LATEST VERSION: 1.9 - CHANGELOG
JMX Bridge v1.9

Deploying JMX Bridge

Page last updated:

The JMX Bridge tool is a JMX extension for Elastic Runtime. Follow the instructions below to deploy JMX Bridge using the Pivotal Cloud Foundry (PCF) Operations Manager.

Step 1: Install the JMX Bridge Tile

Note: To use the Firehose Nozzle, you must install Elastic Runtime before JMX Bridge. Starting in v1.8.7, the JMX Bridge product enforces this install order dependency.

  1. Download JMX Bridge.

  2. Import JMX Bridge into Ops Manager by following the instructions for Adding and Importing Products.

  3. On the Installation Dashboard, click the JMX Bridge tile.

    Test

    The orange bar on the JMX Bridge tile indicates that the product requires configuration.

Step 2: Assign Availability Zones and Networks

  1. Select Assign AZs and Networks. This section shows the availability zones (AZs) that you create when configuring Ops Manager Director.

  2. (vSphere and Amazon Web Services Only) Select an AZ under Place singleton jobs in. Ops Manager runs Metrics jobs with a single instance in this AZ.

  3. (vSphere and Amazon Web Services Only) Select one or more AZ under Balance other jobs in. Ops Manager balances instances of Metrics jobs with more than one instance across the AZs that you specify.

    Assign az

  4. Select a Network from the drop-down menu.

    Note: JMX Bridge uses the default Assigned Network if you do not select a different network.

  5. Click Save.

    Note: When you save this form, the following verification error displays because the PCF security group blocks ICMP. You can ignore this error.

    Er network error

Step 3: Configure JMX Provider

  1. Select JMX Provider.

  2. Enter a new username and password into the JMX Provider credentials username and password fields.

  3. Record these credentials. You use these to connect JMX clients to the JMX Provider.

(Optional) Step 4: Disable or Enable NAT Support

  1. Select the Enable radio button. NAT support is disabled by default. This option allows you to set the NAT IP as the host IP. By default, the internal IP address of the JMX Provider VM is set as the host IP.

  2. Enter the NAT IP as the External IP address in the form 0.0.0.0

    Enable nat support

  3. If you have enabled or disabled NAT Support, click Save.

Note: To connect to the JMX Provider after install, you must use the specified IP address. The IP address displayed in the Status tab always reflects the internal IP address of the JMX Provider VM, not the external IP address.

(Optional) Step 5: Disable or Enable the Nozzle Prefix

By default, the Nozzle prefix opentsdb.nozzle prepends to Firehose-transmitted metrics, in order to maintain backward compatibility with prior versions of JMX Bridge.

  1. If you do not require backward compatibility, you can make the metrics more readable by clearing the Enable Nozzle Prefix checkbox. This omits the opentsdb.nozzle prefix.

    Enable prefix

  2. If you have enabled or disabled Enable Nozzle Prefix, click Save. Enabling or disabling this feature causes temporary overlap of metrics coming through in both naming formats. Metrics with the former metric name format continue to appear in the MBean tree until the JMX Provider is restarted or the MBean store needs additional space to store new metrics.

(Optional) Step 6: Disable or Enable Security Logging

  1. Select the Enable Security Logging checkbox. Access to the JMX endpoint is logged to STDOUT by default. You can enable this security logging in the JMX Bridge tile configuration by selecting this checkbox, or disable it deselecting this checkbox. Security logging is enabled by default.

    Enable security logging

  2. If you have enabled or disabled Security Logging, click Save.

Note: Related log output is made available by initiating a JMX Provider logs download from the JMX Bridge tile configuration status tab, then fetching the download from the logs tab.

(Optional) Step 7: Configure SSL

  1. Select the Enable SSL checkbox. Enabling SSL requires JMX clients to use SSL to connect to the JMX Provider. If SSL is not enabled, JMX clients can connect to the JMX Provider without SSL credentials.

    Enable jmx ssl

    If you select the Enable SSL checkbox, you must also provide an SSL certificate and private key. There are two ways to provide an SSL certificate and private key:

    • If you are using a signed certificate, paste an X.509 certificate in the Certificate PEM field and a PKCS#1 private key in the Private Key field.
    • If you want to use SSL but do not want to use a signed certificate, you must perform the following actions:

      1. Generate a self-signed certificate on the server.
      2. Import the self-signed certificate to a trust store on the client.
      3. Start jConsole, or another monitoring tool, with the trust store.

      For more information, see Using SSL with a Self-Signed Certificate.

    External ssl cert

  2. After providing an SSL certificate and private key, click Save.

(Optional) Step 8: Configure Errands

Errands are scripts that Ops Manager runs to automate tasks. By default, Ops Manager runs the post-install errands listed below when you deploy PCF JMX Bridge. However, you can prevent a specific post-install errand from running by deselecting its checkbox on the Errands page.

Errands

  • Select Smoke tests for JMX Bridge to cause the JMX Bridge to verify the following:
    • If the Firehose Nozzle is enabled, that the Nozzle is receiving metrics
    • If the Firehose Nozzle is enabled, that the product is not a slow consumer
    • If BOSH Metrics are enabled, that the product is receiving appropriate health metrics

Note: If errors occur during the install due to smoke tests, refer to the troubleshooting documentation for more information.

(Optional) Step 9: Resource Configuration

To disable the Firehose Nozzle or stop receiving Elastic Runtime (including Diego) metrics, modify the instance count of the Firehose Nozzle from 1 to 0.

Step 10: Apply Changes

  1. Navigate to the PCF Ops Manager Installation Dashboard.

  2. In the Pending Changes view, click Apply Changes to install JMX Bridge.

    Pending changes

After installation completes, a message appears stating that the changes have been applied.

Step 11: Find the IP Address of the JMX Provider

  1. Click Return to Product Dashboard.

  2. Click the JMX Bridge tile and select the Status tab.

    Jmx provider ip

  3. Record the IP address of the JMX Provider.

    Note: After installation, your JMX client connects to this IP address at port 44444 using the credentials that you supplied. Also ensure that TCP port 44445 is open.

Step 12: Configure the JMX Provider IP Address

  1. Return to the Installation Dashboard. Click the Ops Manager Director tile and select Director Config.

    Ops manager director ip

  2. In the JMX Provider IP Address field, enter the IP address of the JMX Provider. Click Save.

Step 13: Complete Installation

  1. In the Pending Changes view, click Apply Changes.

    Pending changes When complete, a message appears stating that the changes have been applied.

  2. Click Return to Product Dashboard. JMX Bridge is now installed and configured.

After installation and configuration, metrics for Cloud Foundry components automatically report to the JMX endpoint.

Create a pull request or raise an issue on the source for this page in GitHub