mirror of
https://github.com/carlosedp/cluster-monitoring.git
synced 2024-11-20 19:07:17 +01:00
Refactor into classes
This commit is contained in:
parent
037431c1fd
commit
fb08cda75e
@ -1,4 +1,5 @@
|
|||||||
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
||||||
|
local utils = import 'utils.libsonnet';
|
||||||
|
|
||||||
{
|
{
|
||||||
_config+:: {
|
_config+:: {
|
||||||
@ -94,37 +95,16 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
daemonset.mixin.spec.template.spec.withNodeSelector({ 'beta.kubernetes.io/arch': 'arm64' }) +
|
daemonset.mixin.spec.template.spec.withNodeSelector({ 'beta.kubernetes.io/arch': 'arm64' }) +
|
||||||
daemonset.mixin.spec.template.spec.withServiceAccountName('arm-exporter') +
|
daemonset.mixin.spec.template.spec.withServiceAccountName('arm-exporter') +
|
||||||
daemonset.mixin.spec.template.spec.withContainers(c),
|
daemonset.mixin.spec.template.spec.withContainers(c),
|
||||||
|
|
||||||
serviceMonitor:
|
serviceMonitor:
|
||||||
{
|
utils.newServiceMonitorHTTPS('arm-exporter',
|
||||||
apiVersion: 'monitoring.coreos.com/v1',
|
$._config.namespace,
|
||||||
kind: 'ServiceMonitor',
|
{'k8s-app': 'arm-exporter'},
|
||||||
metadata: {
|
$._config.namespace,
|
||||||
name: 'arm-exporter',
|
'https',
|
||||||
namespace: $._config.namespace,
|
'https',
|
||||||
labels: {
|
'/var/run/secrets/kubernetes.io/serviceaccount/token',
|
||||||
'k8s-app': 'arm-exporter',
|
),
|
||||||
},
|
|
||||||
},
|
|
||||||
spec: {
|
|
||||||
jobLabel: 'k8s-app',
|
|
||||||
selector: {
|
|
||||||
matchLabels: {
|
|
||||||
'k8s-app': 'arm-exporter',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
endpoints: [
|
|
||||||
{
|
|
||||||
port: 'https',
|
|
||||||
scheme: 'https',
|
|
||||||
interval: '30s',
|
|
||||||
bearerTokenFile: '/var/run/secrets/kubernetes.io/serviceaccount/token',
|
|
||||||
tlsConfig: {
|
|
||||||
insecureSkipVerify: true,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
|
|
||||||
service:
|
service:
|
||||||
local service = k.core.v1.service;
|
local service = k.core.v1.service;
|
||||||
|
@ -1,5 +1,6 @@
|
|||||||
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
||||||
local vars = import 'vars.jsonnet';
|
local vars = import 'vars.jsonnet';
|
||||||
|
local utils = import 'utils.libsonnet';
|
||||||
|
|
||||||
{
|
{
|
||||||
_config+:: {
|
_config+:: {
|
||||||
@ -119,55 +120,16 @@ local vars = import 'vars.jsonnet';
|
|||||||
grafanaDashboards+:: $._config.grafanaDashboards,
|
grafanaDashboards+:: $._config.grafanaDashboards,
|
||||||
|
|
||||||
// Create ingress objects per application
|
// Create ingress objects per application
|
||||||
ingress+: {
|
ingress+:: {
|
||||||
local secret = k.core.v1.secret,
|
alertmanager:
|
||||||
local ingress = k.extensions.v1beta1.ingress,
|
utils.newIngress('alertmanager-main', $._config.namespace, $._config.urls.alert_ingress, '/', 'alertmanager-main', 'web'),
|
||||||
local ingressTls = ingress.mixin.spec.tlsType,
|
|
||||||
local ingressRule = ingress.mixin.spec.rulesType,
|
|
||||||
local httpIngressPath = ingressRule.mixin.http.pathsType,
|
|
||||||
|
|
||||||
'alertmanager-main':
