This feature is available in Odigos Enterprise tier only. Please contact the
Odigos team to inquire about access to the Enterprise version.
Overview
Odigos Central is a centralized management layer for multi-cluster observability. Instead of configuring instrumentation, sampling rules, and destinations separately in each Kubernetes cluster, Odigos Central provides a single pane of glass to manage all your clusters from one place.Why Use Odigos Central?
- Unified Management - Configure instrumentation, sampling rules, and observability pipelines across all clusters from a single UI
- Reduced Operational Overhead - No need to SSH or
kubectlinto each cluster separately - Centralized Access Control - Manage user authentication and authorization with support for SSO providers like Okta
- Consistent Configuration - Apply the same sampling and instrumentation rules uniformly across environments
- Audit and Compliance - Single point of control for observability configuration changes
Architecture
Odigos Central consists of components deployed in a central (management) cluster and a lightweight proxy in each remote cluster.Components
| Component | Description | |
|---|---|---|
| Central UI | Web interface for managing all connected clusters, sources, destinations, and sampling configurations | |
| Central Backend | API server that stores configuration in Redis and communicates with remote clusters via WebSocket | |
| Central Proxy | Lightweight service deployed in each remote cluster that bridges the central backend to local Odigos components |
Prerequisites
Before installing Odigos Central, ensure you have:- Kubernetes version 1.19.0 or higher
- Odigos Enterprise license token (contact Odigos team to obtain)
- Helm 3.x (if using Helm installation method)
- Network connectivity from remote clusters to the Central Backend endpoint
Installation
You can install Odigos Central using the CLI or Helm chart.- CLI
- Helm
Use the This installs:
Example with all options:
odigos pro central install command with --set flags:- central-backend
- central-ui
- redis (for state)
- keycloak (as identity provider)
CLI Flags
| Flag | Default | Description |
|---|---|---|
--set onPremToken | (required) | Your Odigos Enterprise license token |
--set centralProxy.centralBackendURL | (optional) | URL of the central backend |
--set auth.adminPassword | (auto-generated) | Admin password for Keycloak. If not provided, a random password is generated |
--set auth.adminUsername | admin | Admin username for Keycloak |
--namespace, -n | odigos-central | Target namespace for installation |
--version | (current) | Specify a specific version to install |
Accessing the Central UI
After installation, access the Central UI using port-forward:- Central UI to
http://localhost:3000 - Central Backend to
http://localhost:8081
Options
| Flag | Default | Description |
|---|---|---|
--address | localhost | Address to bind the port-forward to |
--namespace, -n | odigos-central | Namespace where Odigos Central is installed |
Connecting Remote Clusters
Once Odigos Central is running, you need to configure your remote clusters to connect to it. This is done by installing Odigos in each remote cluster with the Central Proxy configuration.Remote clusters require the same Odigos Enterprise license token as the
central installation.
Using CLI
Using Helm
Add the following to your remote cluster’svalues.yaml:
TLS Configuration
For production deployments, configure TLS for secure communication between the Central Proxy and Central Backend:Authentication
By default, Odigos Central installs Keycloak and uses it as the identity provider for the Central UI.Okta Authentication (SSO via Keycloak)
If your organization uses Okta, the recommended setup is to keep the bundled Keycloak and configure Okta as a SAML Identity Provider in Keycloak (Keycloak identity brokering).1
Create the SAML Identity Provider in the Odigos Central UI
Create the SAML IdP through the Odigos Central UI (the same place you’d add an OIDC Identity Provider).
Odigos Central will create/update the required configuration in the bundled Keycloak for you. Avoid configuring the identity provider directly in Keycloak unless you’re troubleshooting.
2
Create an Okta SAML app integration
In Okta, create a SAML 2.0 app integration.
Okta’s UI and exact fields vary. The Okta SAML app configuration needs the Single sign-on URL (ACS URL) and the Audience URI (SP Entity ID) — you’ll copy these from the SAML Identity Provider configuration in the Central UI.
3
Configure the IdP details and copy the ACS URL / SP Entity ID
In the Central UI, open the SAML Identity Provider you created and configure the IdP details from Okta (for example: IdP Entity ID / Issuer, Single Sign-On Service URL, and the X.509 certificate).
4
Verify Central UI login via Okta
Open the Central UI again (via
odigos pro central ui) and verify that login redirects you to Okta and back to Odigos Central successfully.If you’re looking to enable OIDC for the non-central Odigos UI (not Odigos
Central), see the dedicated OIDC documentation:
OIDC (OpenID Connect).Upgrade
To upgrade Odigos Central to a newer version:Using CLI
| Flag | Default | Description |
|---|---|---|
--version | (required) | Version to upgrade to (e.g., v1.2.0) |
--namespace, -n | odigos-central | Target namespace |
--yes | false | Skip confirmation prompt |
--image-pull-secrets | (existing) | Update image pull secrets |
--central-max-message-size | (existing) | Update max gRPC message size |
Using Helm
When upgrading, the Keycloak admin password is preserved from the existing
secret to prevent credential mismatch.
Uninstall
To completely remove Odigos Central:Using CLI
| Flag | Default | Description |
|---|---|---|
--namespace, -n | odigos-central | Target namespace |
--yes | false | Skip confirmation prompt |
Using Helm
Network Requirements
Ensure the following network connectivity:| Source | Destination | Port | Protocol |
|---|---|---|---|
| Users | Central UI | 3000 | HTTPS |
| Central UI | Central Backend | 8081 | HTTP/HTTPS |
| Central Backend | Redis | 6379 | TCP |
| Central Backend | Keycloak | 8080 | HTTP |
| Remote Cluster Proxies | Central Backend | 8081 | WebSocket (WSS) |