mirror of
https://github.com/carlosedp/cluster-monitoring.git
synced 2024-11-20 19:07:17 +01:00
104 lines
3.9 KiB
Plaintext
104 lines
3.9 KiB
Plaintext
local utils = import '../utils.libsonnet';
|
|
local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|
|
|
{
|
|
_config+:: {
|
|
namespace: 'monitoring',
|
|
|
|
versions+:: {
|
|
armExporter: 'latest',
|
|
},
|
|
|
|
imageRepos+:: {
|
|
armExporter: 'carlosedp/arm_exporter',
|
|
},
|
|
},
|
|
|
|
armExporter+:: {
|
|
serviceAccount:
|
|
utils.newServiceAccount('arm-exporter', $._config.namespace, null),
|
|
|
|
clusterRole:
|
|
utils.newClusterRole('arm-exporter', [
|
|
{
|
|
apis: ['authentication.k8s.io'],
|
|
res: ['tokenreviews'],
|
|
verbs: ['create'],
|
|
},
|
|
{
|
|
apis: ['authorization.k8s.io'],
|
|
res: ['subjectaccessreviews'],
|
|
verbs: ['create'],
|
|
},
|
|
], null),
|
|
|
|
clusterRoleBinding:
|
|
utils.newClusterRoleBinding('arm-exporter', 'arm-exporter', $._config.namespace, 'arm-exporter', null),
|
|
|
|
daemonset:
|
|
local daemonset = k.apps.v1.daemonSet;
|
|
local container = daemonset.mixin.spec.template.spec.containersType;
|
|
local containerPort = container.portsType;
|
|
local containerEnv = container.envType;
|
|
|
|
local podLabels = { 'k8s-app': 'arm-exporter' };
|
|
|
|
local armExporter =
|
|
container.new('arm-exporter', $._config.imageRepos.armExporter + ':' + $._config.versions.armExporter) +
|
|
container.withCommand([
|
|
'/bin/rpi_exporter',
|
|
'--web.listen-address=127.0.0.1:9243',
|
|
]) +
|
|
container.mixin.securityContext.withPrivileged(true) +
|
|
container.mixin.resources.withRequests({ cpu: '50m', memory: '50Mi' }) +
|
|
container.mixin.resources.withLimits({ cpu: '100m', memory: '100Mi' });
|
|
|
|
local ip = containerEnv.fromFieldPath('IP', 'status.podIP');
|
|
local proxy =
|
|
container.new('kube-rbac-proxy', $._config.imageRepos.kubeRbacProxy + ':' + $._config.versions.kubeRbacProxy) +
|
|
container.withArgs([
|
|
'--secure-listen-address=$(IP):9243',
|
|
'--upstream=http://127.0.0.1:9243/',
|
|
'--tls-cipher-suites=' + std.join(',', $._config.tlsCipherSuites),
|
|
]) +
|
|
container.withPorts(containerPort.new(9243) + containerPort.withHostPort(9243) + containerPort.withName('https')) +
|
|
container.mixin.resources.withRequests({ cpu: '10m', memory: '20Mi' }) +
|
|
container.mixin.resources.withLimits({ cpu: '20m', memory: '40Mi' }) +
|
|
container.withEnv([ip]);
|
|
local c = [armExporter, proxy];
|
|
|
|
daemonset.new() +
|
|
daemonset.mixin.metadata.withName('arm-exporter') +
|
|
daemonset.mixin.metadata.withNamespace($._config.namespace) +
|
|
daemonset.mixin.metadata.withLabels(podLabels) +
|
|
daemonset.mixin.spec.selector.withMatchLabels(podLabels) +
|
|
daemonset.mixin.spec.template.metadata.withLabels(podLabels) +
|
|
daemonset.mixin.spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.withNodeSelectorTerms([{ matchExpressions: [{ key: 'kubernetes.io/arch', operator: 'In', values: ['arm', 'arm64'] }] }]) +
|
|
daemonset.mixin.spec.template.spec.withTolerations([{ operator: 'Exists' }]) +
|
|
daemonset.mixin.spec.template.spec.withServiceAccountName('arm-exporter') +
|
|
daemonset.mixin.spec.template.spec.withContainers(c),
|
|
|
|
service:
|
|
local service = k.core.v1.service;
|
|
local servicePort = k.core.v1.service.mixin.spec.portsType;
|
|
|
|
local armExporterPort = servicePort.newNamed('https', 9243, 'https');
|
|
|
|
service.new('arm-exporter', $.armExporter.daemonset.spec.selector.matchLabels, armExporterPort) +
|
|
service.mixin.metadata.withNamespace($._config.namespace) +
|
|
service.mixin.metadata.withLabels({ 'k8s-app': 'arm-exporter' }) +
|
|
service.mixin.spec.withClusterIp('None'),
|
|
|
|
serviceMonitor:
|
|
utils.newServiceMonitorHTTPS(
|
|
'arm-exporter',
|
|
$._config.namespace,
|
|
{ 'k8s-app': 'arm-exporter' },
|
|
$._config.namespace,
|
|
'https',
|
|
'https',
|
|
'/var/run/secrets/kubernetes.io/serviceaccount/token',
|
|
),
|
|
},
|
|
}
|