|
|
||||||
ingress.new() +
|
|
||||||
ingress.mixin.metadata.withName('alertmanager-main') +
|
|
||||||
ingress.mixin.metadata.withNamespace($._config.namespace) +
|
|
||||||
ingress.mixin.spec.withRules(
|
|
||||||
ingressRule.new() +
|
|
||||||
ingressRule.withHost($._config.urls.alert_ingress) +
|
|
||||||
ingressRule.mixin.http.withPaths(
|
|
||||||
httpIngressPath.new() +
|
|
||||||
httpIngressPath.withPath('/') +
|
|
||||||
httpIngressPath.mixin.backend.withServiceName('alertmanager-main') +
|
|
||||||
httpIngressPath.mixin.backend.withServicePort('web')
|
|
||||||
),
|
|
||||||
),
|
|
||||||
grafana:
|
grafana:
|
||||||
ingress.new() +
|
utils.newIngress('grafana', $._config.namespace, $._config.urls.grafana_ingress, '/', 'grafana', 'http'),
|
||||||
ingress.mixin.metadata.withName('grafana') +
|
|
||||||
ingress.mixin.metadata.withNamespace($._config.namespace) +
|
prometheus:
|
||||||
ingress.mixin.spec.withRules(
|
utils.newIngress('prometheus-k8s', $._config.namespace, $._config.urls.prom_ingress, '/', 'prometheus-k8s', 'web'),
|
||||||
ingressRule.new() +
|
|
||||||
ingressRule.withHost($._config.urls.grafana_ingress) +
|
|
||||||
ingressRule.mixin.http.withPaths(
|
|
||||||
httpIngressPath.new() +
|
|
||||||
httpIngressPath.withPath('/') +
|
|
||||||
httpIngressPath.mixin.backend.withServiceName('grafana') +
|
|
||||||
httpIngressPath.mixin.backend.withServicePort('http')
|
|
||||||
),
|
|
||||||
),
|
|
||||||
'prometheus-k8s':
|
|
||||||
ingress.new() +
|
|
||||||
ingress.mixin.metadata.withName('prometheus-k8s') +
|
|
||||||
ingress.mixin.metadata.withNamespace($._config.namespace) +
|
|
||||||
ingress.mixin.spec.withRules(
|
|
||||||
ingressRule.new() +
|
|
||||||
ingressRule.withHost($._config.urls.prom_ingress) +
|
|
||||||
ingressRule.mixin.http.withPaths(
|
|
||||||
httpIngressPath.new() +
|
|
||||||
httpIngressPath.withPath('/') +
|
|
||||||
httpIngressPath.mixin.backend.withServiceName('prometheus-k8s') +
|
|
||||||
httpIngressPath.mixin.backend.withServicePort('web')
|
|
||||||
),
|
|
||||||
),
|
|
||||||
// // Example external ingress with authentication
|
// // Example external ingress with authentication
|
||||||
// 'grafana-external':
|
// 'grafana-external':
|
||||||
// ingress.new() +
|
// ingress.new() +
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
||||||
|
local utils = import 'utils.libsonnet';
|
||||||
|
|
||||||
{
|
{
|
||||||
_config+:: {
|
_config+:: {
|
||||||
@ -26,8 +27,8 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
|
|
||||||
elasticExporter+:: {
|
elasticExporter+:: {
|
||||||
deployment:
|
deployment:
|
||||||
local deployment = k.apps.v1beta2.deployment;
|
local deployment = k.apps.v1.deployment;
|
||||||
local container = k.apps.v1beta2.deployment.mixin.spec.template.spec.containersType;
|
local container = k.apps.v1.deployment.mixin.spec.template.spec.containersType;
|
||||||
local containerPort = container.portsType;
|
local containerPort = container.portsType;
|
||||||
|
|
||||||
local podLabels = { 'k8s-app': 'elasticsearch-exporter' };
|
local podLabels = { 'k8s-app': 'elasticsearch-exporter' };
|
