Azure Installation – Helm Charts
This guide provides detailed, step-by-step instructions for installing and configuring Obsrv on Azure, utilizing Helm assuming the cluster is already created.
Installation Steps
1. Prerequisites
1. Clone the Obsrv Automation
Clone the below repository and checkout the desired branch or release tag:
git clone [email protected]:Sanketika-Obsrv/obsrv-automation.git
cd obsrv-automation
git checkout <latest_release_tag> # or use 'main' for the latest code2. Install Dependencies
An existing AKS cluster with kubectl and helm already installed. For detailed prerequisitesAzure Installation – Helm Charts
3. Configure Cluster Access
Set the kubeconfig path in your environment:
export KUBE_CONFIG_PATH="$HOME/.kube/config"export KUBECONFIG="$HOME/.kube/obsrv-kube-config.yaml"4. Verify the Cluster
Once the installation completes, verify that your Kubernetes cluster is up and running:
2. Helm Configurations
1. Navigate to the Helm Chart Directory
2. Update AZURE Cloud Configuration
Modify global-cloud-values-azure.yaml with the appropriate values for your environment:
3. Configure Domain
Update the global-values.yaml file and replace <domain> with your actual access endpoint — either your domain, Elastic IP, or NodePort external IP (depending on the Kong service type). This domain will be used to access the Obsrv Console UI .
LoadBalancer: If Kong's service type is LoadBalancer, retrieve the Elastic IP from the AWS console and use the following format:
Domain: <eip>.sslip.ioAccessing Kong via NodePort: When Kong is deployed as a NodePort service, use the external IP of the AKS node and Kong’s NodePort to access services:
Update Network Security Group (Required)To allow access from the internet:
Open the Network Security Group (NSG) attached to the AKS node subnet.
Add a new Inbound rule:
Source: Any
Protocol: TCP
Port range: Kong NodePort (e.g.,
32080)Action: Allow
Find Kong’s NodePortLocate the NodePort under the
PORT(S)column
3. Helm Execution
Make the script executable and set the environment variables and run the installation
The file install.sh is located in the cd enterpise-automation/helmcharts/kitchen
4. Post-Installation Verification
After completing the installation, follow these steps to verify that all components are running correctly:
1. Check Kubernetes Components
Verify all pods are running:
All pods should be in
Runningstate. Common namespaces to check:flink: Core Pipelinemonitoring: Monitoring stackdataset-api: Dataset APIsweb-console: Dataset Management console
Check Services:
Verify that essential services have external IPs assigned, particularly the Kong service.
If any component fails these checks, refer to the component-specific logs:
By following these steps, you will ensure a successful installation and configuration of Obsrv on AZURE.
HOW TO's
1. Prerequisites To Install Obsrv
Kubernetes Cluster
Existing Azure AKS cluster
kubectl Access
kubectl configured and connected to the cluster
Helm
Helm installed on your local machine
Cluster Capacity
Minimum 24 vCPU & 96 GB RAM
Azure Access
Azure credentials include the storage account name, storage account access key, and Azure subscription ID.
Containers
At least one containers required for backups and storage (three separate Containers recommended). For details, refer here
azure_service_principal_id
azure_service_principal_key
These credentials are required for:
Accessing Azure Storage
Velero backups and restores
Azure metrics scraping
Follow the steps below to set up the service principal ASP
2.Azure Container Requirements
Used for backups & cloud storage operations
Either a single container or three separate containers (recommended for clean separation)
CORS configuration required:
3.Create Azure Service Principal Credentials
Follow the steps below to create credentials required for Azure access.
Step 1: Create an App Registration
Go to Azure Portal
Search and open Microsoft Entra ID
Click App registrations
Select New registration
Enter a name: 👉
obsrv-access-sp(recommended)Supported account type: 👉 Accounts in this organizational directory only
Click Register
Copy Application (client) ID
→ This becomes your:
azure_service_principal_id
Step 2: Generate Client Secret (Key)
Open the newly created App registration
Go to Certificates & secrets
Click New client secret
Add a description (e.g.,
obsrv-secret)Select expiry — 24 months recommended
Click Add
Copy the Value immediately
Copy Secret Value
→ This becomes your:
azure_service_principal_key
⚠️ The secret value is only shown once — store it securely.
After installation, you must perform sanity testing to validate the deployment. 👉 Please refer to the Sanity Testing Guide here
Last updated
