Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
Danny Froberg
microk8s
Commits
1a265d2d
Unverified
Commit
1a265d2d
authored
Feb 01, 2019
by
Konstantinos Tsakalozos
Committed by
GitHub
Feb 01, 2019
Browse files
Add prometheus (#202)
* Add prometheus
parent
804fb4fb
Changes
74
Expand all
Hide whitespace changes
Inline
Side-by-side
microk8s-resources/actions/prometheus/prometheus-adapter-clusterRoleServerResources.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
resource-metrics-server-resources
rules
:
-
apiGroups
:
-
metrics.k8s.io
resources
:
-
'
*'
verbs
:
-
'
*'
microk8s-resources/actions/prometheus/prometheus-adapter-configMap.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
data
:
config.yaml
:
|
resourceRules:
cpu:
containerQuery: sum(rate(container_cpu_usage_seconds_total{<<.LabelMatchers>>}[1m])) by (<<.GroupBy>>)
nodeQuery: sum(rate(container_cpu_usage_seconds_total{<<.LabelMatchers>>, id='/'}[1m])) by (<<.GroupBy>>)
resources:
overrides:
node:
resource: node
namespace:
resource: namespace
pod_name:
resource: pod
containerLabel: container_name
memory:
containerQuery: sum(container_memory_working_set_bytes{<<.LabelMatchers>>}) by (<<.GroupBy>>)
nodeQuery: sum(container_memory_working_set_bytes{<<.LabelMatchers>>,id='/'}) by (<<.GroupBy>>)
resources:
overrides:
node:
resource: node
namespace:
resource: namespace
pod_name:
resource: pod
containerLabel: container_name
window: 1m
kind
:
ConfigMap
metadata
:
name
:
adapter-config
namespace
:
monitoring
microk8s-resources/actions/prometheus/prometheus-adapter-deployment.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
apps/v1beta2
kind
:
Deployment
metadata
:
name
:
prometheus-adapter
namespace
:
monitoring
spec
:
replicas
:
1
selector
:
matchLabels
:
name
:
prometheus-adapter
template
:
metadata
:
labels
:
name
:
prometheus-adapter
spec
:
containers
:
-
args
:
-
--cert-dir=/var/run/serving-cert
-
--config=/etc/adapter/config.yaml
-
--logtostderr=true
-
--metrics-relist-interval=1m
-
--prometheus-url=http://prometheus-k8s.monitoring.svc:9090/
-
--secure-port=6443
image
:
quay.io/coreos/k8s-prometheus-adapter-amd64:v0.3.0
name
:
prometheus-adapter
ports
:
-
containerPort
:
6443
volumeMounts
:
-
mountPath
:
/tmp
name
:
tmpfs
readOnly
:
false
-
mountPath
:
/var/run/serving-cert
name
:
volume-serving-cert
readOnly
:
false
-
mountPath
:
/etc/adapter
name
:
config
readOnly
:
false
serviceAccountName
:
prometheus-adapter
volumes
:
-
emptyDir
:
{}
name
:
tmpfs
-
emptyDir
:
{}
name
:
volume-serving-cert
-
configMap
:
name
:
adapter-config
name
:
config
microk8s-resources/actions/prometheus/prometheus-adapter-roleBindingAuthReader.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
RoleBinding
metadata
:
name
:
resource-metrics-auth-reader
namespace
:
kube-system
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
extension-apiserver-authentication-reader
subjects
:
-
kind
:
ServiceAccount
name
:
prometheus-adapter
namespace
:
monitoring
microk8s-resources/actions/prometheus/prometheus-adapter-service.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
Service
metadata
:
labels
:
name
:
prometheus-adapter
name
:
prometheus-adapter
namespace
:
monitoring
spec
:
ports
:
-
name
:
https
port
:
443
targetPort
:
6443
selector
:
name
:
prometheus-adapter
microk8s-resources/actions/prometheus/prometheus-adapter-serviceAccount.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
ServiceAccount
metadata
:
name
:
prometheus-adapter
namespace
:
monitoring
microk8s-resources/actions/prometheus/prometheus-clusterRole.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRole
metadata
:
name
:
prometheus-k8s
rules
:
-
apiGroups
:
-
"
"
resources
:
-
nodes/metrics
verbs
:
-
get
-
nonResourceURLs
:
-
/metrics
verbs
:
-
get
microk8s-resources/actions/prometheus/prometheus-clusterRoleBinding.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
ClusterRoleBinding
metadata
:
name
:
prometheus-k8s
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
ClusterRole
name
:
prometheus-k8s
subjects
:
-
kind
:
ServiceAccount
name
:
prometheus-k8s
namespace
:
monitoring
microk8s-resources/actions/prometheus/prometheus-prometheus.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
monitoring.coreos.com/v1
kind
:
Prometheus
metadata
:
labels
:
prometheus
:
k8s
name
:
k8s
namespace
:
monitoring
spec
:
alerting
:
alertmanagers
:
-
name
:
alertmanager-main
namespace
:
monitoring
port
:
web
baseImage
:
quay.io/prometheus/prometheus
nodeSelector
:
beta.kubernetes.io/os
:
linux
replicas
:
1
resources
:
requests
:
memory
:
400Mi
ruleSelector
:
matchLabels
:
prometheus
:
k8s
role
:
alert-rules
serviceAccountName
:
prometheus-k8s
serviceMonitorNamespaceSelector
:
{}
serviceMonitorSelector
:
{}
version
:
v2.5.0
microk8s-resources/actions/prometheus/prometheus-roleBindingConfig.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
RoleBinding
metadata
:
name
:
prometheus-k8s-config
namespace
:
monitoring
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
prometheus-k8s-config