||||||
@ -44,7 +45,7 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
container.mixin.securityContext.capabilities.withDrop(['SETPCAP', 'MKNOD', 'AUDIT_WRITE', 'CHOWN', 'NET_RAW', 'DAC_OVERRIDE', 'FOWNER', 'FSETID', 'KILL', 'SETGID', 'SETUID', 'NET_BIND_SERVICE', 'SYS_CHROOT', 'SETFCAP']) +
|
container.mixin.securityContext.capabilities.withDrop(['SETPCAP', 'MKNOD', 'AUDIT_WRITE', 'CHOWN', 'NET_RAW', 'DAC_OVERRIDE', 'FOWNER', 'FSETID', 'KILL', 'SETGID', 'SETUID', 'NET_BIND_SERVICE', 'SYS_CHROOT', 'SETFCAP']) +
|
||||||
container.mixin.securityContext.withRunAsNonRoot(true) +
|
container.mixin.securityContext.withRunAsNonRoot(true) +
|
||||||
container.mixin.securityContext.withRunAsUser(1000) +
|
container.mixin.securityContext.withRunAsUser(1000) +
|
||||||
container.mixin.securityContext.withReadOnlyRootFilesystem(true) +
|
// container.mixin.securityContext.withReadOnlyRootFilesystem(true) +
|
||||||
container.mixin.resources.withRequests({ memory: '64Mi', cpu: '25m' }) +
|
container.mixin.resources.withRequests({ memory: '64Mi', cpu: '25m' }) +
|
||||||
container.mixin.resources.withLimits({ memory: '128Mi', cpu: '100m' }) +
|
container.mixin.resources.withLimits({ memory: '128Mi', cpu: '100m' }) +
|
||||||
container.mixin.livenessProbe.httpGet.withPath('/health') +
|
container.mixin.livenessProbe.httpGet.withPath('/health') +
|
||||||
@ -78,69 +79,22 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
service.mixin.metadata.withLabels({ 'k8s-app': 'elasticsearch-exporter' }),
|
service.mixin.metadata.withLabels({ 'k8s-app': 'elasticsearch-exporter' }),
|
||||||
|
|
||||||
serviceMonitorElastic:
|
serviceMonitorElastic:
|
||||||
{
|
utils.newServiceMonitor(
|
||||||
apiVersion: 'monitoring.coreos.com/v1',
|
'elasticsearch',
|
||||||
kind: 'ServiceMonitor',
|
$._config.namespace,
|
||||||
metadata: {
|
{'k8s-app': 'elasticsearch-exporter'},
|
||||||
name: 'elasticsearch-exporter',
|
'monitoring',
|
||||||
namespace: $._config.namespace,
|
'es-metrics',
|
||||||
labels: {
|
'http'),
|
||||||
'k8s-app': 'elasticsearch-exporter',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
spec: {
|
|
||||||
jobLabel: 'k8s-app',
|
|
||||||
selector: {
|
|
||||||
matchLabels: {
|
|
||||||
'k8s-app': 'elasticsearch-exporter',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
endpoints: [
|
|
||||||
{
|
|
||||||
port: 'es-metrics',
|
|
||||||
scheme: 'http',
|
|
||||||
interval: '30s',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
namespaceSelector: {
|
|
||||||
matchNames: [
|
|
||||||
'monitoring',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
serviceMonitorFluentd:
|
serviceMonitorFluentd:
|
||||||
{
|
utils.newServiceMonitor(
|
||||||
apiVersion: 'monitoring.coreos.com/v1',
|
'fluentd-es',
|
||||||
kind: 'ServiceMonitor',
|
$._config.namespace,
|
||||||
metadata: {
|
{'k8s-app': 'fluentd-es'},
|
||||||
name: 'fluentd-es',
|
'logging',
|
||||||
namespace: $._config.namespace,
|
'metrics',
|
||||||
labels: {
|
'http'),
|
||||||
'k8s-app': 'fluentd-es',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
spec: {
|
|
||||||
jobLabel: 'k8s-app',
|
|
||||||
