Skip to content

Commit

Permalink
Only scrape metrics of containers within sourcegraph namespace (#2969)
Browse files Browse the repository at this point in the history
  • Loading branch information
daxmc99 authored May 18, 2021
1 parent 9e3c27c commit 698797c
Show file tree
Hide file tree
Showing 3 changed files with 286 additions and 2 deletions.
8 changes: 6 additions & 2 deletions base/prometheus/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,11 @@

<img src="../../docs/images/prometheus.png" />

A Prometheus instance is part of the default Sourcegraph cluster installation.
A Prometheus instance is part of the default Sourcegraph cluster installation.

## Developer notes

Ensure changes here are also made in our namespaced overlay [../../overlays/namespaced/](../../overlays/namespaced/)

## Optional Steps

Expand Down Expand Up @@ -98,7 +102,7 @@ ingress rules. On most infrastructure providers, the steps are roughly the follo
Some customers may want to make the Prometheus API endpoint accessible to other services like the
following:
- An analytics visualization tool like Grafana
- An analytics visualization tool like Grafana
(note: an instance of Grafana is part of the default Sourcegraph cluster installation)
- An metrics ingestion pipeline
Expand Down
1 change: 1 addition & 0 deletions overlays/namespaced/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,5 @@ bases:
- ../bases/pvcs
patchesStrategicMerge:
- prometheus/prometheus.ClusterRoleBinding.yaml
- prometheus/prometheus.ConfigMap.yaml
- cadvisor/cadvisor.ClusterRoleBinding.yaml
279 changes: 279 additions & 0 deletions overlays/namespaced/prometheus/prometheus.ConfigMap.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,279 @@
apiVersion: v1
data:
prometheus.yml: |
global:
scrape_interval: 30s
evaluation_interval: 30s
alerting:
alertmanagers:
# Bundled Alertmanager, started by prom-wrapper
- static_configs:
- targets: ['127.0.0.1:9093']
path_prefix: /alertmanager
# Uncomment the following to have alerts delivered to additional Alertmanagers discovered
# in the cluster. This configuration is not required if you use Sourcegraph's built-in alerting:
# https://docs.sourcegraph.com/admin/observability/alerting
# - kubernetes_sd_configs:
# - role: endpoints
# relabel_configs:
# - source_labels: [__meta_kubernetes_service_name]
# regex: alertmanager
# action: keep
rule_files:
- '*_rules.yml'
- "/sg_config_prometheus/*_rules.yml"
- "/sg_prometheus_add_ons/*_rules.yml"
# A scrape configuration for running Prometheus on a Kubernetes cluster.
# This uses separate scrape configs for cluster components (i.e. API server, node)
# and services to allow each to use different authentication configs.
#
# Kubernetes labels will be added as Prometheus labels on metrics via the
# `labelmap` relabeling action.
# Scrape config for API servers.
#
# Kubernetes exposes API servers as endpoints to the default/kubernetes
# service so this uses `endpoints` role and uses relabelling to only keep
# the endpoints associated with the default/kubernetes service using the
# default named port `https`. This works for single API server deployments as
# well as HA API server deployments.
scrape_configs:
- job_name: 'kubernetes-apiservers'
kubernetes_sd_configs:
- role: endpoints
# Default to scraping over https. If required, just disable this or change to
# `http`.
scheme: https
# This TLS & bearer token file config is used to connect to the actual scrape
# endpoints for cluster components. This is separate to discovery auth
# configuration because discovery & scraping are two separate concerns in
# Prometheus. The discovery auth config is automatic if Prometheus runs inside
# the cluster. Otherwise, more config options have to be provided within the
# <kubernetes_sd_config>.
tls_config:
ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
# If your node certificates are self-signed or use a different CA to the
# master CA, then disable certificate verification below. Note that
# certificate verification is an integral part of a secure infrastructure
# so this should only be disabled in a controlled environment. You can
# disable certificate verification by uncommenting the line below.
#
# insecure_skip_verify: true
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
# Keep only the default/kubernetes service endpoints for the https port. This
# will add targets for each API server which Kubernetes adds an endpoint to
# the default/kubernetes service.
relabel_configs:
- source_labels: [__meta_kubernetes_namespace, __meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name]
action: keep
regex: default;kubernetes;https
- job_name: 'kubernetes-nodes'
# Default to scraping over https. If required, just disable this or change to
# `http`.
scheme: https
# This TLS & bearer token file config is used to connect to the actual scrape
# endpoints for cluster components. This is separate to discovery auth
# configuration because discovery & scraping are two separate concerns in
# Prometheus. The discovery auth config is automatic if Prometheus runs inside
# the cluster. Otherwise, more config options have to be provided within the
# <kubernetes_sd_config>.
tls_config:
ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
# If your node certificates are self-signed or use a different CA to the
# master CA, then disable certificate verification below. Note that
# certificate verification is an integral part of a secure infrastructure
# so this should only be disabled in a controlled environment. You can
# disable certificate verification by uncommenting the line below.
#
insecure_skip_verify: true
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
kubernetes_sd_configs:
- role: node
relabel_configs:
- action: labelmap
regex: __meta_kubernetes_node_label_(.+)
- target_label: __address__
replacement: kubernetes.default.svc:443
