Prepare your Environment
Before installing a Hybrid Deployment, prepare your environment by ensuring secure and seamless communication between the Virtual Appliance and your On-Premises Controller. Collect and copy all required artifacts including certificates and keys for the Ingress Controller, Splunk AppDynamics オンプレミス Controller, and Database as described in the following sections.
This enables the Virtual Appliance to securely connect, authenticate, and establish encrypted communication channels with the Splunk AppDynamics オンプレミス Controller for reliable operation.
Create a Three-Node Cluster
Configure DNS Entries
Verify DNS resolution for the Splunk AppDynamics components. The following script helps to identify common network configuration issues that might cause communication issues in Virtual Appliance. It checks if specific host names can be resolved to IP addresses, which is crucial for the proper functioning of the Controller and its services.
globals.yaml.gotmpl contains the primary node IP address of Virtual Appliance. Edit the globals.yaml.gotmpl file as follows:Log into the console of the primary node.
- Navigate to the following folder:
cd /var/appd/config - Edit the
globals.yaml.gotmplfile and updatednsNamesanddnsDomain.vi globals.yaml.gotmplList the Ingress domain names that you require to configure for the Virtual Appliance.
Note:- Include local host for
appdclito access the cluster. If the domain names are unavailable, specify<nodeip>.nip.iofor each cluster. You must also include thednsDomainas a value, in addition to other specified values. - Some network policies might block the IP address that contains
x.x.x.x.nip.io. In such scenarios, update the/etc/hostsfile. See, Update DNS Configuration for an Air-Gapped Environment. - If you are using domain names for your Virtual Appliance, comment or delete the
range splitfunction. And, comment thelocalhost.
dnsNames: &dnsNames # - localhost - 10.0.0.1.nip.io - 10.0.0.2.nip.io - 10.0.0.3.nip.io - appd.example.com # If you are using Virtual IP address for your standalone Controller, comment or delete the range split function. {{ range split " " $internalIPs }} {{ printf " - %s.%s" . "nip.io" }} {{ end }} - Include local host for
Enable Self-Monitoring Capabilities
enableClusterAgent parameter to true in the global.yaml.gotmpl file.By default, this parameter is set to true. This setting helps you monitor the CPU, Memory, and Network usage of your cluster nodes. See View Container Details
false.enableClusterAgent: false(Optional) Configure Ingress Certificates
By default, the Ingress controller is installed with a fully-configured self-signed certificate. You may skip this step if the self-signed certificate provided by the Ingress controller meets your requirements.
If you require a CA signed certificate for the Ingress Controller, configure an SSL/TLS certificate for Splunk AppDynamics 自己ホスト型仮想アプライアンス by providing all the required host names. This ensures that all components and user access points of the Virtual Appliance are securely accessible. The following script generates a list of Subject Alternative Names (SANs) that would be required for a custom ingress certificate in Virtual Appliance. This is crucial for securing communication with the Virtual Appliance using HTTPS.
- private key:
private.key - signed public key:
cert.crt - CA root chain:
ca.crt
- Ensure the
ingess.keyis in PEM plain text format. - The SAN of the server certificate in
ingress.crtmust include all the hostnames that are defined in thednsNamessection of theglobal.yaml.gotmplfile. - For Secure Application, ensure to include
*.<DOMAIN-NAME>in the list and the certificates to include SAN aliases
Update the Standalone Controller TLS Certificate
Collect Certificates and Keys for Virtual Appliance
Controller: Go to the location where you have exported the certificate files. For example, <AppD Home>/controller/appserver/jetty/etc/
scp hybrid-controller-ca.crt appduser@<node-IP-address>:/var/appd/config/hybrid-controller-ca.crtNote: Use thehybrid-controller-ca.crtcertificate for HTTPS connections.MySQL Database: Go to the database location. For example, <AppD Home>/controller/db/data.
scp ca.pem appduser@<node-IP-address>:/var/appd/config/hybrid-mysql-ca.crt(Optional) Kafka: When you generate the CA certificates for Kafka, ensure to specify the Kafka IP addresses. These IP addresses are the same node IP addresses.
Copy a Kafka key to the Virtual Appliance.
scp <kafka.key> appduser@<node-IP-address>:/var/appd/config/hybrid-kafka.keyCopy a Kafka certificate to the Virtual Appliance.
scp <kafka.crt> appduser@<node-IP-address>:/var/appd/config/hybrid-kafka.crt
Complete the following steps to prepare the environment: