Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
Danny Froberg
microk8s
Commits
1a265d2d
Unverified
Commit
1a265d2d
authored
Feb 01, 2019
by
Konstantinos Tsakalozos
Committed by
GitHub
Feb 01, 2019
Browse files
Add prometheus (#202)
* Add prometheus
parent
804fb4fb
Changes
74
Hide whitespace changes
Inline
Side-by-side
microk8s-resources/actions/prometheus/grafana-service.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
Service
metadata
:
name
:
grafana
namespace
:
monitoring
spec
:
ports
:
-
name
:
http
port
:
3000
targetPort
:
http
selector
:
app
:
grafana
microk8s-resources/actions/prometheus/grafana-serviceAccount.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
ServiceAccount
metadata
:
name
:
grafana
namespace
:
monitoring
microk8s-resources/actions/prometheus/kube-state-metrics-clusterRole.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
kube-state-metrics
rules
:
-
apiGroups
:
-
"
"
resources
:
-
configmaps
-
secrets
-
nodes
-
pods
-
services
-
resourcequotas
-
replicationcontrollers
-
limitranges
-
persistentvolumeclaims
-
persistentvolumes
-
namespaces
-
endpoints
verbs
:
-
list
-
watch
-
apiGroups
:
-
extensions
resources
:
-
daemonsets
-
deployments
-
replicasets
verbs
:
-
list
-
watch
-
apiGroups
:
-
apps
resources
:
-
statefulsets
-
daemonsets
-
deployments
-
replicasets
verbs
:
-
list
-
watch
-
apiGroups
:
-
batch
resources
:
-
cronjobs
-
jobs
verbs
:
-
list
-
watch
-
apiGroups
:
-
autoscaling
resources
:
-
horizontalpodautoscalers
verbs
:
-
list
-
watch
-
apiGroups
:
-
authentication.k8s.io
resources
:
-
tokenreviews
verbs
:
-
create
-
apiGroups
:
-
authorization.k8s.io
resources
:
-
subjectaccessreviews
verbs
:
-
create
microk8s-resources/actions/prometheus/kube-state-metrics-clusterRoleBinding.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
kube-state-metrics
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
kube-state-metrics
subjects
:
-
kind
:
ServiceAccount
name
:
kube-state-metrics
namespace
:
monitoring
microk8s-resources/actions/prometheus/kube-state-metrics-deployment.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
apps/v1beta2
kind
:
Deployment
metadata
:
labels
:
app
:
kube-state-metrics
name
:
kube-state-metrics
namespace
:
monitoring
spec
:
replicas
:
1
selector
:
matchLabels
:
app
:
kube-state-metrics
template
:
metadata
:
labels
:
app
:
kube-state-metrics
spec
:
containers
:
-
args
:
-
--secure-listen-address=:8443
-
--upstream=http://127.0.0.1:8081/
image
:
quay.io/coreos/kube-rbac-proxy:v0.4.0
name
:
kube-rbac-proxy-main
ports
:
-
containerPort
:
8443
name
:
https-main
resources
:
limits
:
cpu
:
20m
memory
:
40Mi
requests
:
cpu
:
10m
memory
:
20Mi
-
args
:
-
--secure-listen-address=:9443
-
--upstream=http://127.0.0.1:8082/
image
:
quay.io/coreos/kube-rbac-proxy:v0.4.0
name
:
kube-rbac-proxy-self
ports
:
-
containerPort
:
9443
name
:
https-self
resources
:
limits
:
cpu
:
20m
memory
:
40Mi
requests
:
cpu
:
10m
memory
:
20Mi
-
args
:
-
--host=127.0.0.1
-
--port=8081
-
--telemetry-host=127.0.0.1
-
--telemetry-port=8082
image
:
quay.io/coreos/kube-state-metrics:v1.4.0
name
:
kube-state-metrics
resources
:
limits
:
cpu
:
100m
memory
:
150Mi
requests
:
cpu
:
100m
memory
:
150Mi
-
command
:
-
/pod_nanny
-
--container=kube-state-metrics
-
--cpu=100m
-
--extra-cpu=2m
-
--memory=150Mi
-
--extra-memory=30Mi
-
--threshold=5
-
--deployment=kube-state-metrics
env
:
-
name
:
MY_POD_NAME
valueFrom
:
fieldRef
:
apiVersion
:
v1
fieldPath
:
metadata.name
-
name
:
MY_POD_NAMESPACE
valueFrom
:
fieldRef
:
apiVersion
:
v1
fieldPath
:
metadata.namespace
image
:
quay.io/coreos/addon-resizer:1.0
