Deploying an Agent

This page describes the install of the Lenses Agent via an archive on Linux.

To install the Agent from the archive you must:

  1. Extract the archive

  2. Configure the Agent

  3. Start the Agent


Extracting the archive

circle-check

Extract the archive using the following command

terminal
tar -xvf lenses-agent-latest-linux64.tar.gz -C lenses

Inside the extract archive, you will find.

   lenses
   ├── lenses.conf       ← edited and renamed from .sample
   ├── logback.xml
   ├── logback-debug.xml
   ├── bin/
   ├── lib/
   ├── licences/
   ├── logs/             ← created when you run Lenses
   ├── plugins/
   ├── storage/          ← created when you run Lenses
   └── ui/

Configure the Agent

To configure the agents connection to Postgres and its provisioning file. See here in the quickstart.

Once the agent files are configure you can continue to start the agent.

circle-info

The configuration files are the same for docker and Linux, for docker we are simply mounting the files into the container.

Provisioning

1

Configure HQ

To see be able to view and drilling to your Kafka environment, you need to connect the agent to HQ. You need to create an environment in HQ and copy the Agent Key into the provisioning.yaml.

Create new environment and obtain Agent key
circle-info

Agent key reference

Agent key within provisioning.yaml can be referenced as a:

  • environment variable shown in example above

  • inline string

2

Configure Kafka Connection

circle-info

Bare in mind that each Agent connects to one Kafka cluster.

There are many Kafka flavours today in the market. Good news is that Lenses support all flavours of Kafka and we are trying hard to keep documention up to date.

In the following link you can find provisioning examples for the most common Kafka flavours.

Other connections

There are also provisioning examples for other components:

3

Configure Database

circle-exclamation

Last step is to configure a database to which Agent will be connecting to.

Running Agent with Postgres database

Running Agent with H2 embedded database

circle-exclamation

In order to run Agent with embedded database, your lenses-agent.conf should not carry any property starting with lenses.storage.postgres.*


Provisioning example file

This provisioning file includes connections to:

chevron-rightprovisioning.yamlhashtag


Starting the Agent

circle-info

Provisioning file path

If you configured provisioning.yaml make sure to place following property:

Start Lenses by running:

or pass the location of the config file:

If you do not pass the location of lenses-agent.conf, the Agent will look for it inside the current (runtime) directory. If it does not exist, it will try its installation directory.

circle-exclamation

To stop Lenses, press CTRL+C.


File permissions

Set the permissions of the lenses-agent.conf to be readable only by the lenses user.

The agent needs write access in 4-5 places in total:

  1. [RUNTIME DIRECTORY] When the Agent runs, it will create at least one directory under the directory it is run in:

    1. [RUNTIME DIRECTORY]/logs Where logs are stored

    2. [RUNTIME DIRECTORY]/logs/sql-kstream-state Where SQL processors (when In Process mode) store state. To change the location for the processors’ state directory, use lenses.sql.state.dir option.

    3. [RUNTIME DIRECTORY]/storage Where the H2 embedded database is stored when PostgreSQL is not set. To change this directory, use the lenses.storage.directory option.

    4. /run (Global directory for temporary data at runtime) Used for temporary files. If Lenses does not have permission to use it, it will fall back to /tmp.

    5. /tmp (Global temporary directory) Used for temporary files (if access /run fails), and JNI shared libraries.

circle-exclamation

JNI libraries

The Agent and Kafka use two common Java libraries that take advantage of JNI and are extracted to /tmp.

You must either:

  1. Mount /tmp without noexec

  2. or set org.xerial.snappy.tempdir and java.io.tmpdir to a different location


SystemD example

If your server uses systemd as a Service Manager, then manage the Agent (start upon system boot, stop, restart). Below is a simple unit file that starts the Agent automatically on system boot.


Global Truststore

The Agent uses the default trust store (cacerts) of the system’s JRE (Java Runtime) installation. The trust store is used to verify remote servers on TLS connections, such as Kafka Brokers with an SSL protocol, JMX over TLS, and more. Whilst for some types of connections (e.g. Kafka Brokers) a separate keystore can be provided at the connection’s configuration, for some other connections (JMX over TLS) we always rely on the system trust store.

It is possible to set up a global custom trust store via the LENSES_OPTS environment variable:


Hardware & OS

Run on any Linux server (review ulimits or container technology (docker/kubernetes). For RHEL 6.x and CentOS 6.x use docker.

Linux machines typically have a soft limit of 1024 open file descriptors. Check your current limit with the ulimit command:

Increase as a super-user the soft limit to 4096 with:

Use 8GB RAM /4 CPUs and 20GB disk space.

Last updated

Was this helpful?