Esta página aún no está disponible en español. Estamos trabajando en su traducción. Si tienes alguna pregunta o comentario sobre nuestro actual proyecto de traducción, no dudes en ponerte en contacto con nosotros.
Overview
Join the Preview!
Datadog CloudPrem is in Preview.
This document walks you through the process of installing CloudPrem on Azure AKS.
Prerequisites
Before getting started with CloudPrem, ensure you have:
Before installing CloudPrem on AKS, ensure your Azure environment is properly configured. For detailed Azure configuration instructions, see the Azure Configuration guide.
Store the PostgreSQL database connection string as a Kubernetes secret:
To retrieve your PostgreSQL connection details, go the Azure Portal, navigate to All resources, then click on your Azure Database for PostgreSQL flexible server instance. Finally, in the Getting started tab, click on the View connection strings link in the Connect card.
Create a datadog-values.yaml file to override the default values with your custom configuration. This is where you define environment-specific settings such as the image tag, Azure tenant ID, service account, ingress setup, resource requests and limits, and more.
Any parameters not explicitly overridden in datadog-values.yaml fall back to the defaults defined in the chart’s values.yaml.
# Show default values helm show values datadog/cloudprem
Here is an example of a datadog-values.yaml file with overrides for Azure:
datadog-values.yaml
azure:tenantId:<TENANT_ID># requiredclientId:<CLIENT_ID># required when using AD App to authenticate with Blob StorageclientSecretRef:name:<SECRET_NAME>key:<SECRET_KEY>storageAccount:name:<STORAGE_ACCOUNT_NAME># required# If you are using a storage account access key to authenticate with Blob Storage,# comment out the `clientSecretRef` section above,# and uncomment the `storageAccount` section below:# accessKeySecretRef:# name: <SECRET_NAME># key: <SECRET_KEY># Service account configuration# If `serviceAccount.create` is set to `true`, a service account is created with the specified name.# Additional annotations can be added using serviceAccount.extraAnnotations.serviceAccount:create:truename:cloudprem# CloudPrem node configurationconfig:# The root URI where index data is stored. This should be an Azure path.# All indexes created in CloudPrem are stored under this location.default_index_root_uri:azure://<CONTAINER_NAME>/indexes# Ingress configuration# The chart supports two ingress configurations:# 1. A public ingress for external access through the internet that will be used exclusively by Datadog's control plane and query service.# 2. An internal ingress for access within the VPC## Both ingresses provision a Network Load Balancers (NLBs) in Azure# The public ingress NLB is created in public subnets and has a public IP.# The internal ingress NLB is created in private subnets.## Additional annotations can be added to customize the ALB behavior.ingress:# The public ingress is configured to only accept TLS traffic and requires mutual TLS (mTLS) authentication.# Datadog's control plane and query service authenticate themselves using client certificates,# ensuring that only authorized Datadog services can access CloudPrem nodes through the public ingress.public:enabled:trueingressClassName:nginx-publichost:cloudprem.acme.corpextraAnnotations:{}# The internal ingress is used by Datadog Agents and other collectors running outside# the Kubernetes cluster to send their logs to CloudPrem.internal:enabled:trueingressClassName:nginx-internalhost:cloudprem.acme.internalextraAnnotations:{}# Metastore configuration# The metastore is responsible for storing and managing index metadata.# It requires a PostgreSQL database connection string to be provided by a Kubernetes secret.# The secret should contain a key named `QW_METASTORE_URI` with a value in the format:# postgresql://<username>:<password>@<host>:<port>/<database>## The metastore connection string is mounted into the pods using extraEnvFrom to reference the secret.metastore:extraEnvFrom:- secretRef:name:metastore-uri# Indexer configuration# The indexer is responsible for processing and indexing incoming data it receives data from various sources (for example, Datadog Agents, log collectors)# and transforms it into searchable files called "splits" stored in S3.## The indexer is horizontally scalable - you can increase `replicaCount` to handle higher indexing throughput.# Resource requests and limits should be tuned based on your indexing workload.## The default values are suitable for moderate indexing loads of up to 20 MB/s per indexer pod.indexer:replicaCount:2resources:requests:cpu:"4"memory:"8Gi"limits:cpu:"4"memory:"8Gi"# Searcher configuration# The searcher is responsible for executing search queries against the indexed data stored in S3.# It handles search requests from Datadog's query service and returns matching results.## The searcher is horizontally scalable - you can increase `replicaCount` to handle more concurrent searches.# Resource requirements for searchers are highly workload-dependent and should be determined empirically.# Key factors that impact searcher performance include:# - Query complexity (for example, number of terms, use of wildcards or regex)# - Query concurrency (number of simultaneous searches)# - Amount of data scanned per query# - Data access patterns (cache hit rates)## Memory is particularly important for searchers as they cache frequently accessed index data in memory.searcher:replicaCount:2resources:requests:cpu:"4"memory:"16Gi"limits:cpu:"4"memory:"16Gi"