Infrastructure Integration

Configuration

Overview

Netsil AOC uses infrastructure tags to arbitrarily group VM instances and containers. Using tags, you can customize topology maps (to show services, applications, regions and so on), and slice-and-dice metrics and events using analytics queries. Proper tagging regimen can vastly speed up incidence response and help define meaningful alerts. You may specify tags as comma-separated singletons, key-value pairs, or both.

Assign Infrastructure Tags via Environment Variable

The tags configuration can be provided during installation. Just add the TAGS environment variable along with other environment variables during installation

Example:

    TAGS="tag1,tag_key2:tag_value2"

These can be provided as environment variables to the single line install command: install-netsil-collectors.sh right next to NETSIL_SP_HOST in the example below:

wget --no-check-certificate --header="userport: ${port}" \
     -O /usr/bin/install-netsil-collectors.sh ${host}/install_netsil_collectors \
     && chmod +x /usr/bin/install-netsil-collectors.sh \
     && TAGS=tag1,tag_key2:tag_value2 && NETSIL_SP_HOST=${your_netsil_ip} NETSIL_ORGANIZATION_ID=${organizationId} SAMPLINGRATE=100 /usr/bin/install-netsil-collectors.sh \
     && /etc/init.d/netsil-collectors restart

If using Docker, the TAGS environment variable can be provided to the Docker runtime.

Assign Infrastructure Tags via Config File

Configure tags post-installation by editing /etc/netsil-collectors/tags.yaml

Example:

--- # define instance tags here
- tag
- tag_key:tag_value

To apply the changes in /etc/netsil-collectors/tags.yaml, make sure to restart the metadata-collector service:

/opt/netsil/collectors/bin/supervisorctl -c /etc/netsil-collectors/supervisord.conf restart metadata-collector

AWS EC2 Instance Tags Collection

The collectors can automatically collect the AWS EC2 instance tags of the instances they are running on.

To enable AWS EC2 instance tags capture, first create an IAM role for your instance using the documentation here.

For the policy section, specify the permissions:

ec2:Describe*, ec2:Get*

Containerized Environments

Netsil AOC automatically collects tags from these environments:

  • Docker
  • Kubernetes
  • AWS ECS
  • Google Compute Engine