name
:
addon-resizer
resources
:
limits
:
cpu
:
10m
memory
:
30Mi
requests
:
cpu
:
10m
memory
:
30Mi
nodeSelector
:
beta.kubernetes.io/os
:
linux
securityContext
:
runAsNonRoot
:
true
runAsUser
:
65534
serviceAccountName
:
kube-state-metrics
microk8s-resources/actions/prometheus/kube-state-metrics-role.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
Role
metadata
:
name
:
kube-state-metrics
namespace
:
monitoring
rules
:
-
apiGroups
:
-
"
"
resources
:
-
pods
verbs
:
-
get
-
apiGroups
:
-
extensions
resourceNames
:
-
kube-state-metrics
resources
:
-
deployments
verbs
:
-
get
-
update
-
apiGroups
:
-
apps
resourceNames
:
-
kube-state-metrics
resources
:
-
deployments
verbs
:
-
get
-
update
microk8s-resources/actions/prometheus/kube-state-metrics-roleBinding.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
RoleBinding
metadata
:
name
:
kube-state-metrics
namespace
:
monitoring
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
kube-state-metrics
subjects
:
-
kind
:
ServiceAccount
name
:
kube-state-metrics
microk8s-resources/actions/prometheus/kube-state-metrics-service.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
Service
metadata
:
labels
:
k8s-app
:
kube-state-metrics
name
:
kube-state-metrics
namespace
:
monitoring
spec
:
clusterIP
:
None
ports
:
-
name
:
https-main
port
:
8443
targetPort
:
https-main
-
name
:
https-self
port
:
9443
targetPort
:
https-self
selector
:
app
:
kube-state-metrics
microk8s-resources/actions/prometheus/kube-state-metrics-serviceAccount.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
ServiceAccount
metadata
:
name
:
kube-state-metrics
namespace
:
monitoring
microk8s-resources/actions/prometheus/kube-state-metrics-serviceMonitor.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
monitoring.coreos.com/v1
kind
:
ServiceMonitor
metadata
:
labels
:
k8s-app
:
kube-state-metrics
name
:
kube-state-metrics
namespace
:
monitoring
spec
:
endpoints
:
-
bearerTokenFile
:
/var/run/secrets/kubernetes.io/serviceaccount/token
honorLabels
:
true
interval
:
30s
port
:
https-main
scheme
:
https
scrapeTimeout
:
30s
tlsConfig
:
insecureSkipVerify
:
true
-
bearerTokenFile
:
/var/run/secrets/kubernetes.io/serviceaccount/token
interval
:
30s
port
:
https-self
scheme
:
https
tlsConfig
:
insecureSkipVerify
:
true
jobLabel
:
k8s-app
selector
:
matchLabels
:
k8s-app
:
kube-state-metrics
microk8s-resources/actions/prometheus/node-exporter-clusterRole.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
node-exporter
rules
:
-
apiGroups
:
-
authentication.k8s.io
resources
:
-
tokenreviews
verbs
:
-
create
-
apiGroups
:
-
authorization.k8s.io
resources
:
-
subjectaccessreviews
verbs
:
-
create
microk8s-resources/actions/prometheus/node-exporter-clusterRoleBinding.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
node-exporter
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
node-exporter
subjects
:
-
kind
:
ServiceAccount
name
:
node-exporter
namespace
:
monitoring
microk8s-resources/actions/prometheus/node-exporter-daemonset.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
apps/v1beta2
kind
:
DaemonSet
metadata
:
labels
:
app
:
node-exporter
name
:
node-exporter
namespace
:
monitoring
spec
:
selector
:
matchLabels
:
app
:
node-exporter
template
:
metadata
:
labels
:
app
:
node-exporter
spec
:
containers
:
-
args
:
-
--web.listen-address=127.0.0.1:9100
-
--path.procfs=/host/proc
-
--path.sysfs=/host/sys
-
--collector.filesystem.ignored-mount-points=^/(dev|proc|sys|var/lib/docker/.+)($|/)
-
