This feature is available in Odigos Enterprise tier only. Please contact the
Odigos team to inquire about access to the Enterprise version.
Overview
Odigos Central is a centralized management layer for multi-cluster observability. Instead of configuring instrumentation, sampling rules, and destinations separately in each Kubernetes cluster, Odigos Central provides a single pane of glass to manage all your clusters from one place.Why Use Odigos Central?
- Unified Management - Configure instrumentation, sampling rules, and observability pipelines across all clusters from a single UI
- Reduced Operational Overhead - No need to SSH or
kubectlinto each cluster separately - Centralized Access Control - Manage user authentication and authorization with support for SSO providers like Okta
- Consistent Configuration - Apply the same sampling and instrumentation rules uniformly across environments
- Audit and Compliance - Single point of control for observability configuration changes
Architecture
Odigos Central consists of components deployed in a central (management) cluster and a lightweight proxy in each remote cluster.Components
| Component | Description | |
|---|---|---|
| Central UI | Web interface for managing all connected clusters, sources, destinations, and sampling configurations | |
| Central Backend | API server that stores configuration in Redis and communicates with remote clusters via WebSocket | |
| Central Proxy | Lightweight service deployed in each remote cluster that bridges the central backend to local Odigos components |
Prerequisites
Before installing Odigos Central, ensure you have:- Kubernetes version 1.19.0 or higher
- Odigos Enterprise license token (contact Odigos team to obtain)
- Helm 3.x (if using Helm installation method)
- Network connectivity from remote clusters to the Central Backend endpoint
Installation
You can install Odigos Central using the CLI or Helm chart.- CLI
- Helm
Use the This installs:
Example with all options:
odigos pro central install command with --set flags:- central-backend
- central-ui
- redis (for state)
- keycloak (as identity provider)
CLI Flags
| Flag | Default | Description |
|---|---|---|
--set onPremToken | (required) | Your Odigos Enterprise license token |
--set centralProxy.centralBackendURL | (optional) | URL of the central backend |
--set auth.externalUrl | http://localhost:8081 | Browser-accessible URL of the Central Backend for SSO redirect flows |
--set auth.adminPassword | (auto-generated) | Admin password for Keycloak. If not provided, a random password is generated |
--set auth.adminUsername | admin | Admin username for Keycloak |
--namespace, -n | odigos-central | Target namespace for installation |
--version | (current) | Specify a specific version to install |
Accessing the Central UI
After installation, access the Central UI using port-forward:- Central UI to
http://localhost:3000 - Central Backend to
http://localhost:8081
Options
| Flag | Default | Description |
|---|---|---|
--address | localhost | Address to bind the port-forward to |
--namespace, -n | odigos-central | Namespace where Odigos Central is installed |
Connecting Remote Clusters
Once Odigos Central is running, you need to configure your remote clusters to connect to it. This is done by installing Odigos in each remote cluster with the Central Proxy configuration.Remote clusters require the same Odigos Enterprise license token as the
central installation.
Using CLI
Using Helm
Add the following to your remote cluster’svalues.yaml:
TLS Configuration
For production deployments, configure TLS for secure communication between the Central Proxy and Central Backend:Authentication
Odigos Central includes a bundled Keycloak instance as its identity provider. Keycloak is not exposed externally — the Central Backend acts as a reverse proxy, forwarding all authentication requests (under/realms/*) to Keycloak internally. This means you only need to expose the Central Backend and Central UI; no separate ingress or service is needed for Keycloak.
Odigos Central supports two types of external SSO providers:
- OIDC — for providers like Azure AD, Auth0, or any OpenID Connect-compatible IdP
- SAML — for providers like Okta that use SAML 2.0
Configuring the External URL
For SSO redirects to work, Keycloak and the Central Backend must know the browser-accessible URL of the Central Backend. This is set via theauth.externalUrl Helm value.
| Environment | auth.externalUrl value |
|---|---|
| Local dev / port-forward | http://localhost:8081 (default) |
| Ingress with HTTPS | https://central.example.com |
| LoadBalancer service | https://central-lb.prod.internal |
- CLI
- Helm
When
auth.externalUrl is empty (the default), it falls back to http://localhost:8081, which works for local development with odigos pro central ui port-forwarding.OIDC Provider Setup (Azure AD, Auth0, etc.)
Create the OIDC Identity Provider in the Central UI
Open the Central UI sign-in page, choose your OIDC provider (e.g., Azure AD), and fill in:
- Client ID — from your IdP application
- Client Secret — from your IdP application
- Discovery URL — your IdP’s OpenID Connect discovery endpoint
- Tenant ID — (if required by the provider)
Odigos Central will create/update the required configuration in the bundled Keycloak for you. Avoid configuring the identity provider directly in Keycloak unless you’re troubleshooting.
Copy the Callback URL
After the provider is created successfully, the Central UI will display a Callback URL. Copy this URL and add it to your IdP application settings as the Redirect URI (or Callback URL).
SAML Provider Setup (Okta, etc.)
Create the SAML Identity Provider in the Central UI
Open the Central UI sign-in page, choose SAML, and fill in the IdP details from your SAML provider:
- IdP Entity ID / Issuer
- Single Sign-On Service URL
- X.509 Signing Certificate
Odigos Central will create/update the required configuration in the bundled Keycloak for you. Avoid configuring the identity provider directly in Keycloak unless you’re troubleshooting.
Copy the Callback URL (ACS URL)
After the provider is created, the Central UI will display the Callback URL (ACS URL). Copy this URL and configure it in your SAML provider:
- Single sign-on URL (ACS URL)
- Audience URI (SP Entity ID) — use the same URL or the realm URL depending on your provider
Production Ingress Configuration
When deploying behind an ingress, route traffic to the Central Backend and Central UI services only. Keycloak does not need its own ingress — the Central Backend handles all/realms/* requests internally.
Example routing:
| Path | Service | Port |
|---|---|---|
/ | central-ui | 3000 |
/api/*, /graphql, /realms/* | central-backend | 8081 |
If you’re looking to enable OIDC for the non-central Odigos UI (not Odigos
Central), see the dedicated OIDC documentation:
OIDC (OpenID Connect).Upgrade
To upgrade Odigos Central to a newer version:Using CLI
| Flag | Default | Description |
|---|---|---|
--version | (required) | Version to upgrade to (e.g., v1.2.0) |
--namespace, -n | odigos-central | Target namespace |
--yes | false | Skip confirmation prompt |
--image-pull-secrets | (existing) | Update image pull secrets |
--central-max-message-size | (existing) | Update max gRPC message size |
Using Helm
When upgrading, the Keycloak admin password is preserved from the existing
secret to prevent credential mismatch.
Uninstall
To completely remove Odigos Central:Using CLI
| Flag | Default | Description |
|---|---|---|
--namespace, -n | odigos-central | Target namespace |
--yes | false | Skip confirmation prompt |
Using Helm
Network Requirements
Ensure the following network connectivity:| Source | Destination | Port | Protocol |
|---|---|---|---|
| Users | Central UI | 3000 | HTTPS |
| Central UI | Central Backend | 8081 | HTTP/HTTPS |
| Central Backend | Redis | 6379 | TCP |
| Central Backend | Keycloak | 8080 | HTTP |
| Remote Cluster Proxies | Central Backend | 8081 | WebSocket (WSS) |