Skip to content


On a fresh VM run the quickstart script:

curl -sfL | sh -
This script will set up a RKE2 cluster and install Opni into it. It will also generate a control-plane anomaly that Opni will detect.

Kibana UI

To view the Kibana UI you will need to port forward it:

export PATH=$PATH:/var/lib/rancher/rke2/bin
kubectl --kubeconfig /etc/rancher/rke2/rke2.yaml \
    -n opni-cluster \
    port-forward --address svc/opni-es-kibana 5601:5601

Open the following address in a browser

The username is admin and the password is stored in the opni-es-password secret in the opni-cluster namespace:
export PATH=$PATH:/var/lib/rancher/rke2/bin
kubectl --kubeconfig /etc/rancher/rke2/rke2.yaml \
    -n opni-cluster \
    get secret opni-es-password --template={{ "{{.data.password}}" }} | base64 -d
You must be in the Global Tenant mode if you are not already. Click on Dashboard, Opni Logs Dashboard.

Additional Anomaly Injection

Using the provided script, you can inject sample anomalies into your cluster. The script can create pods which are unschedulable, have nonexistent images, or exit with non-zero exit codes. Note: If you are not using the quickstart script, you must set the KUBECONFIG environment variable like

Then you can inject anomalies into your cluster with this command:
sh <(curl -sfL