Helm Chart
Preflight Check
If you'd like to verify your environment's compatibility, use the following script:
curl -sSL https://github.com/qpoint-io/preflight/releases/latest/download/preflight.sh | sudo bashPrerequisites
Kubernetes cluster on a Linux Host with supported Kernel (5.10+)
HelmKubectlA valid registration token from app.qpoint.io (Settings -> Installation)
Install Qpoint Helm Repo
First, add the Qpoint Helm Repo:
helm repo add qpoint https://helm.qpoint.io/helm repo updatehelm search repo qpoint/qtap --versionshelm show values qpoint/qtapDeploy Qtap
helm install qtap qpoint/qtap \
-n qpoint \
--create-namespace \
--set logLevel=warn \
--set registrationToken=$TOKEN \
--set extraArgs="{--tags=Environment:Production\,Cluster:EKS-1}"Create the
qpointnamespace if it doesn't exist:
kubectl create namespace qpointCreate a secret containing your registration token:
kubectl create secret generic qtap-token \
--from-literal=token='<TOKEN>' \
-n qpointDeploy Qtap using Helm, referencing the secret:
helm install qtap qpoint/qtap \
-n qpoint \
--set logLevel=warn \
--set registrationTokenSecretRefName="qtap-token"Note: You can use your preferred secret management solution to create the secret, such as HashiCorp Vault, AWS Secrets Manager, or other tools integrated with your cluster.
Verifying the Deployment
To verify that Qtap is running:
kubectl get pods -n qpointYou should see a pod named qtap-xxxx in the Running state.
Uninstalling Qtap
To uninstall Qtap:
helm uninstall qtap -n qpointImportant Notes
The Qtap pod requires privileged access for eBPF operations. Ensure your cluster's security policies allow this.
To set a specific version, use
--set image.tag="v0.9.7"For cloud-connected mode, keep your registration token secure and do not share it in public repositories.
For local mode, ensure your configuration is correctly formatted and contains all necessary settings.
The default configuration mounts the host's
/sysdirectory. Ensure this is allowed in your cluster.You may need to adjust resource requests and limits based on your cluster's capacity and Qtap's requirements.
When using secret management, ensure proper RBAC permissions are in place for accessing the secret.
Last updated