selector: {
|
|
||||||
matchLabels: {
|
|
||||||
'k8s-app': 'fluentd-es',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
endpoints: [
|
|
||||||
{
|
|
||||||
port: 'metrics',
|
|
||||||
scheme: 'http',
|
|
||||||
interval: '30s',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
namespaceSelector: {
|
|
||||||
matchNames: [
|
|
||||||
'logging',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
// Add Prometheus monitoring rules for ElasticSearch
|
// Add Prometheus monitoring rules for ElasticSearch
|
||||||
prometheusRules+:: {
|
prometheusRules+:: {
|
||||||
|
@ -1,62 +1,14 @@
|
|||||||
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
||||||
local vars = import 'vars.jsonnet';
|
local vars = import 'vars.jsonnet';
|
||||||
local service = k.core.v1.service;
|
local utils = import 'utils.libsonnet';
|
||||||
local servicePort = k.core.v1.service.mixin.spec.portsType;
|
|
||||||
|
|
||||||
{
|
{
|
||||||
prometheus+:: {
|
prometheus+:: {
|
||||||
kubeControllerManagerPrometheusDiscoveryService:
|
|
||||||
service.new('kube-controller-manager-prometheus-discovery', { 'k8s-app': 'kube-controller-manager' }, servicePort.newNamed('http-metrics', 10252, 10252)) +
|
|
||||||
service.mixin.metadata.withNamespace('kube-system') +
|
|
||||||
service.mixin.metadata.withLabels({ 'k8s-app': 'kube-controller-manager' }) +
|
|
||||||
service.mixin.spec.withClusterIp('None'),
|
|
||||||
kubeControllerManagerPrometheusDiscoveryEndpoints:
|
kubeControllerManagerPrometheusDiscoveryEndpoints:
|
||||||
local endpoints = k.core.v1.endpoints;
|
utils.newEndpoint('kube-controller-manager', 'kube-system', vars.k3s.master_ip, 'http-metrics', 10252),
|
||||||
local endpointSubset = endpoints.subsetsType;
|
|
||||||
local endpointPort = endpointSubset.portsType;
|
|
||||||
|
|
||||||
local Port = endpointPort.new() +
|
|
||||||
endpointPort.withName('http-metrics') +
|
|
||||||
endpointPort.withPort(10252) +
|
|
||||||
endpointPort.withProtocol('TCP');
|
|
||||||
|
|
||||||
local subset = endpointSubset.new() +
|
|
||||||
endpointSubset.withAddresses([
|
|
||||||
{ ip: vars.k3s.master_ip }]) +
|
|
||||||
endpointSubset.withPorts(Port);
|
|
||||||
|
|
||||||
endpoints.new() +
|
|
||||||
endpoints.mixin.metadata.withName('kube-controller-manager-prometheus-discovery') +
|
|
||||||
endpoints.mixin.metadata.withNamespace('kube-system') +
|
|
||||||
endpoints.mixin.metadata.withLabels({ 'k8s-app': 'kube-controller-manager' }) +
|
|
||||||
endpoints.withSubsets(subset),
|
|
||||||
|
|
||||||
kubeSchedulerPrometheusDiscoveryService:
|
|
||||||
service.new('kube-scheduler-prometheus-discovery', { 'k8s-app': 'kube-scheduler' }, servicePort.newNamed('http-metrics', 10251, 10251)) +
|
|
||||||
service.mixin.metadata.withNamespace('kube-system') +
|
|
||||||
service.mixin.metadata.withLabels({ 'k8s-app': 'kube-scheduler' }) +
|
|
||||||
service.mixin.spec.withClusterIp('None'),
|
|
||||||
|
|
||||||
kubeSchedulerPrometheusDiscoveryEndpoints:
|
kubeSchedulerPrometheusDiscoveryEndpoints:
|
||||||
local endpoints = k.core.v1.endpoints;
|
utils.newEndpoint('kube-scheduler', 'kube-system', vars.k3s.master_ip, 'http-metrics', 10251),