--collector.filesystem.ignored-fs-types=^(autofs|binfmt_misc|cgroup|configfs|debugfs|devpts|devtmpfs|fusectl|hugetlbfs|mqueue|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|sysfs|tracefs)$
image
:
quay.io/prometheus/node-exporter:v0.16.0
name
:
node-exporter
resources
:
limits
:
cpu
:
102m
memory
:
180Mi
requests
:
cpu
:
102m
memory
:
180Mi
volumeMounts
:
-
mountPath
:
/host/proc
name
:
proc
readOnly
:
false
-
mountPath
:
/host/sys
name
:
sys
readOnly
:
false
-
mountPath
:
/host/root
mountPropagation
:
HostToContainer
name
:
root
readOnly
:
true
-
args
:
-
--secure-listen-address=$(IP):9100
-
--upstream=http://127.0.0.1:9100/
env
:
-
name
:
IP
valueFrom
:
fieldRef
:
fieldPath
:
status.podIP
image
:
quay.io/coreos/kube-rbac-proxy:v0.4.0
name
:
kube-rbac-proxy
ports
:
-
containerPort
:
9100
hostPort
:
9100
name
:
https
resources
:
limits
:
cpu
:
20m
memory
:
40Mi
requests
:
cpu
:
10m
memory
:
20Mi
hostNetwork
:
true
hostPID
:
true
nodeSelector
:
beta.kubernetes.io/os
:
linux
securityContext
:
runAsNonRoot
:
true
runAsUser
:
65534
serviceAccountName
:
node-exporter
tolerations
:
-
effect
:
NoSchedule
key
:
node-role.kubernetes.io/master
volumes
:
-
hostPath
:
path
:
/proc
name
:
proc
-
hostPath
:
path
:
/sys
name
:
sys
-
hostPath
:
path
:
/
name
:
root
microk8s-resources/actions/prometheus/node-exporter-service.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
Service
metadata
:
labels
:
k8s-app
:
node-exporter
name
:
node-exporter
namespace
:
monitoring
spec
:
clusterIP
:
None
ports
:
-
name
:
https
port
:
9100
targetPort
:
https
selector
:
app
:
node-exporter
microk8s-resources/actions/prometheus/node-exporter-serviceAccount.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
ServiceAccount
metadata
:
name
:
node-exporter
namespace
:
monitoring
microk8s-resources/actions/prometheus/node-exporter-serviceMonitor.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
monitoring.coreos.com/v1
kind
:
ServiceMonitor
metadata
:
labels
:
k8s-app
:
node-exporter
name
:
node-exporter
namespace
:
monitoring
spec
:
endpoints
:
-
bearerTokenFile
:
/var/run/secrets/kubernetes.io/serviceaccount/token
interval
:
30s
port
:
https
scheme
:
https
tlsConfig
:
insecureSkipVerify
:
true
jobLabel
:
k8s-app
selector
:
matchLabels
:
k8s-app
:
node-exporter
microk8s-resources/actions/prometheus/prometheus-adapter-apiService.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
apiregistration.k8s.io/v1beta1
kind
:
APIService
metadata
:
name
:
v1beta1.metrics.k8s.io
spec
:
group
:
metrics.k8s.io
groupPriorityMinimum
:
100
insecureSkipTLSVerify
:
true
service
:
name
:
prometheus-adapter
namespace
:
monitoring
version
:
v1beta1
versionPriority
:
100
microk8s-resources/actions/prometheus/prometheus-adapter-clusterRole.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
prometheus-adapter
rules
:
-
apiGroups
:
-
"
"
resources
:
-
nodes
-
namespaces
-
pods
-
services
verbs
:
-
get
-
list
-
watch
microk8s-resources/actions/prometheus/prometheus-adapter-clusterRoleBinding.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
prometheus-adapter
namespace
:
monitoring
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
prometheus-adapter
subjects
:
-
kind
:
ServiceAccount
name
:
prometheus-adapter
namespace
:
monitoring
microk8s-resources/actions/prometheus/prometheus-adapter-clusterRoleBindingDelegator.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
resource-metrics:system:auth-delegator
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
system:auth-delegator
subjects
:
-
kind
:
ServiceAccount
name
:
prometheus-adapter
namespace
:
monitoring
Prev
1
2
3
4
Next
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment