Ask or search…
K
🤖

Sedai Smart Agent

Learn how to deploy Sedai's agent to securely connect your cluster to the platform.
Sedai Smart Agent allows you to seamlessly connect workloads to Sedai by deploying an agent within your cluster. This allows Sedai's core components to securely communicate instruction sets.
Navigate to Settings > Integrations and select the Add Cloud button. Follow the prompts to add a Kubernetes cluster and enter the cluster name.
If your organization follows the same naming convention across clusters, you can choose to add a nickname to help you easily identify the cluster and its workloads within Sedai.
Sedai will generate unique Helm and kubectl commands for the integration for you to copy or download. The deployment manifest file includes the following:
  • Namespace: Dedicated for deploying sedai-smart-agent
  • Service Account: Dedicated for deploying sedai-smart-agent
  • ClusterRole: For the Service Account; includes limited permissions to read Kubernetes resources and manage the workloads in your cluster
  • ClusterRoleBinding: Maps the ClusterRole to the Service Account
  • Deployment: sedai-smart-agent deployment
The kubectl and Helm commands are dynamically generated and will expire within 30 minutes. Execute the commands once they are generated to avoid connection issues.
Once you apply the manifest, sedai-smart-agent will be deployed in your cluster (it will take a few minutes for sedai-core to discover your cluster's topology within Sedai).
After you copy/download your preferred command, you will next be prompted to connect monitoring data.

Verify Smart Agent Status

To check whether the Smart Agent has successfully been set up in your cluster, navigate to System > Health within Sedai.

Cluster Role Reference

get, list, patch, update, and watch apply to the following apiGroups:
""
ReplicatonController, Services, Pods
apps
DaemonSets, Deployments, ReplicaSets, StatefulSets
autoscaling / autoscaling.k8s.io
HorizontalPodAutoscalers, VerticalPodAutoscalers
batch
CronJobs, Jobs
policy
PodDisruptionBudgets
get, list, and watch apply to the following apiGroups:
networking.k8s.io
Ingresses, IngressClasses, NetworkPolicies
metrics.k8s.io
Pods, Nodes
Last modified 15d ago