|
||||||
local endpointSubset = endpoints.subsetsType;
|
|
||||||
local endpointPort = endpointSubset.portsType;
|
|
||||||
|
|
||||||
local Port = endpointPort.new() +
|
|
||||||
endpointPort.withName('http-metrics') +
|
|
||||||
endpointPort.withPort(10251) +
|
|
||||||
endpointPort.withProtocol('TCP');
|
|
||||||
|
|
||||||
local subset = endpointSubset.new() +
|
|
||||||
endpointSubset.withAddresses([
|
|
||||||
{ ip: vars.k3s.master_ip }]) +
|
|
||||||
endpointSubset.withPorts(Port);
|
|
||||||
|
|
||||||
endpoints.new() +
|
|
||||||
endpoints.mixin.metadata.withName('kube-scheduler-prometheus-discovery') +
|
|
||||||
endpoints.mixin.metadata.withNamespace('kube-system') +
|
|
||||||
endpoints.mixin.metadata.withLabels({ 'k8s-app': 'kube-scheduler' }) +
|
|
||||||
endpoints.withSubsets(subset),
|
|
||||||
|
|
||||||
serviceMonitorKubelet+:
|
serviceMonitorKubelet+:
|
||||||
{
|
{
|
||||||
|
14
main.jsonnet
14
main.jsonnet
@ -1,13 +1,5 @@
|
|||||||
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|
||||||
local vars = import 'vars.jsonnet';
|
local vars = import 'vars.jsonnet';
|
||||||
|
local utils = import 'utils.libsonnet';
|
||||||
local join_objects(objs) =
|
|
||||||
local aux(arr, i, running) =
|
|
||||||
if i >= std.length(arr) then
|
|
||||||
running
|
|
||||||
else
|
|
||||||
aux(arr, i + 1, running + arr[i]) tailstrict;
|
|
||||||
aux(objs, 0, {});
|
|
||||||
|
|
||||||
local kp = (import 'kube-prometheus/kube-prometheus.libsonnet')
|
local kp = (import 'kube-prometheus/kube-prometheus.libsonnet')
|
||||||
+ (import 'kube-prometheus/kube-prometheus-anti-affinity.libsonnet')
|
+ (import 'kube-prometheus/kube-prometheus-anti-affinity.libsonnet')
|
||||||
@ -17,9 +9,9 @@ local kp = (import 'kube-prometheus/kube-prometheus.libsonnet')
|
|||||||
+ (import 'kube-prometheus/kube-prometheus-insecure-kubelet.libsonnet')
|
+ (import 'kube-prometheus/kube-prometheus-insecure-kubelet.libsonnet')
|
||||||
+ (import 'smtp_server.jsonnet')
|
+ (import 'smtp_server.jsonnet')
|
||||||
// Additional modules are loaded dynamically from vars.jsonnet
|
// Additional modules are loaded dynamically from vars.jsonnet
|
||||||
+ join_objects([module.file for module in vars.modules if module.enabled])
|
+ utils.join_objects([module.file for module in vars.modules if module.enabled])
|
||||||
// Load K3s customized modules
|
// Load K3s customized modules
|
||||||
+ join_objects([m for m in [import 'k3s-overrides.jsonnet'] if vars.k3s.enabled])
|
+ utils.join_objects([m for m in [import 'k3s-overrides.jsonnet'] if vars.k3s.enabled])
|
||||||
// Base stack is loaded at the end to override previous definitions
|
// Base stack is loaded at the end to override previous definitions
|
||||||
+ (import 'base_operator_stack.jsonnet')
|
+ (import 'base_operator_stack.jsonnet')
|
||||||
// Load image versions last to override default from modules
|
// Load image versions last to override default from modules
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
||||||
|
local utils = import 'utils.libsonnet';
|
||||||
|
|
||||||
{
|
{
|
||||||
_config+:: {
|
