Azure Installation – Helm Charts

This guide provides detailed, step-by-step instructions for installing and configuring Obsrv on Azure, utilizing Helm assuming the cluster is already created.

Installation Steps

1. Prerequisites

1. Clone the Obsrv Automation

  1. Clone the below repository and checkout the desired branch or release tag:

git clone [email protected]:Sanketika-Obsrv/obsrv-automation.git
cd obsrv-automation
git checkout <latest_release_tag>  # or use 'main' for the latest code

2. Install Dependencies

An existing AKS cluster with kubectl and helm already installed. For detailed prerequisitesAzure Installation – Helm Charts

3. Configure Cluster Access

Set the kubeconfig path in your environment:

export KUBE_CONFIG_PATH="$HOME/.kube/config"
export KUBECONFIG="$HOME/.kube/obsrv-kube-config.yaml"

4. Verify the Cluster

Once the installation completes, verify that your Kubernetes cluster is up and running:

The result of the above command should show the nodes in your Kubernetes cluster.


2. Helm Configurations

1. Navigate to the Helm Chart Directory

2. Update AZURE Cloud Configuration

Modify global-cloud-values-azure.yaml with the appropriate values for your environment:

3. Configure Domain

Update the global-values.yaml file and replace <domain> with your actual access endpoint — either your domain, Elastic IP, or NodePort external IP (depending on the Kong service type). This domain will be used to access the Obsrv Console UI .

  • LoadBalancer: If Kong's service type is LoadBalancer, retrieve the Elastic IP from the AWS console and use the following format: Domain: <eip>.sslip.io

  • Accessing Kong via NodePort: When Kong is deployed as a NodePort service, use the external IP of the AKS node and Kong’s NodePort to access services:

    Update Network Security Group (Required)

    To allow access from the internet:

    1. Open the Network Security Group (NSG) attached to the AKS node subnet.

    2. Add a new Inbound rule:

      • Source: Any

      • Protocol: TCP

      • Port range: Kong NodePort (e.g., 32080)

      • Action: Allow

    Find Kong’s NodePort

    Locate the NodePort under the PORT(S) column

3. Helm Execution

Make the script executable and set the environment variables and run the installation

The file install.sh is located in the cd enterpise-automation/helmcharts/kitchen


4. Post-Installation Verification

After completing the installation, follow these steps to verify that all components are running correctly:

1. Check Kubernetes Components

  1. Verify all pods are running:

    All pods should be in Running state. Common namespaces to check:

    • flink: Core Pipeline

    • monitoring: Monitoring stack

    • dataset-api: Dataset APIs

    • web-console: Dataset Management console

  2. Check Services:

    Verify that essential services have external IPs assigned, particularly the Kong service.

If any component fails these checks, refer to the component-specific logs:


By following these steps, you will ensure a successful installation and configuration of Obsrv on AZURE.

HOW TO's

1. Prerequisites To Install Obsrv

Requirement Category
Details

Kubernetes Cluster

Existing Azure AKS cluster

kubectl Access

kubectl configured and connected to the cluster

Helm

Helm installed on your local machine

Cluster Capacity

Minimum 24 vCPU & 96 GB RAM

Azure Access

Azure credentials include the storage account name, storage account access key, and Azure subscription ID.

Containers

At least one containers required for backups and storage (three separate Containers recommended). For details, refer here

azure_service_principal_id

azure_service_principal_key

These credentials are required for:

  • Accessing Azure Storage

  • Velero backups and restores

  • Azure metrics scraping

Follow the steps below to set up the service principal ASP


2.Azure Container Requirements

  • Used for backups & cloud storage operations

  • Either a single container or three separate containers (recommended for clean separation)

CORS configuration required:

3.Create Azure Service Principal Credentials

Follow the steps below to create credentials required for Azure access.

Step 1: Create an App Registration

  1. Go to Azure Portal

  2. Search and open Microsoft Entra ID

  3. Click App registrations

  4. Select New registration

  5. Enter a name: 👉 obsrv-access-sp (recommended)

  6. Supported account type: 👉 Accounts in this organizational directory only

  7. Click Register

Copy Application (client) ID → This becomes your: azure_service_principal_id


Step 2: Generate Client Secret (Key)

  1. Open the newly created App registration

  2. Go to Certificates & secrets

  3. Click New client secret

  4. Add a description (e.g., obsrv-secret)

  5. Select expiry — 24 months recommended

  6. Click Add

  7. Copy the Value immediately

Copy Secret Value → This becomes your: azure_service_principal_key

⚠️ The secret value is only shown once — store it securely.

After installation, you must perform sanity testing to validate the deployment. 👉 Please refer to the Sanity Testing Guide here

Last updated