Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -114,6 +114,7 @@ No modules.
| <a name="input_agent_image_tag_digest"></a> [agent\_image\_tag\_digest](#input\_agent\_image\_tag\_digest) | The image tag or digest of agent image to use. If using digest, it must be in the format of `X.Y.Z@sha256:xxxxx`. | `string` | `"14.2.5@sha256:64b9d77bbd1bb22f97a74198144dcfea62bb5cee7629091252694e9040058035"` | no |
| <a name="input_agent_limits_cpu"></a> [agent\_limits\_cpu](#input\_agent\_limits\_cpu) | Specify CPU resource limits for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1"` | no |
| <a name="input_agent_limits_memory"></a> [agent\_limits\_memory](#input\_agent\_limits\_memory) | Specify memory resource limits for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1024Mi"` | no |
| <a name="input_agent_mode"></a> [agent\_mode](#input\_agent\_mode) | The operational mode for the monitoring agent. [Learn more](https://docs.sysdig.com/en/docs/administration/configure-agent-modes/). | `string` | `null` | no |
| <a name="input_agent_requests_cpu"></a> [agent\_requests\_cpu](#input\_agent\_requests\_cpu) | Specify CPU resource requests for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1"` | no |
| <a name="input_agent_requests_memory"></a> [agent\_requests\_memory](#input\_agent\_requests\_memory) | Specify memory resource requests for the agent. For more info, see https://cloud.ibm.com/docs/monitoring?topic=monitoring-resource_requirements | `string` | `"1024Mi"` | no |
| <a name="input_agent_tags"></a> [agent\_tags](#input\_agent\_tags) | Map of tags to associate to the agent. For example, {"environment": "production"}. NOTE: Use the `add_cluster_name` boolean variable to add the cluster name as a tag. | `map(string)` | `{}` | no |
Expand Down
2 changes: 2 additions & 0 deletions examples/obs-agent-ocp/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -140,4 +140,6 @@ module "monitoring_agents" {
blacklisted_ports = [22, 2379, 3306]
# example of adding agent tag
agent_tags = { "environment" : "test", "custom" : "value" }
# example of setting agent mode to troubleshooting for additional metrics
agent_mode = "troubleshooting"
}
25 changes: 25 additions & 0 deletions ibm_catalog.json
Original file line number Diff line number Diff line change
Expand Up @@ -354,6 +354,31 @@
{
"key": "enable_jmx"
},
{
"key": "agent_mode",
"options": [
{
"displayname": "Default",
"value": "__NULL__",
"description": "Use the agent's default operational mode"
},
{
"displayname": "Monitor",
"value": "monitor",
"description": "Standard monitoring mode with full metrics collection"
},
{
"displayname": "Monitor Light",
"value": "monitor_light",
"description": "Reduced metrics collection for lower resource usage"
},
{
"displayname": "Troubleshooting",
"value": "troubleshooting",
"description": "Enhanced metrics including HTTP request data for debugging"
}
]
},
{
"key": "use_private_endpoint"
},
Expand Down
4 changes: 4 additions & 0 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -213,6 +213,10 @@ resource "helm_release" "cloud_monitoring_agent" {
"app_checks_enabled": ${var.enable_app_checks}
"jmx":
"enabled": ${var.enable_jmx}
%{if var.agent_mode != null~}
"feature":
"mode": ${var.agent_mode}
%{endif~}
"sysdig_api_endpoint": ${local.api_host}
"blacklisted_ports":
%{for port in var.blacklisted_ports~}
Expand Down
1 change: 1 addition & 0 deletions solutions/fully-configurable/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,7 @@ module "monitoring_agent" {
enable_kspm_analyzer = var.enable_kspm_analyzer
enable_app_checks = var.enable_app_checks
enable_jmx = var.enable_jmx
agent_mode = var.agent_mode
cluster_shield_deploy = var.cluster_shield_deploy
cluster_shield_image_tag_digest = var.cluster_shield_image_tag_digest
cluster_shield_image_repository = var.cluster_shield_image_repository
Expand Down
10 changes: 10 additions & 0 deletions solutions/fully-configurable/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -364,6 +364,16 @@ variable "enable_jmx" {
default = true
}

variable "agent_mode" {
type = string
description = "The operational mode for the monitoring agent. [Learn more](https://docs.sysdig.com/en/docs/administration/configure-agent-modes/)."
default = null
validation {
condition = var.agent_mode == null ? true : contains(["monitor", "monitor_light", "troubleshooting"], var.agent_mode)
error_message = "agent_mode must be one of 'monitor', 'monitor_light', 'troubleshooting', or null."
}
}

variable "cluster_shield_deploy" {
type = bool
description = "Deploy the Cluster Shield component to provide runtime detection and policy enforcement for Kubernetes workloads. If enabled, a Kubernetes Deployment will be deployed to your cluster using helm."
Expand Down
10 changes: 10 additions & 0 deletions variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -369,6 +369,16 @@ variable "enable_jmx" {
default = true
}

variable "agent_mode" {
type = string
description = "The operational mode for the monitoring agent. [Learn more](https://docs.sysdig.com/en/docs/administration/configure-agent-modes/)."
default = null
validation {
condition = var.agent_mode == null ? true : contains(["monitor", "monitor_light", "troubleshooting"], var.agent_mode)
error_message = "agent_mode must be one of 'monitor', 'monitor_light', 'troubleshooting', or null."
}
}

variable "cluster_shield_deploy" {
type = bool
description = "Deploy the Cluster Shield component to provide runtime detection and policy enforcement for Kubernetes workloads. If enabled, a Kubernetes Deployment will be deployed to your cluster using helm."
Expand Down