_config+:: {
|
||||||
@ -12,38 +13,7 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
|
|
||||||
metallbExporter+:: {
|
metallbExporter+:: {
|
||||||
serviceMonitor:
|
serviceMonitor:
|
||||||
{
|
utils.newServiceMonitor('metallb', $._config.namespace, {'k8s-app': 'metallb-controller'}, 'metallb-system', 'http', 'http'),
|
||||||
apiVersion: 'monitoring.coreos.com/v1',
|
|
||||||
kind: 'ServiceMonitor',
|
|
||||||
metadata: {
|
|
||||||
name: 'metallb',
|
|
||||||
namespace: $._config.namespace,
|
|
||||||
labels: {
|
|
||||||
'k8s-app': 'metallb-controller',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
spec: {
|
|
||||||
jobLabel: 'k8s-app',
|
|
||||||
selector: {
|
|
||||||
matchLabels: {
|
|
||||||
'k8s-app': 'metallb-controller',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
endpoints: [
|
|
||||||
{
|
|
||||||
port: 'http',
|
|
||||||
scheme: 'http',
|
|
||||||
interval: '30s',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
namespaceSelector: {
|
|
||||||
matchNames: [
|
|
||||||
'metallb-system',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
|
|
||||||
},
|
|
||||||
},
|
|
||||||
|
|
||||||
service:
|
service:
|
||||||
local service = k.core.v1.service;
|
local service = k.core.v1.service;
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
||||||
|
local utils = import 'utils.libsonnet';
|
||||||
|
|
||||||
{
|
{
|
||||||
_config+:: {
|
_config+:: {
|
||||||
@ -11,36 +12,6 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
|
|
||||||
traefikExporter+:: {
|
traefikExporter+:: {
|
||||||
serviceMonitor:
|
serviceMonitor:
|
||||||
{
|
utils.newServiceMonitor('traefik', $._config.namespace, {'app': 'traefik'}, 'kube-system', 'metrics', 'http'),
|
||||||
apiVersion: 'monitoring.coreos.com/v1',
|
|
||||||
kind: 'ServiceMonitor',
|
|
||||||
metadata: {
|
|
||||||
name: 'traefik',
|
|
||||||
namespace: $._config.namespace,
|
|
||||||
labels: {
|
|
||||||
'app': 'traefik',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
spec: {
|
|
||||||
jobLabel: 'traefik-exporter',
|
|
||||||
selector: {
|
|
||||||
matchLabels: {
|
|
||||||
'app': 'traefik',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
endpoints: [
|
|
||||||
{
|
|
||||||
port: 'metrics',
|
|
||||||
scheme: 'http',
|
|
||||||
interval: '30s',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
namespaceSelector: {
|
|
||||||
matchNames: [
|
|
||||||
'kube-system',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
||||||
|
local utils = import 'utils.libsonnet';
|
||||||
|
|
||||||
{
|
{
|
||||||
_config+:: {
|
_config+:: {
|
||||||
@ -16,32 +17,7 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
|
|
||||||
upsExporter+:: {
|
upsExporter+:: {
|
||||||
serviceMonitor:
|
serviceMonitor:
|
||||||
{
|
utils.newServiceMonitor('ups-exporter', $._config.namespace, {'k8s-app': 'ups-exporter'}, $._config.namespace, 'metrics', 'http'),
|
||||||
apiVersion: 'monitoring.coreos.com/v1',
|
|
||||||
kind: 'ServiceMonitor',
|
|
||||||
metadata: {
|
|
||||||
name: 'ups-exporter',
|
|
||||||
namespace: $._config.namespace,
|
|
||||||
labels: {
|
|
||||||
