You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[Docker](../install-pmm/install-pmm-server/deployment-options/docker/index.md)| Quick setup, development environments | • Fast deployment<br>• Easy to manage<br>• Runs without root privileges<br>• Minimal resource overhead | • Requires Docker knowledge<br>• May need additional network configuration |
31
31
|[Podman](../install-pmm/install-pmm-server/deployment-options/podman/index.md)| Security-conscious environments | • Rootless by default<br>• Enhanced security<br>• Docker-compatible commands<br>• No daemon required | • Requires Podman installation<br>• Less common than Docker |
32
-
|[Helm](../install-pmm/install-pmm-server/deployment-options/helm/index.md)| Kubernetes environments | • Native Kubernetes deployment<br>• Scalable and orchestrated<br>• ConfigMap and Secret management<br>• Ingress controller support | • Requires Kubernetes cluster<br>• Helm knowledge needed<br>• More complex setup |
32
+
|[Helm](../install-pmm/install-pmm-server/deployment-options/helm/index.md)|Kubernetes and OpenShift environments | • Native Kubernetes deployment<br>• Scalable and orchestrated<br>• ConfigMap and Secret management<br>• Ingress controller support | • Requires Kubernetes cluster<br>• Helm knowledge needed<br>• More complex setup |
33
33
|[Virtual Appliance](../install-pmm/install-pmm-server/deployment-options/virtual/index.md)| Traditional VM environments | • Pre-configured virtual machine<br>• Works with VMware, VirtualBox<br>• No container knowledge required<br>• Isolated environment | • Larger resource footprint<br>• VM management overhead<br>• Less flexible than containers |
- Kubernetes cluster running a [supported version](https://kubernetes.io/releases/version-skew-policy/#supported-versions) and [Supported Helm](https://helm.sh/docs/topics/version_skew/) versions
11
-
-Storage driver with snapshot support (for backups)
10
+
- Kubernetes cluster running a [supported version](https://kubernetes.io/releases/version-skew-policy/#supported-versions) and [supported Helm](https://helm.sh/docs/topics/version_skew/) versions
11
+
-storage driver with snapshot support (for backups)
12
12
-`kubectl` configured to communicate with your cluster
13
13
14
-
## Storage requirements
14
+
### OpenShift-specific requirements
15
+
For OpenShift deployments, you'll also need:
16
+
17
+
- OpenShift Container Platform 4.16. Other versions will likely work but they haven't been tested
18
+
-`oc` CLI tool configured
19
+
- permissions to create Routes and manage RBAC policies
15
20
16
-
Different Kubernetes platforms offer varying capabilities:
21
+
## Storage requirements
22
+
Different Kubernetes platforms offer varying storage capabilities. When planning your deployment, consider:
17
23
18
-
- for **production use**, ensure your platform provides storage drivers supporting snapshots for backups
19
-
- for **cloud environments**, verify your provider's Kubernetes storage options and costs
20
-
- for **on-premises deployments**, confirm your storage solution is compatible with dynamic provisioning
24
+
-**for production use**, ensure your platform provides storage drivers supporting snapshots for backups
25
+
-**for cloud environments**, verify your provider's Kubernetes storage options and costs
26
+
-**for on-premises deployments**, confirm your storage solution is compatible with dynamic provisioning
27
+
-**for OpenShift**, use OpenShift Container Storage (OCS) with `ReadWriteOnce` access mode and appropriate `PersistentVolume` permissions for non-root containers
21
28
22
29
## Deployment best practices
23
30
@@ -26,12 +33,17 @@ For optimal monitoring in production environments:
26
33
27
34
1. Separate PMM Server from monitored systems by either:
28
35
29
-
- using separate Kubernetes clusters for monitoring and databases
30
-
- configuring workload separation through node configurations, affinity rules, and label selectors
36
+
- using separate Kubernetes clusters for monitoring and databases.
37
+
- configuring workload separation through node configurations, affinity rules, and label selectors.
38
+
39
+
2. Enable [High Availability](https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/ha-topology/) to ensure continuous monitoring during node failures.
31
40
32
-
2. Enable [high availability](https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/ha-topology/) to ensure continuous monitoring during node failures
41
+
3. Openshift considerations:
33
42
34
-
## Install PMM Server on your Kubernetes cluster
43
+
- use OpenShift Routes for external access instead of Kubernetes Ingress.
44
+
- define resource quotas and limits as OpenShift projects often have stricter defaults.
