Cluster monitoring stack for clusters based on Prometheus Operator
Go to file
Carlos de Paula bed566c8c5 Improve Ingress generation from #29
Add TLS to ingress as an optional feature and also be able to provide
own certificates.
2020-03-02 16:46:38 -03:00
grafana-dashboards Update libs 2019-11-17 12:05:27 -03:00
manifests Improve Ingress generation from #29 2020-03-02 16:46:38 -03:00
scripts
.gitignore Improve Ingress generation from #29 2020-03-02 16:46:38 -03:00
arm_exporter.jsonnet Use utils functions 2019-10-09 17:11:17 -03:00
base_operator_stack.jsonnet Improve Ingress generation from #29 2020-03-02 16:46:38 -03:00
elasticsearch_exporter.jsonnet
image_sources_versions.jsonnet
jsonnetfile.json Update libs 2019-11-17 12:05:27 -03:00
jsonnetfile.lock.json Update libs 2019-11-17 12:05:27 -03:00
k3s-overrides.jsonnet Fix endpoint names 2019-11-14 12:31:45 -03:00
main.jsonnet
Makefile
metallb.jsonnet
Readme.md Improve Ingress generation from #29 2020-03-02 16:46:38 -03:00
smtp_server.jsonnet
traefik.jsonnet
ups_exporter.jsonnet
utils.libsonnet Improve Ingress generation from #29 2020-03-02 16:46:38 -03:00
vars.jsonnet Improve Ingress generation from #29 2020-03-02 16:46:38 -03:00

Cluster Monitoring stack for ARM / X86-64 platforms

The Prometheus Operator for Kubernetes provides easy monitoring definitions for Kubernetes services and deployment and management of Prometheus instances.

This have been tested on a hybrid ARM64 / X84-64 Kubernetes cluster deployed as this article.

This repository collects Kubernetes manifests, Grafana dashboards, and Prometheus rules combined with documentation and scripts to provide easy to operate end-to-end Kubernetes cluster monitoring with Prometheus using the Prometheus Operator.

The content of this project is written in jsonnet and is an extension of the fantastic kube-prometheus project.

To continue using my previous stack with manifests and previous versions of the operator and components, use the legacy repo tag from: https://github.com/carlosedp/prometheus-operator-ARM/tree/legacy.

Components included in this package:

  • The Prometheus Operator
  • Highly available Prometheus
  • Highly available Alertmanager
  • Prometheus node-exporter
  • kube-state-metrics
  • CoreDNS
  • Grafana
  • SMTP relay to Gmail for Grafana notifications

There are additional modules (disabled by default) to monitor other components of the infra-structure. These can be disabled on vars.jsonnet file by setting the module in installModules to false.

The additional modules are:

  • ARM_exporter to generate temperature metrics
  • MetalLB metrics
  • Traefik metrics
  • ElasticSearch metrics
  • APC UPS metrics

There are also options to set the ingress domain suffix and enable persistence for Grafana and Prometheus.

The ingresses can use TLS with the default self-signed certificate from your Ingress controller by setting TLSingress to true and use a custom certificate by creating the files server.crt and server.key and enabling the UseProvidedCerts parameter at vars.jsonnet.

After changing these parameters, rebuild the manifests with make.

Quickstart

The repository already provides a set of compiled manifests to be applied into the cluster. The deployment can be customized thru the jsonnet files.

To simply deploy the stack, run:

$ make deploy

# Or manually:

$ kubectl apply -f manifests/

# It can take a few seconds for the above 'create manifests' command to fully create the following resources, so verify the resources are ready before proceeding.
$ until kubectl get customresourcedefinitions servicemonitors.monitoring.coreos.com ; do date; sleep 1; echo ""; done
$ until kubectl get servicemonitors --all-namespaces ; do date; sleep 1; echo ""; done

$ kubectl apply -f manifests/ # This command sometimes may need to be done twice (to workaround a race condition).

If you get an error from applying the manifests, run the make deploy or kubectl apply -f manifests/ again. Sometimes the resources required to apply the CRDs are not deployed yet.

Customizing for K3s

To have your K3s cluster and the monitoring stack on it, follow the steps:

# Download K3s binary
wget https://github.com/rancher/k3s/releases/download/`curl -s https://api.github.com/repos/rancher/k3s/releases/latest | grep -oP '"tag_name": "\K(.*)(?=")'`/k3s && chmod +x k3s

# Move to your path
sudo mv k3s /usr/local/bin

# Start K3s
sudo k3s server &

Now to deploy the monitoring stack on your K3s cluster, there are three parameters to be configured on vars.jsonnet:

  1. Set k3s.enabled to true.
  2. Change your K3s master node IP(your VM or host IP) on k3s.master_ip.
  3. Edit suffixDomain to have your node IP with the .nip.io suffix. This will be your ingress URL suffix.
  4. Set traefikExporter enabled parameter to true to collect Traefik metrics and deploy dashboard.

After changing these values, run make to build the manifests and k3s kubectl apply -f manifests/ to apply the stack to your cluster. In case of errors on some resources, re-run the command.

Now you can open the applications:

To list the created ingresses, run k3s kubectl get ingress --all-namespaces.

  • Grafana on https://grafana.[your_node_ip].nip.io,
  • Prometheus on https://prometheus.[your_node_ip].nip.io
  • Alertmanager on https://alertmanager.[your_node_ip].nip.io

Updating the ingress suffixes

To avoid rebuilding all manifests, there is a make target to update the Ingress URL suffix to a different suffix (using nip.io) to match your host IP. Run make change_suffix IP="[IP-ADDRESS]" to change the ingress route IP for Grafana, Prometheus and Alertmanager and reapply the manifests. If you have a K3s cluster, run make change_suffix IP="[IP-ADDRESS] K3S=k3s.

Customizing

The content of this project consists of a set of jsonnet files making up a library to be consumed.

Pre-reqs

The project requires json-bundler and the jsonnet compiler. The Makefile does the heavy-lifting of installing them. You need Go already installed:

git clone https://github.com/carlosedp/cluster-monitoring
cd prometheus-operator-ARM
make vendor
# Change the jsonnet files...
make

After this, a new customized set of manifests is built into the manifests dir. To apply to your cluster, run:

make deploy

To uninstall, run:

make teardown

Images

This project depends on the following images (all supports ARM, ARM64 and AMD64 thru manifests):

Alertmanager Blackbox_exporter Node_exporter Snmp_exporter Prometheus

ARM_exporter

Prometheus-operator

Prometheus-adapter

Grafana

Kube-state-metrics

Addon-resizer

Obs. This image is a clone of AMD64, ARM64 and ARM with a manifest. It's cloned and generated by the build_images.sh script

configmap_reload

prometheus-config-reloader

SMTP-server

Kube-rbac-proxy