subjects
:
-
kind
:
ServiceAccount
name
:
prometheus-k8s
namespace
:
monitoring
microk8s-resources/actions/prometheus/prometheus-roleBindingSpecificNamespaces.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
items
:
-
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
RoleBinding
metadata
:
name
:
prometheus-k8s
namespace
:
default
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
prometheus-k8s
subjects
:
-
kind
:
ServiceAccount
name
:
prometheus-k8s
namespace
:
monitoring
-
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
RoleBinding
metadata
:
name
:
prometheus-k8s
namespace
:
kube-system
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
prometheus-k8s
subjects
:
-
kind
:
ServiceAccount
name
:
prometheus-k8s
namespace
:
monitoring
-
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
RoleBinding
metadata
:
name
:
prometheus-k8s
namespace
:
monitoring
roleRef
:
apiGroup
:
rbac.authorization.k8s.io
kind
:
Role
name
:
prometheus-k8s
subjects
:
-
kind
:
ServiceAccount
name
:
prometheus-k8s
namespace
:
monitoring
kind
:
RoleBindingList
microk8s-resources/actions/prometheus/prometheus-roleConfig.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
Role
metadata
:
name
:
prometheus-k8s-config
namespace
:
monitoring
rules
:
-
apiGroups
:
-
"
"
resources
:
-
configmaps
verbs
:
-
get
microk8s-resources/actions/prometheus/prometheus-roleSpecificNamespaces.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
rbac.authorization.k8s.io/v1
items
:
-
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
Role
metadata
:
name
:
prometheus-k8s
namespace
:
default
rules
:
-
apiGroups
:
-
"
"
resources
:
-
nodes
-
services
-
endpoints
-
pods
verbs
:
-
get
-
list
-
watch
-
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
Role
metadata
:
name
:
prometheus-k8s
namespace
:
kube-system
rules
:
-
apiGroups
:
-
"
"
resources
:
-
nodes
-
services
-
endpoints
-
pods
verbs
:
-
get
-
list
-
watch
-
apiVersion
:
rbac.authorization.k8s.io/v1
kind
:
Role
metadata
:
name
:
prometheus-k8s
namespace
:
monitoring
rules
:
-
apiGroups
:
-
"
"
resources
:
-
nodes
-
services
-
endpoints
-
pods
verbs
:
-
get
-
list
-
watch
kind
:
RoleList
microk8s-resources/actions/prometheus/prometheus-rules.yaml
0 → 100644
View file @
1a265d2d
This diff is collapsed.
Click to expand it.
microk8s-resources/actions/prometheus/prometheus-service.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
Service
metadata
:
labels
:
prometheus
:
k8s
name
:
prometheus-k8s
namespace
:
monitoring
spec
:
ports
:
-
name
:
web
port
:
9090
targetPort
:
web
selector
:
app
:
prometheus
prometheus
:
k8s
microk8s-resources/actions/prometheus/prometheus-serviceAccount.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
v1
kind
:
ServiceAccount
metadata
:
name
:
prometheus-k8s
namespace
:
monitoring
microk8s-resources/actions/prometheus/prometheus-serviceMonitor.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
monitoring.coreos.com/v1
kind
:
ServiceMonitor
metadata
:
labels
:
k8s-app
:
prometheus
name
:
prometheus
namespace
:
monitoring
spec
:
endpoints
:
-
interval
:
30s
port
:
web
selector
:
matchLabels
:
prometheus
:
k8s
microk8s-resources/actions/prometheus/prometheus-serviceMonitorApiserver.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
monitoring.coreos.com/v1
kind
:
ServiceMonitor
metadata
:
labels
:
k8s-app
:
apiserver
name
:
kube-apiserver
namespace
:
monitoring
spec
:
endpoints
:
-
bearerTokenFile
:
/var/run/secrets/kubernetes.io/serviceaccount/token
interval
:
30s
metricRelabelings
:
-
action
:
drop
regex
:
etcd_(debugging|disk|request|server).*
sourceLabels
:
-
__name__
port
:
https
scheme
:
https
tlsConfig
:
caFile
:
/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
serverName
:
kubernetes
jobLabel
:
component
namespaceSelector
:
matchNames
:
-
default
selector
:
matchLabels
:
component
:
apiserver
provider
:
kubernetes
microk8s-resources/actions/prometheus/prometheus-serviceMonitorCoreDNS.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
monitoring.coreos.com/v1
kind
:
ServiceMonitor
metadata
:
labels
:
k8s-app
:
coredns
name
:
coredns
namespace
:
monitoring
spec
:
endpoints
:
-
bearerTokenFile
:
/var/run/secrets/kubernetes.io/serviceaccount/token
interval
:
15s
port
:
metrics
namespaceSelector
:
matchNames
:
-
kube-system
selector
:
matchLabels
:
k8s-app
:
kube-dns
microk8s-resources/actions/prometheus/prometheus-serviceMonitorKubeControllerManager.yaml
0 → 100644
View file @
1a265d2d
apiVersion
:
monitoring.coreos.com/v1
kind
:
ServiceMonitor
metadata
:
labels
:
k8s-app
:
kube-controller-manager
name
:
kube-controller-manager
namespace
:
monitoring
spec
:
endpoints
:
-
interval
:
30s
metricRelabelings
:
-
action
:
drop
regex
:
etcd_(debugging|disk|request|server).*
sourceLabels
:
-
__name__
port
:
http-metrics
jobLabel
:
k8s-app
namespaceSelector
:
matchNames
:
-
kube-system
selector
:
matchLabels
:
k8s-app
:
kube-controller-manager
Prev
1
2
3
4
Next
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment