Once Odigos Central is running, you need to configure your remote clusters to connect to it. This is done by installing Odigos in each remote cluster with the Central Proxy configuration.
Remote clusters require the same Odigos Enterprise license token as the
central installation.
Using CLI
odigos install \
--onprem-token <token> \
--set centralProxy.centralBackendURL=<your-central-backend-url> \
--set clusterName=<your-cluster-name>
Example:
odigos install \
--onprem-token <token> \
--set centralProxy.centralBackendURL=https://central-backend.example.com:8081 \
--set clusterName=production-east-1
Using Helm
Add the following to your remote cluster’s values.yaml:
clusterName: 'production-east-1'
centralProxy:
centralBackendURL: 'https://central-backend.example.com:8081'
Then install:
helm upgrade --install odigos odigos/odigos \
--namespace odigos-system \
--create-namespace \
-f values.yaml
TLS Configuration
For production deployments, configure TLS for secure communication between the Central Proxy and Central Backend:
centralProxy:
centralBackendURL: 'https://central-backend.example.com:8081'
tls:
# Skip certificate verification (for testing/self-signed certificates only)
skipVerify: false
# Secret name containing CA certificate (key: 'ca.crt')
caSecretName: 'central-ca-cert'
# Secret name for mTLS client certificate (keys: 'tls.crt', 'tls.key')
clientCertSecretName: 'central-client-cert'
Create the CA certificate secret:
kubectl create secret generic central-ca-cert \
--from-file=ca.crt=/path/to/ca.crt \
-n odigos-system
Create the client certificate secret (for mTLS):
kubectl create secret generic central-client-cert \
--from-file=tls.crt=/path/to/client.crt \
--from-file=tls.key=/path/to/client.key \
-n odigos-system