– Install containerized private minions (CPMs) | New Relic Documentation

Install New Relic's Docker-based private minion that accepts and runs the jobs assigned to your private locations

Page Meta Tags

description Install New Relic's Docker-based private minion that accepts and runs the jobs assigned to your private locations
google-site-verification Gz159HQpDMScxkpvmeDAU5tSbRpLHW0c1iimYcDkNR4
viewport width=device-width, height=device-height, initial-scale=1.0, user-scalable=0, minimum-scale=1.0, maximum-scale=1.0
type docs
title Install containerized private minions (CPMs)
category_0 Synthetic monitoring
category_1 Synthetic monitoring
category_2 Private locations
nodeid 23821
document_type page
info Install New Relic’s Docker-based private minion that accepts and runs the jobs assigned to your private locations

Page Headers

0 HTTP/1.1 200 OK
Server nginx
Date Fri, 06 Nov 2020 11:50:19 GMT
Content-Type text/html; charset=utf-8
Connection close
X-Drupal-Cache MISS
Access-Control-Allow-Origin *
Expires Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control no-cache, must-revalidate
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
Content-Language en
Vary Accept-Encoding
X-Request-ID v-3e265b12-2026-11eb-b545-8775a5d6ee46
X-AH-Environment prod
Age 0
Via varnish
X-Cache MISS
Accept-Ranges bytes

Keyword Frequency

docker 81
cpm 64
container 54
your 50
minion 38
private 37
run 33
environment 28
system 27
location 24

Keyword Cloud

Install containerized private minions CPMs New Relic Documentation Developers Open Source Community Sign up or Log into One Docs Language English Did you find what needed Yes No Great You can help us improve other content by telling worked and didn t We re sorry to hear that How we make this better Comments optional Note ll use feedback our documentation If need with products answers questions please visit support site Clear Form Leave field blank Synthetic monitoring plus icon Getting started Get synthetic Types of monitors Data privacy security CPM release notes Guides best practices Using Add edit View ping monitor results simple scripted Schedule downtimes Manage runtimes Recheck failed Alerts for Collect synthetics transaction traces Secure credentials Response codes Handle sites authentication Monitor scripting Introduction browsers Scripted browser examples Write API tests reference version x lower Import Node js modules attributes synthetic’s data Set proxy settings properties Administration User roles in Identify requests Public minion IPs Comparative charting audit log Private locations overview Minion installation configuration maintenance Verified script execution Troubleshoot UI pages Index Summary page Results Resources Failures SLA Report Synthetics REST Troubleshooting Non-scripted errors Simple non-ping produces no traffic isolated failures location HMAC Contents may not modify any files is liable modifications For more information contact your account representative a technical sales rep Read on learn about the Docker container-based accepts executes against The operate container system environment Kubernetes orchestration will auto-detect its select appropriate operating mode General features Because operates as instead virtual machine it delivers many Easy install start update Runs Linux macOS Windows Enhanced non-root user Ability leverage sandbox Customizable check timeout Custom provided types Kubernetes-specific Also following Integrates delegate runtime lifecycle management Does require privileged access socket Supports hosted on-premise clusters various engines such Containerd Deployable via Helm charts well YAMLs Allows job vs checks based resource allocation optimum Observability offered cluster explorer System requirements compatibility To host must meet minimum chosen Compatibility Requirements Operating kernel higher -bit Processor A modern multi-core CPU Memory GB RAM per core dedicated Disk space -ce key have v pod vCPU Core Mi Gi allocated are configurable Runner be requested limit Browser Additional considerations maximum limit-request ratio both Persistent volume PV at least size if ReadWriteOnce RWO an implicit node affinity established ensure runner containers scheduled same This required allow associated runners accessed only single recommend supports Follow instructions OS Kubectl view versions dependencies default values how pods each see Show below Before launching Your uses authenticate run existing Go one newrelic com gt In index locate want assigned Sandboxing applicable runs able sandboxing technology ensures complete isolation which improves reliability repeatability Every time executed creates brand new called needs configured communicate engine order spawn additional Each spawned then running There two crucial launch enable writable executable directory mounted tmp write but recommends system’s own things easy UNIX var docker sock DOCKER HOST variable Docker’s Daemon option count determines concurrently Since memory scaled expected multiple avoid contention root Security Both installing updating command pull latest image from Quay io repository where quay synthetics-minion list all releases images also Hub hub r tags Start follow procedure Locate Ensure you’ve enabled installed Run Tailor common defaults match –name YOUR CONTAINER NAME -e MINION PRIVATE LOCATION KEY -v rw When message similar ready servicing LABEL appears namespace kubectl create NAMESPACE Copy repo copying first helm add REPO https helm-charts previously copied get fresh -n –set privateLocationKey upgrade Check Once status attribute shown Stop delete On stop either name ID Container rm stopped removed omit ps -aqf FOR F tokens CID IN ‘docker NAME’ do SET POD INSTALLATION Delete uninstall set Use these options most commonly used directly line interface show usage available keep track logs verify health Containerized commands chart yaml respectively license licensing open source software LICENSE Some open-source listed under licenses case we’ve Our Configure configure custom npm preserve between launches variables Networks inherit network example bridge created means networking like –network –dns passed through inherited networks they IP address pool daemon Typically after completed However exits while still another unexpected circumstance orphaned potentially happens INTERNAL ENGINE ERROR code entries logging when trying clean environments prune By inside privileges suitable scenarios sandboxed change AppArmor profile spawns RUNNER APPARMOR steps official profiles requires my Verify belongs group OR Enable TCP pass has read permissions directories volumes permission chmod uid id -u conditions met lt gid http localhost serves sure up-to-date connection Connection Description without Internet internet some exceptions public disabled using named NETWORK HEALTHCHECK DISABLED minionNetworkHealthCheckDisabled synthetics-horde nr-data net domain necessary report receive execute Ask administration problem Communicate communication PROXY Arguments applies concept inheritance hierarchy don’t copy monitor-running shared them level out learning resources Browse Explorers community join discussions Find portal Diagnostics troubleshooting tool Review Relic’s Inc All rights reserved Terms Service DMCA Policy Privacy Notice Cookie UK Slavery Act