File tree 8 files changed +52
-2
lines changed
aws/container-linux/kubernetes
bare-metal/container-linux/kubernetes/cl
digital-ocean/container-linux/kubernetes/cl
google-cloud/container-linux/kubernetes
8 files changed +52
-2
lines changed Original file line number Diff line number Diff line change @@ -112,6 +112,26 @@ data:
112
112
target_label: __metrics_path__
113
113
replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor
114
114
115
+ # Scrap etcd metrics from controllers
116
+ - job_name: 'etcd'
117
+ kubernetes_sd_configs:
118
+ - role: node
119
+ scheme: http
120
+ tls_config:
121
+ ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
122
+ bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
123
+
124
+ relabel_configs:
125
+ - source_labels: [__meta_kubernetes_node_label_node_role_kubernetes_io_controller]
126
+ action: keep
127
+ regex: 'true'
128
+ - action: labelmap
129
+ regex: __meta_kubernetes_node_label_(.+)
130
+ - source_labels: [__meta_kubernetes_node_name]
131
+ action: replace
132
+ target_label: __address__
133
+ replacement: '${1}:2381'
134
+
115
135
# Scrape config for service endpoints.
116
136
#
117
137
# The relabeling allows the actual service scrape endpoint to be configured
Original file line number Diff line number Diff line change 15
15
name: prometheus
16
16
phase: prod
17
17
spec:
18
+ nodeSelector:
19
+ node-role.kubernetes.io/master: ""
20
+ tolerations:
21
+ - key: node-role.kubernetes.io/master
22
+ operator: Exists
23
+ effect: NoSchedule
18
24
serviceAccountName: prometheus
19
25
containers:
20
26
- name: prometheus
Original file line number Diff line number Diff line change @@ -13,6 +13,7 @@ systemd:
13
13
Environment="ETCD_INITIAL_ADVERTISE_PEER_URLS=https://${etcd_domain}:2380"
14
14
Environment="ETCD_LISTEN_CLIENT_URLS=https://0.0.0.0:2379"
15
15
Environment="ETCD_LISTEN_PEER_URLS=https://0.0.0.0:2380"
16
+ Environment="ETCD_LISTEN_METRICS_URLS=http://0.0.0.0:2381"
16
17
Environment="ETCD_INITIAL_CLUSTER=${etcd_initial_cluster}"
17
18
Environment="ETCD_STRICT_RECONFIG_CHECK=true"
18
19
Environment="ETCD_SSL_DIR=/etc/ssl/etcd"
Original file line number Diff line number Diff line change @@ -81,6 +81,16 @@ resource "aws_security_group_rule" "controller-node-exporter" {
81
81
source_security_group_id = "${aws_security_group.worker.id}"
82
82
}
83
83
84
+ resource "aws_security_group_rule" "controller-node-exporter-self" {
85
+ security_group_id = "${aws_security_group.controller.id}"
86
+
87
+ type = "ingress"
88
+ protocol = "tcp"
89
+ from_port = 9100
90
+ to_port = 9100
91
+ self = true
92
+ }
93
+
84
94
resource "aws_security_group_rule" "controller-kubelet-self" {
85
95
security_group_id = "${aws_security_group.controller.id}"
86
96
@@ -256,6 +266,16 @@ resource "aws_security_group_rule" "worker-flannel-self" {
256
266
resource "aws_security_group_rule" "worker-node-exporter" {
257
267
security_group_id = "${aws_security_group.worker.id}"
258
268
269
+ type = "ingress"
270
+ protocol = "tcp"
271
+ from_port = 9100
272
+ to_port = 9100
273
+ source_security_group_id = "${aws_security_group.controller.id}"
274
+ }
275
+
276
+ resource "aws_security_group_rule" "worker-node-exporter-self" {
277
+ security_group_id = "${aws_security_group.worker.id}"
278
+
259
279
type = "ingress"
260
280
protocol = "tcp"
261
281
from_port = 9100
Original file line number Diff line number Diff line change @@ -13,6 +13,7 @@ systemd:
13
13
Environment="ETCD_INITIAL_ADVERTISE_PEER_URLS=https://${domain_name}:2380"
14
14
Environment="ETCD_LISTEN_CLIENT_URLS=https://0.0.0.0:2379"
15
15
Environment="ETCD_LISTEN_PEER_URLS=https://0.0.0.0:2380"
16
+ Environment="ETCD_LISTEN_METRICS_URLS=http://0.0.0.0:2381"
16
17
Environment="ETCD_INITIAL_CLUSTER=${etcd_initial_cluster}"
17
18
Environment="ETCD_STRICT_RECONFIG_CHECK=true"
18
19
Environment="ETCD_SSL_DIR=/etc/ssl/etcd"
Original file line number Diff line number Diff line change @@ -13,6 +13,7 @@ systemd:
13
13
Environment="ETCD_INITIAL_ADVERTISE_PEER_URLS=https://${etcd_domain}:2380"
14
14
Environment="ETCD_LISTEN_CLIENT_URLS=https://0.0.0.0:2379"
15
15
Environment="ETCD_LISTEN_PEER_URLS=https://0.0.0.0:2380"
16
+ Environment="ETCD_LISTEN_METRICS_URLS=http://0.0.0.0:2381"
16
17
Environment="ETCD_INITIAL_CLUSTER=${etcd_initial_cluster}"
17
18
Environment="ETCD_STRICT_RECONFIG_CHECK=true"
18
19
Environment="ETCD_SSL_DIR=/etc/ssl/etcd"
Original file line number Diff line number Diff line change @@ -13,6 +13,7 @@ systemd:
13
13
Environment="ETCD_INITIAL_ADVERTISE_PEER_URLS=https://${etcd_domain}:2380"
14
14
Environment="ETCD_LISTEN_CLIENT_URLS=https://0.0.0.0:2379"
15
15
Environment="ETCD_LISTEN_PEER_URLS=https://0.0.0.0:2380"
16
+ Environment="ETCD_LISTEN_METRICS_URLS=http://0.0.0.0:2381"
16
17
Environment="ETCD_INITIAL_CLUSTER=${etcd_initial_cluster}"
17
18
Environment="ETCD_STRICT_RECONFIG_CHECK=true"
18
19
Environment="ETCD_SSL_DIR=/etc/ssl/etcd"
Original file line number Diff line number Diff line change @@ -93,7 +93,7 @@ resource "google_compute_firewall" "internal-flannel" {
93
93
target_tags = ["${var.cluster_name}-controller", "${var.cluster_name}-worker"]
94
94
}
95
95
96
- # Allow prometheus (workload) to scrape node-exporter daemonset
96
+ # Allow Prometheus to scrape node-exporter daemonset
97
97
resource "google_compute_firewall" "internal-node-exporter" {
98
98
name = "${var.cluster_name}-internal-node-exporter"
99
99
network = "${google_compute_network.network.name}"
@@ -103,7 +103,7 @@ resource "google_compute_firewall" "internal-node-exporter" {
103
103
ports = [9100]
104
104
}
105
105
106
- source_tags = ["${var.cluster_name}-worker"]
106
+ source_tags = ["${var.cluster_name}-controller", "${var.cluster_name}- worker"]
107
107
target_tags = ["${var.cluster_name}-controller", "${var.cluster_name}-worker"]
108
108
}
109
109
You can’t perform that action at this time.
0 commit comments