Container:
- Download the Site24x7 Sidecar YAML file.
- Save it in your cloud shell or master node's terminal.
- Open the downloaded YAML file and replace the application's image and name with your application container and enter your device key.
Your device key can be seen at Admin > Developer > Device Key.
- Copy and execute the below command to execute the YAML file:
kubectl apply -f site24x7-sidecar-agent.yaml
If the set up has proxy, uncomment the following lines under env in the Site24x7 agent YAML file and update your proxy values:
Name: http_proxy
Value:
Name: https_proxy
Value:
Enable kube-state-metrics for monitoring advanced Kubernetes metrics. To configure kube-state-metrics:
- Download the Site24x7 kube-state metrics YAML file.
- Save it in your Cloud Shell or master node's Terminal.
- Execute the below command to apply the YAML.
kubectl apply -f site24x7-kube-state-metrics.yaml

- This deployment will discover your overall Kubernetes infrastructure.
- Since the agent is running as a side-car container, performance metrics of the nodes, pods, and containers will only be subjected to that pod.
- If you wish to monitor the performance of each pod then run an agent in each pod.
Configure role-based Access Control (RBAC) permissions in the cluster and install the Site24x7 agent as DaemonSet in GKE Autopilot.
- Download the Site24x7 GKE Autopilot YAML file.
- Save it in your cloud shell.
- Open the downloaded YAML file and replace the Device key with your Device key.
- Copy and execute the below command to apply the YAML.
kubectl apply -f site24x7-gke-autopilot-agent.yaml
If the set up has proxy, uncomment the following lines under env in the Site24x7 Agent YAML file and update the proxy value.
Name: http_proxy
Value: <http_proxy_value>
Name: https_proxy
Value: <https_proxy_value>
Edit Monitor
You can choose to modify configurations for your Kubernetes cluster in the Edit Kubernetes Monitor page.
- In the Site24x7 web client, go to Server > Kubernetes > click on a cluster > Cluster Details.
- Hover on the hamburger icon beside the display name. Click Edit.
- Choose to edit the Display Name, association with Monitor Groups, Tags, IT Automation Templates, choose the Resource Type, Exclude/include Namespaces, Exclude/include Names, Exclude/include Labels, select Name Filter for Resource Type, exclude/include HPA, select/deselect Resource Groups, and edit Configuration Profiles.
- Under Resource Termination Settings, mute alerts when resources are terminated using the Mute Resource Termination Alerts option and remove terminated resources using the Automatically Remove Terminated Resources toggle. You can also specify how long (in days) the terminated resources should be retained in the Site24x7 web console before permanent deletion.
- Save your changes.
Dashboards
The Cluster dashboard in Site24x7 lets you get a centralized view of all your Clusters, Nodes, Pods, Services, DaemonSets, Deployments, ReplicaSets, and Jobs of your entire Kubernetes cluster.
There are two more exclusive dashboards for Kubernetes:
Site24x7 also offers dashboards to view metrics at different levels such as Nodes, Pods, Containers, and more. Learn more about Site24x7's various Kubernetes dashboards.
Business View
Once a Kubernetes monitor is added, a business view is created for your entire cluster. Toggle between Infrastructure View and Service View to spot outliers and detect unusual monitoring patterns in Kubernetes cluster. Learn more.
Infrastructure View:
This view shows your entire Kubernetes cluster from a node point of view(i.e., data of the Kubernetes cluster, nodes, pods, and containers).
Service View:
This view shows your entire Kubernetes cluster from a service point of view (i.e., data of the Kubernetes cluster, service, pods, and containers).
Performance Metrics
For every component discovered and monitored in Site24x7, find the list of various performance metrics we provide to ensure continued functioning of your Kubernetes cluster.
Reports
In the Site24x7 web client, go to Reports > Kubernetes. The following reports are available for Kubernetes monitor:
- Summary Report
- Availability Summary Report
- Busy Hours Report
- Health Trend Report
- Performance Report
Kubernetes Logs
You can collect and monitor the following logs in the Kubernetes environment via the Server monitoring agent running on your Kubernetes nodes:
Security
The Site24x7 agent collects the configuration data and basic performance data using the Kubernetes API. The API version used is apps/v1. The Site24x7 agent accesses the APIs using RBAC authorization. As a part for RBAC authorization, the following objects with the below mentioned permissions are created while applying the site24x7-agent.yaml file:
- ServiceAccount named 'site24x7' under 'default' namespace.
- ClusterRole named 'site24x7' which includes only 'list' & 'watch' permissions to the APIs for nodes, pods etc.
- ClusterRoleBinding named 'site24x7'.
Once the site24x7-agent.yaml file is applied, the RBAC authorization token is created and automatically mounted into the Site24x7 agent containers created via Daemonset. Using this token, the agent hits the APIs to collect data.
DaemonSet Configurations for the Site24x7 agent:
Once the site24x7-agent.yaml file is applied, a DaemonSet named site24x7-agent is created. RollingUpdate strategy is used for DaemonSet.
- Pods are created with the same name site24x7-agent.
- The containers with 'store/site24x7/docker-agent:<version>' image are created.
ImagePullPolicy is set to 'Always'. - These volumes are mounted inside the containers: /etc/, /var/, /proc/, and /var/run/docker.sock
Collection of performance metrics:
kube-state-metrics is used to collect in-depth performance data. This is enabled only when kube-state-metrics.yaml file is applied. Performance data will be collected by hitting the API:
<KUBE_STATE_IP> -> kube state pod ip
<KUBE_STATE_PORT> -> 8080 by default

Access for Site24x7 agent:
The Site24x7 agent will have only List or Watch permissions for the Kubernetes APIs, as specified in the site24x7-agent.yaml file. The agent can only read Kubernetes objects data via the Kubernetes APIs and no write operations can be performed. The agent cannot create or update any Kubernetes objects. Data is collected by the agent only via authorized methods recommended by Kubernetes.
Licensing
The main Kubernetes cluster is a basic monitor. For more information, read this article.
You can view the number of licenses consumed by your Kubernetes cluster by clicking Server > Kubernetes > Cluster. The total number of licenses consumed by that particular cluster will be listed under the License Usage column. Click the number to view a drilled-down view of the consumed licenses.
FAQs
- Possible reasons why Kubernetes monitor is not added to Site24x7
- How to verify if the Site24x7 pods are created or are in running state?
- How to disable auto discovery of containers for Kubernetes clusters?
- How to access agent pod and share logs for troubleshooting?
- What will happen if I have an agent installed in a node and try to install the agent again as a pod?
- Will Kubernetes be discovered using the Discover Applications option?
- Is the path 'store/site24x7/docker-agent:<version>' used to create site24x7-agent a local registry or a public registry?