JMX Bridge v1.8

Deploying JMX Bridge

Page last updated:

The JMX Bridge tool is a JMX extension for Elastic Runtime. Follow the instructions below to deploy JMX Bridge using the Pivotal Cloud Foundry (PCF) Operations Manager.

Step 1: Install the JMX Bridge Tile

Note: To use the Firehose Nozzle, you must install Elastic Runtime before installing JMX Bridge. JMX Bridge requires the components to be installed in this order.

  1. Download JMX Bridge.

  2. Import JMX Bridge into Ops Manager by following the instructions for Adding and Importing Products.

  3. On the Installation Dashboard, click the JMX Bridge tile.

    Metrics tile

    The orange bar on the JMX Bridge tile indicates that the product requires configuration.

Step 2: Assign Availability Zones and Networks

  1. Select Assign AZs and Networks. This section shows the Availability Zones that you Create when configuring Ops Manager Director.

  2. (vSphere and Amazon Web Services Only) Select an Availability Zone under Place singleton jobs in. This Availability Zone is where Ops Manager runs Metrics jobs that only have a single instance.

  3. (vSphere and Amazon Web Services Only) Select one or more Availability Zones under Balance other jobs in. Ops Manager balances Metrics jobs with more than one instance across the Availability Zones that you specify.

    Assign az

  4. Select a Network from the drop down menu.

    Note: JMX Bridge uses the default Assigned Network if you do not select a different network.

  5. Click Save.

    Note: When you save this form, a verification error displays. You can ignore this error. It only appears because the PCF security group blocks ICMP.

    Er network error

Step 3: Configure JMX Provider

  1. Select JMX Provider.

  2. Enter a new username and password into the JMX Provider credentials username and password fields.

  3. Record these credentials. You use these to connect JMX clients to the JMX Provider.

(Optional) Step 4: Enable NAT Support

  1. Select the Enable radio button. NAT support is disabled by default. Enabling NAT support allows you to set the NAT IP as the host IP. By default, the internal IP address of the JMX Provider VM is set as the host IP.

  2. Enter the NAT IP as the External IP address in the form

    Jmxbridge enable nat support

  3. If you have enabled or disabled NAT Support, click Save.

Note: To connect to the JMX Provider after install, you must use the specified IP address. The IP address displayed in the Status tab always reflects the internal IP address of the JMX Provider VM, not the external IP address.

(Optional) Step 5: Enable Security Logging

  1. Select the Enable Security Logging checkbox. Access to the JMX endpoint is logged to STDOUT by default. You can enable security logging in the JMX Bridge tile configuration by selecting this checkbox, or disable it deselecting this checkbox. Security logging is enabled by default.

    Jmxbridge enable security logging

  2. If you made changes to Security Logging, click Save.

Note: Related log output is made available by initiating a JMX Provider logs download from the JMX Bridge tile configuration status tab, then fetching the download from the logs tab.

(Optional) Step 6: Configure SSL

  1. Select the Enable SSL checkbox. If you enable SSL, JMX clients are forced to use SSL to connect to the JMX Provider.

    Ops metrics jmx ssl

    If you select the Enable SSL checkbox, you must also provide an SSL certificate and private key. There are two ways to provide an SSL certificate and private key:

    • If you are using a signed certificate, paste an X.509 certificate in the Certificate PEM field and a PKCS#1 private key in the Private Key field.
    • If you want to use SSL but do not want to use a signed certificate, you must perform the following actions:

      1. Generate a self-signed certificate on the server.
      2. Import the self-signed certificate to a trust store on the client.
      3. Start jConsole, or another monitoring tool, with the trust store.

      For more information, see Using SSL with a Self-Signed Certificate.

    Ops metrics jmx cert

  2. Click Save.

(Optional) Step 7: Configure Errands

Errands are scripts that Ops Manager runs to automate tasks. By default, Ops Manager runs the post-install errands listed below when you deploy PCF JMX Bridge. However, you can prevent a specific post-install errand from running by deselecting its checkbox on the Errands page.

Jmx errands

  • Select Smoke tests for JMX Bridge to cause the JMX Bridge to verify the following:
    • If the Firehose Nozzle is enabled, JMX Bridge verifies that the Nozzle is receiving metrics and that the product is not a slow consumer
    • If BOSH Metrics are enabled, JMX Bridge verifies that the product is receiving appropriate health metrics

Note: If errors occur during the install due to smoke tests, refer to the troubleshooting documentation for more information.

(Optional) Step 8: Resource Configuration

Note: The Firehose Nozzle is enabled by default and requires Elastic Runtime.

To disable the Firehose Nozzle or stop receiving Elastic Runtime (including Diego) metrics, modify the instance count of the OpenTSDB Firehose Nozzle from 1 to 0.

Step 9: Apply Changes

  1. Navigate to the PCF Ops Manager Installation Dashboard.

  2. In the Pending Changes view, click Apply Changes to install JMX Bridge.

    Ops metrics pending changes

After installation completes, a message appears stating that the changes have been applied.

Step 10: Find the IP Address of the JMX Provider

  1. Click Return to Product Dashboard.

  2. Click the JMX Bridge tile and select the Status tab.

    Ops metrics jmx ips

  3. Record the IP address of the JMX Provider.

    Note: After installation, your JMX client connects to this IP address at port 44444 using the credentials that you supplied. Also ensure that TCP port 44445 is open.

Step 11: Configure the Metrics IP Address

  1. Return to the Installation Dashboard. Click the Ops Manager Director tile and select Director Config.

    Ops metrics director ip

  2. In the Metrics IP Address field, enter the IP address of the JMX Provider. Click Save.

Step 12: Complete Installation

  1. In the Pending Changes view, click Apply Changes.

    Ops metrics pending changes When complete, a message appears stating that the changes have been applied.

  2. Click Return to Product Dashboard. JMX Bridge is now installed and configured.

After installation and configuration, metrics for Cloud Foundry components automatically report to the JMX endpoint.

Create a pull request or raise an issue on the source for this page in GitHub