'k8s-app': 'ups-exporter',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
spec: {
|
|
||||||
jobLabel: 'k8s-app',
|
|
||||||
selector: {
|
|
||||||
matchLabels: {
|
|
||||||
'k8s-app': 'ups-exporter',
|
|
||||||
},
|
|
||||||
},
|
|
||||||
endpoints: [
|
|
||||||
{
|
|
||||||
port: 'metrics',
|
|
||||||
scheme: 'http',
|
|
||||||
interval: '30s',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
|
|
||||||
service:
|
service:
|
||||||
local service = k.core.v1.service;
|
local service = k.core.v1.service;
|
||||||
@ -55,26 +31,6 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
service.mixin.spec.withClusterIp('None'),
|
service.mixin.spec.withClusterIp('None'),
|
||||||
|
|
||||||
endpoints:
|
endpoints:
|
||||||
local endpoints = k.core.v1.endpoints;
|
utils.newEndpoint('ups-exporter', $._config.namespace, $._config.ups.ips, 'metrics', 9099),
|
||||||
local endpointSubset = endpoints.subsetsType;
|
|
||||||
local endpointPort = endpointSubset.portsType;
|
|
||||||
|
|
||||||
local upsPort = endpointPort.new() +
|
|
||||||
endpointPort.withName('metrics') +
|
|
||||||
endpointPort.withPort(9099) +
|
|
||||||
endpointPort.withProtocol('TCP');
|
|
||||||
|
|
||||||
local subset = endpointSubset.new() +
|
|
||||||
endpointSubset.withAddresses([
|
|
||||||
{ ip: IP }
|
|
||||||
for IP in $._config.ups.ips
|
|
||||||
]) +
|
|
||||||
endpointSubset.withPorts(upsPort);
|
|
||||||
|
|
||||||
endpoints.new() +
|
|
||||||
endpoints.mixin.metadata.withName('ups-exporter') +
|
|
||||||
endpoints.mixin.metadata.withNamespace($._config.namespace) +
|
|
||||||
endpoints.mixin.metadata.withLabels({ 'k8s-app': 'ups-exporter' }) +
|
|
||||||
endpoints.withSubsets(subset),
|
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
110
utils.libsonnet
Normal file
110
utils.libsonnet
Normal file
@ -0,0 +1,110 @@
|
|||||||
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
||||||
|
local vars = import 'vars.jsonnet';
|
||||||
|
|
||||||
|
{
|
||||||
|
// Join multiple objects into one
|
||||||
|
join_objects(objs)::
|
||||||
|
local aux(arr, i, running) =
|
||||||
|
if i >= std.length(arr) then
|
||||||
|
running
|
||||||
|
else
|
||||||
|
aux(arr, i + 1, running + arr[i]) tailstrict;
|
||||||
|
aux(objs, 0, {}),
|
||||||
|
|
||||||
|
// Creates endpoint objects
|
||||||
|
newEndpoint(name, namespace, ips, portName, portNumber):: (
|
||||||
|
local endpoints = k.core.v1.endpoints;
|
||||||
|
local endpointSubset = endpoints.subsetsType;
|
||||||
|
local endpointPort = endpointSubset.portsType;
|
||||||
|
local Port = endpointPort.new() +
|
||||||
|
endpointPort.withName(portName) +
|
||||||
|
endpointPort.withPort(portNumber) +
|
||||||
|
endpointPort.withProtocol('TCP');
|
||||||
|
|
||||||
|
local subset = endpointSubset.new() +
|
||||||
|
endpointSubset.withAddresses([
|
||||||
|
{ ip: IP }
|
||||||
|
for IP in ips
|
||||||
|
]) +
|
||||||
|
endpointSubset.withPorts(Port);
|
||||||
|
endpoints.new() +
|
||||||
|
endpoints.mixin.metadata.withName(name) +
|
||||||
|
endpoints.mixin.metadata.withNamespace(namespace) +
|
||||||
|
endpoints.mixin.metadata.withLabels({ 'k8s-app': name }) +
|
||||||
|
