# Install eBPF Agent (Alaz) on Self-Hosted

To start monitoring your Kubernetes Cluster, you need to create a new Cluster on the Ddosify Self-Hosted platform. To achieve this, navigate to the [Clusters page](https://app.ddosify.com/clusters) and click the Add Cluster button. After providing a unique name for the Cluster, you will be navigated to the Observability page, where you will see the [Service Map](https://docs.ddosify.com/ddosify/kubernetes-monitoring/service-map), [Metrics Dashboard](https://docs.ddosify.com/ddosify/kubernetes-monitoring/metrics) and [Distributed Tracing](https://docs.ddosify.com/ddosify/kubernetes-monitoring/distributed-tracing) for this Cluster.&#x20;

But before that, you have to install and run our [open-source eBPF agent (Alaz)](https://github.com/ddosify/alaz) as a DaemonSet in your Kubernetes Cluster. Follow the below instructions to set up a new cluster successfully.

First, you need to expose your Self-Hosted application URL so that Alaz could write data to it. For this purpose, you can use tools such as [ngrok](https://ngrok.com/) or [Cloudflare Tunnels](https://www.cloudflare.com/products/tunnel/). Here, we will use ngrok.

1. **Expose the application URL to the public**

   1. For this, you can follow the first 2 steps in this post to configure ngrok: [https://ngrok.com/docs/getting-started/](https://ngrok.com/docs/getting-started/?os=macos).
   2. Then run&#x20;

      ```
      ngrok http http://localhost:8014
      ```
   3. This will take your terminal into a session. In this session, copy the URL in the "Forwarding" row. In the below example image, the URL [`https://aa3a-31-223-64-94.ngrok-free.app`](https://aa3a-31-223-64-94.ngrok-free.app) points traffic to the URL `http://localhost:8014`. Copy the first URL.&#x20;

   <figure><img src="https://2539979715-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FugegoRCn84wtxrIelgft%2Fuploads%2FiI5Nfr25Set78rUDQUVa%2Fimage.png?alt=media&#x26;token=1f57c7a0-3c2c-4b39-a8e0-9d6c8ac7a8af" alt="" width="563"><figcaption><p>ngrok terminal session</p></figcaption></figure>
2. **Install Alaz**&#x20;
   1. Open the cluster you want to monitor
   2. Click on the Set Up Cluster button&#x20;
   3. A pop-up will open and show you how to install Alaz via Kubectl or Helm:

<figure><img src="https://2539979715-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FugegoRCn84wtxrIelgft%2Fuploads%2FiStICknDgraWFYXUB2CN%2Fimage.png?alt=media&#x26;token=4fe8f454-0c19-4939-bcad-bf8d1c3e0c21" alt="" width="563"><figcaption><p>Self-Hosted Alaz Installation Instructions for Kubectl</p></figcaption></figure>

4. Here, you will see a line that only exists on Ddosify Self-Hosted just above the code block. Here, change the protocol and the URL according to your exposed URL. In our example, we set `http` to `https` and set our URL as `aa3a-31-223-64-94.ngrok-free.app`.&#x20;
5. The pop-ups now look like this:

<figure><img src="https://2539979715-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FugegoRCn84wtxrIelgft%2Fuploads%2F3agL2GR4y85KMVg4jOMN%2Fimage.png?alt=media&#x26;token=dbf405bf-9cdc-4ee0-9598-2f33474d0378" alt="" width="563"><figcaption><p>Modified Self-Hosted Alaz Installation Instructions for Kubectl</p></figcaption></figure>

<figure><img src="https://2539979715-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FugegoRCn84wtxrIelgft%2Fuploads%2FKnj670DyghTPBm2KSKA5%2Fimage.png?alt=media&#x26;token=09ccb9fc-cc8b-4382-90f2-ff1ef07b7672" alt="" width="563"><figcaption><p>Modified Self-Hosted Alaz Installation Instructions for Helm</p></figcaption></figure>

6. Now you can execute these commands to install Alaz. For more details about them, you can check [here](https://docs.ddosify.com/ddosify/kubernetes-monitoring/install-ebpf-agent-alaz).&#x20;

{% hint style="success" %}
If you require assistance with setting up Alaz, you can join our[ Discord](https://discord.com/invite/9KdnrSUZQg) or send an email to <support@ddosify.com>.
{% endhint %}
