fet: include ingress network policy for thanos
This commit is contained in:
47
examples/prometheus-thanos.jsonnet
Normal file
47
examples/prometheus-thanos.jsonnet
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
local kp =
|
||||||
|
(import 'kube-prometheus/main.libsonnet') +
|
||||||
|
// Uncomment the following imports to enable its patches
|
||||||
|
// (import 'kube-prometheus/addons/anti-affinity.libsonnet') +
|
||||||
|
// (import 'kube-prometheus/addons/managed-cluster.libsonnet') +
|
||||||
|
// (import 'kube-prometheus/addons/node-ports.libsonnet') +
|
||||||
|
// (import 'kube-prometheus/addons/static-etcd.libsonnet') +
|
||||||
|
// (import 'kube-prometheus/addons/custom-metrics.libsonnet') +
|
||||||
|
// (import 'kube-prometheus/addons/external-metrics.libsonnet') +
|
||||||
|
// (import 'kube-prometheus/addons/pyrra.libsonnet') +
|
||||||
|
{
|
||||||
|
values+:: {
|
||||||
|
common+: {
|
||||||
|
namespace: 'monitoring',
|
||||||
|
},
|
||||||
|
prometheus+: {
|
||||||
|
thanos: {
|
||||||
|
baseImage: 'quay.io/thanos/thanos',
|
||||||
|
version: 'v0.8.1',
|
||||||
|
objectStorageConfig: {
|
||||||
|
key: 'thanos.yaml',
|
||||||
|
name: 'thanos-objstore-config',
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
};
|
||||||
|
|
||||||
|
{ 'setup/0namespace-namespace': kp.kubePrometheus.namespace } +
|
||||||
|
{
|
||||||
|
['setup/prometheus-operator-' + name]: kp.prometheusOperator[name]
|
||||||
|
for name in std.filter((function(name) name != 'serviceMonitor' && name != 'prometheusRule'), std.objectFields(kp.prometheusOperator))
|
||||||
|
} +
|
||||||
|
// { 'setup/pyrra-slo-CustomResourceDefinition': kp.pyrra.crd } +
|
||||||
|
// serviceMonitor and prometheusRule are separated so that they can be created after the CRDs are ready
|
||||||
|
{ 'prometheus-operator-serviceMonitor': kp.prometheusOperator.serviceMonitor } +
|
||||||
|
{ 'prometheus-operator-prometheusRule': kp.prometheusOperator.prometheusRule } +
|
||||||
|
{ 'kube-prometheus-prometheusRule': kp.kubePrometheus.prometheusRule } +
|
||||||
|
{ ['alertmanager-' + name]: kp.alertmanager[name] for name in std.objectFields(kp.alertmanager) } +
|
||||||
|
{ ['blackbox-exporter-' + name]: kp.blackboxExporter[name] for name in std.objectFields(kp.blackboxExporter) } +
|
||||||
|
{ ['grafana-' + name]: kp.grafana[name] for name in std.objectFields(kp.grafana) } +
|
||||||
|
// { ['pyrra-' + name]: kp.pyrra[name] for name in std.objectFields(kp.pyrra) if name != 'crd' } +
|
||||||
|
{ ['kube-state-metrics-' + name]: kp.kubeStateMetrics[name] for name in std.objectFields(kp.kubeStateMetrics) } +
|
||||||
|
{ ['kubernetes-' + name]: kp.kubernetesControlPlane[name] for name in std.objectFields(kp.kubernetesControlPlane) }
|
||||||
|
{ ['node-exporter-' + name]: kp.nodeExporter[name] for name in std.objectFields(kp.nodeExporter) } +
|
||||||
|
{ ['prometheus-' + name]: kp.prometheus[name] for name in std.objectFields(kp.prometheus) } +
|
||||||
|
{ ['prometheus-adapter-' + name]: kp.prometheusAdapter[name] for name in std.objectFields(kp.prometheusAdapter) }
|
||||||
@@ -128,7 +128,8 @@ function(params) {
|
|||||||
port: 9090,
|
port: 9090,
|
||||||
protocol: 'TCP',
|
protocol: 'TCP',
|
||||||
}],
|
}],
|
||||||
}, {
|
}] + ( if p._config.thanos != null then
|
||||||
|
[{
|
||||||
from: [{
|
from: [{
|
||||||
podSelector: {
|
podSelector: {
|
||||||
matchLabels: {
|
matchLabels: {
|
||||||
@@ -140,7 +141,7 @@ function(params) {
|
|||||||
port: 10901,
|
port: 10901,
|
||||||
protocol: 'TCP',
|
protocol: 'TCP',
|
||||||
}],
|
}],
|
||||||
}],
|
}] else []),
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user