endpoints.withSubsets(subset)
|
||||||
|
),
|
||||||
|
|
||||||
|
// Creates ingress objects
|
||||||
|
newIngress(name, namespace, host, path, serviceName, servicePort):: (
|
||||||
|
local secret = k.core.v1.secret;
|
||||||
|
local ingress = k.extensions.v1beta1.ingress;
|
||||||
|
local ingressTls = ingress.mixin.spec.tlsType;
|
||||||
|
local ingressRule = ingress.mixin.spec.rulesType;
|
||||||
|
local httpIngressPath = ingressRule.mixin.http.pathsType;
|
||||||
|
|
||||||
|
ingress.new() +
|
||||||
|
ingress.mixin.metadata.withName(name) +
|
||||||
|
ingress.mixin.metadata.withNamespace(namespace) +
|
||||||
|
ingress.mixin.spec.withRules(
|
||||||
|
ingressRule.new() +
|
||||||
|
ingressRule.withHost(host) +
|
||||||
|
ingressRule.mixin.http.withPaths(
|
||||||
|
httpIngressPath.new() +
|
||||||
|
httpIngressPath.withPath(path) +
|
||||||
|
httpIngressPath.mixin.backend.withServiceName(serviceName) +
|
||||||
|
httpIngressPath.mixin.backend.withServicePort(servicePort)
|
||||||
|
),
|
||||||
|
)
|
||||||
|
),
|
||||||
|
|
||||||
|
// Creates http ServiceMonitor objects
|
||||||
|
newServiceMonitor(name, namespace, matchLabel, matchNamespace, portName, portScheme):: (
|
||||||
|
{
|
||||||
|
apiVersion: 'monitoring.coreos.com/v1',
|
||||||
|
kind: 'ServiceMonitor',
|
||||||
|
metadata: {
|
||||||
|
name: name,
|
||||||
|
namespace: namespace,
|
||||||
|
labels: {
|
||||||
|
'app': name,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
spec: {
|
||||||
|
jobLabel: name+'-exporter',
|
||||||
|
selector: {
|
||||||
|
matchLabels: matchLabel,
|
||||||
|
},
|
||||||
|
endpoints: [
|
||||||
|
{
|
||||||
|
port: portName,
|
||||||
|
scheme: portScheme,
|
||||||
|
interval: '30s',
|
||||||
|
},
|
||||||
|
],
|
||||||
|
namespaceSelector: {
|
||||||
|
matchNames: [matchNamespace],
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
),
|
||||||
|
|
||||||
|
// Creates https ServiceMonitor objects
|
||||||
|
newServiceMonitorHTTPS(name, namespace, matchLabel, matchNamespace, portName, portScheme, token):: (
|
||||||
|
local s = $.newServiceMonitor(name, namespace, matchLabel, matchNamespace, portName, portScheme);
|
||||||
|
// Replace endpoint with https and token
|
||||||
|
local t = {
|
||||||
|
spec: {
|
||||||
|
endpoints: [{
|
||||||
|
port: portName,
|
||||||
|
scheme: portScheme,
|
||||||
|
interval: '30s',
|
||||||
|
bearerTokenFile: token,
|
||||||
|
tlsConfig: {
|
||||||
|
insecureSkipVerify: true,
|
||||||
|
}
|
||||||
|
}],
|
||||||
|
}
|
||||||
|
};
|
||||||
|
s + t
|
||||||
|
),
|
||||||
|
}
|
@ -1,4 +1,7 @@
|
|||||||
{
|
{
|
||||||
|
_config+:: {
|
||||||
|
namespace: 'monitoring'
|
||||||
|
},
|
||||||
// Enable or disable additional modules
|
// Enable or disable additional modules
|
||||||
modules: [
|
modules: [
|
||||||
{
|
{
|
||||||
@ -30,7 +33,7 @@
|
|||||||
|
|
||||||
k3s: {
|
k3s: {
|
||||||
enabled: false,
|
enabled: false,
|
||||||
master_ip: '192.168.99.100'
|
master_ip: ['192.168.164.120']
|
||||||
},
|
},
|
||||||
|
|
||||||
// Domain suffix for the ingresses
|
// Domain suffix for the ingresses
|
||||||
|
Loading…
Reference in New Issue
Block a user