45
+
46
+
## Install PMM Server on your Kubernetes cluster/Openshift clusters
35
47
36
48
Create the required Kubernetes secret and deploy PMM Server using Helm:
37
49
{.power-number}
@@ -81,34 +93,79 @@ Create the required Kubernetes secret and deploy PMM Server using Helm:
81
93
percona/pmm 1.4.0 3.0.0 A Helm chart for Percona Monitoring and Managem...
82
94
percona/pmm 1.3.21 2.44.0 A Helm chart for Percona Monitoring and Managem...
83
95
```
84
-
96
+
85
97
5. Deploy PMM Server with your chosen version and secret:
86
98
87
-
```bash
88
-
# Choose a specific chart version from the list in previous step
89
-
helm install pmm \
90
-
--set secret.create=false \
91
-
--set secret.name=pmm-secret \
92
-
--version 1.4.3 \
93
-
percona/pmm
94
-
```
99
+
=== "On Kubernetes"
100
+
Use Helm to deploy PMM Server on standard Kubernetes clusters. This approach works with most Kubernetes distributions and cloud providers.
101
+
102
+
```bash
103
+
helm install pmm \
104
+
--set secret.create=false \
105
+
--set secret.name=pmm-secret \
106
+
--version 1.4.8 \
107
+
percona/pmm
108
+
```
109
+
110
+
=== "On OpenShift"
111
+
OpenShift requires additional security configurations due to its stricter security policies:
kubectl get svc monitoring-service -o jsonpath='{.spec.ports[0].nodePort}'
110
-
```
111
-
144
+
=== "On Kubernetes"
145
+
Standard Kubernetes clusters provide several options for accessing PMM Server. Choose the method that best fits your networking setup and security requirements:
146
+
147
+
```bash
148
+
# If using ClusterIP (default)
149
+
kubectl port-forward svc/pmm-service 443:443
150
+
151
+
# If using NodePort
152
+
kubectl get svc pmm-service -o jsonpath='{.spec.ports[0].nodePort}'
153
+
```
154
+
155
+
=== "On OpenShift"
156
+
OpenShift offers native routing capabilities through its Route resource, which provides external access with built-in load balancing and SSL termination:
157
+
158
+
```bash
159
+
# Create a Route to expose PMM
160
+
oc expose svc/pmm-service --port=443
161
+
162
+
# Get the Route URL
163
+
oc get route pmm-service -o jsonpath='{.spec.host}'
164
+
165
+
# Or use port-forwarding for testing
166
+
oc port-forward svc/pmm-service 443:443
167
+
```
168
+
112
169
### Configure PMM Server
113
170
114
171
#### View available parameters
@@ -122,15 +179,16 @@ Check the list of available parameters in the [PMM Helm chart documentation](htt
122
179
123
180
Configure PMM Server using either command-line arguments or a YAML file:
Copy file name to clipboardExpand all lines: documentation/docs/release-notes/3.4.0.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,7 @@ This release improves enterprise deployments and monitoring reliability, includi
20
20
Building on the existing OpenShift compatibility available for PMM Client, PMM 3.4.0 now extends full support to PMM Server as well. All PMM Docker images meet Red Hat certification requirements, including non-root user execution and SecurityContextConstraints (SCC) support. This means that you can seamlessly deploy both PMM Client and PMM Server in OpenShift environments.
21
21
22
22
While OpenShift 4.16 is fully tested and supported, other versions will likely work but not guaranteed.
23
+
23
24
To deploy PMM Server on OpenShift using the standard Percona Helm charts with platform-specific parameters, see the [Install PMM Server on your Kubernetes cluster/OpenShift clusters](../install-pmm/install-pmm-server/deployment-options/helm/index.md).
24
25
25
26
### Centralized `vmagent` settings for all clients
@@ -105,6 +106,7 @@ For detailed steps, see [Migrating PMM from VMware to alternative platforms](../
105
106
-[PMM-14208](https://perconadev.atlassian.net/browse/PMM-14208): Added support for PMM Client on Red Hat Enterprise Linux 10 (RHEL 10) for both AMD64 and ARM64 architectures.
106
107
107
108
## Fixed issues
109
+
108
110
-[PMM-14141](https://perconadev.atlassian.net/browse/PMM-14141): Fixed a critical issue where the MongoDB exporter would sometimes ignore connection timeouts. This prevented **MongoDB Down** alerts from triggering when MongoDB was unavailable. We've also improved the MongoDB down alert rule to work more reliably in timeout scenarios.
109
111
110
112
-[PMM-13885](https://perconadev.atlassian.net/browse/PMM-13885): You can now reliably enable and disable advisors on the **Advisors > Advisor Insights** page, as the toggle issue has been fixed.
0 commit comments