- source_labels: [__meta_kubernetes_node_name]
regex: (.+)
target_label: __metrics_path__
replacement: /api/v1/nodes/${1}/proxy/metrics
# Scrape config for service endpoints.
#
# The relabeling allows the actual service scrape endpoint to be configured
# via the following annotations:
#
# * `prometheus.io/scrape`: Only scrape services that have a value of `true`
# * `prometheus.io/scheme`: If the metrics endpoint is secured then you will need
# to set this to `https` & most likely set the `tls_config` of the scrape config.
# * `prometheus.io/path`: If the metrics path is not `/metrics` override this.
# * `prometheus.io/port`: If the metrics are exposed on a different port to the
# service then set this appropriately.
- job_name: 'kubernetes-service-endpoints'
kubernetes_sd_configs:
- role: endpoints
relabel_configs:
- source_labels: [__meta_kubernetes_service_annotation_sourcegraph_prometheus_scrape]
action: keep
regex: true
- source_labels: [__meta_kubernetes_pod_container_name]
action: drop
regex: jaeger-agent
- source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme]
action: replace
target_label: __scheme__
regex: (https?)
- source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path]
action: replace
target_label: __metrics_path__
regex: (.+)
- source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port]
action: replace
target_label: __address__
regex: (.+)(?::\d+);(\d+)
replacement: $1:$2
- action: labelmap
regex: __meta_kubernetes_service_label_(.+)
- source_labels: [__meta_kubernetes_namespace]
action: replace
# Sourcegraph specific customization. We want a more convenient to type label.
# target_label: kubernetes_namespace
target_label: ns
- source_labels: [__meta_kubernetes_service_name]
action: replace
target_label: kubernetes_name
# Sourcegraph specific customization. We want a nicer name for job
- source_labels: [app]
action: replace
target_label: job
# Sourcegraph specific customization. We want a nicer name for instance
- source_labels: [__meta_kubernetes_pod_name]
action: replace
target_label: instance
# Example scrape config for probing services via the Blackbox Exporter.
#
# The relabeling allows the actual service scrape endpoint to be configured
# via the following annotations:
#
# * `prometheus.io/probe`: Only probe services that have a value of `true`
- job_name: 'kubernetes-services'
metrics_path: /probe
params:
module: [http_2xx]
kubernetes_sd_configs:
- role: service
relabel_configs:
- source_labels: [__meta_kubernetes_service_annotation_prometheus_io_probe]
action: keep
regex: true
- source_labels: [__address__]
target_label: __param_target
- target_label: __address__
replacement: blackbox
- source_labels: [__param_target]
target_label: instance
- action: labelmap
regex: __meta_kubernetes_service_label_(.+)
- source_labels: [__meta_kubernetes_service_namespace]
# Sourcegraph specific customization. We want a more convenient to type label.
# target_label: kubernetes_namespace
target_label: ns
- source_labels: [__meta_kubernetes_service_name]
target_label: kubernetes_name
# Example scrape config for pods
#
# The relabeling allows the actual pod scrape endpoint to be configured via the
# following annotations:
#
# * `prometheus.io/scrape`: Only scrape pods that have a value of `true`
# * `prometheus.io/path`: If the metrics path is not `/metrics` override this.
# * `prometheus.io/port`: Scrape the pod on the indicated port instead of the default of `9102`.
- job_name: 'kubernetes-pods'
kubernetes_sd_configs:
- role: pod
relabel_configs:
- source_labels: [__meta_kubernetes_pod_annotation_sourcegraph_prometheus_scrape]
action: keep
regex: true
- source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path]
action: replace
target_label: __metrics_path__
regex: (.+)
- source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port]
action: replace
regex: (.+):(?:\d+);(\d+)
replacement: ${1}:${2}
target_label: __address__
- action: labelmap
regex: __meta_kubernetes_pod_label_(.+)
- source_labels: [__meta_kubernetes_pod_name]
action: replace
target_label: kubernetes_pod_name
# Sourcegraph specific customization. We want a more convenient to type label.
# target_label: kubernetes_namespace
- source_labels: [__meta_kubernetes_namespace]
action: replace
target_label: ns
metric_relabel_configs:
# cAdvisor-specific customization. Drop container metrics exported by cAdvisor
# not in the same namespace as Sourcegraph.
# Uncomment this if you have problems with certain dashboards or cAdvisor itself
# picking up non-Sourcegraph services. Ensure all Sourcegraph services are running
# within the Sourcegraph namespace you have defined.
# The regex must keep matches on '^$' (empty string) to ensure other metrics do not
# get dropped.
- source_labels: [container_label_io_kubernetes_pod_namespace]
regex: ^$|ns-sourcegraph # ensure this matches with namespace declarations
action: keep
# cAdvisor-specific customization. We want container metrics to be named after their container name label.
# Note that 'io.kubernetes.container.name' and 'io.kubernetes.pod.name' must be provided in cAdvisor
# '--whitelisted_container_labels' (see cadvisor.DaemonSet.yaml)
- source_labels: [container_label_io_kubernetes_container_name, container_label_io_kubernetes_pod_name]
regex: (.+)
action: replace
target_label: name
separator: '-'
# Scrape prometheus itself for metrics.
- job_name: 'builtin-prometheus'
static_configs:
- targets: ['127.0.0.1:9092']
labels:
app: prometheus
- job_name: 'builtin-alertmanager'
metrics_path: /alertmanager/metrics
static_configs:
- targets: ['127.0.0.1:9093']
labels:
app: alertmanager
extra_rules.yml: ""
kind: ConfigMap
metadata:
labels:
deploy: sourcegraph
sourcegraph-resource-requires: no-cluster-admin
app.kubernetes.io/component: prometheus
name: prometheus

0 comments on commit 698797c

Please sign in to comment.