Commit Graph

307 Commits

Author SHA1 Message Date
Max Leonard Inden
9e180452f8 prometheus: Introduce RuleFile Custom Resource Definition
This patch introduces a new Custom Resource Definition to the
Prometheus Operator - the Rule CRD. It addresses two main
needs:

1. Prometheus (alerting and recording) Rule validation during creation time
via Kubernetes Custom Resource Definition validation.

2. Life-cycle management of Prometheus application Rules alongside the
application itself, inside the applications Kubernetes namespace, not
necessarily the namespace of the scraping Prometheus instance.

A user defines Prometheus alerting and recording Rules via a Kubernetes
Custom Resource Definition. These Custom Resource Definitions can be
fully validated by the Kubernetes API server during creation time via
automatically generated OpenAPI specifications. Instead of the
restriction of a Prometheus instance to only select Rule definitions
inside its own namespace, the Prometheus specification is extended to
also specify namespaces to look for Rule Custom Resource Definitions
outside its own namespace.

---

Dependent technical changes:

- prometheus: Use github.com/jimmidyson/configmap-reload to reload rules

- prometheus: Remove Prometheus Statefulset deletion function. Starting
with K8s >=1.8 this is handled via OwnerReferences.

- prometheus: Do not add rule files checksum to Prometheus configuration
secret

- prometheus: Update StatefulSet only on relevant changes. Instead of
updating the Prometheus StatefulSet on every `sync()` run, only update
it if the input parameters to `makeStatefulSet` change.  Enforce this
via a checksum of the parameters which is saved inside the annotations
of the statefulset.

- e2e/prometheus: Check how often resources (Secret, ConfigMap,
Prometheus CRD, Service) are updated to enforce that Prometheus Operator
only updated created resources if necessary.

- contrib/prometheus-config-reloader: Remove logic to retriev K8s
ConfigMaps. These are mounted into the pod right away now.
2018-05-18 16:27:20 +02:00
Max Leonard Inden
0461c85098 docs: Run embedmd on both Docs and kube-prometheus README.md 2018-05-14 11:55:16 +02:00
Max Leonard Inden
0124e8c272 contrib/kube-prometheus: add -f to rm in build.sh
According to the man pages of `rm` and the `-f` option:
> Attempt to remove the files without prompting for confirma- tion,
> regardless of the file's permissions.  If the file does not exist, do
> not display a diagnostic message or modify the exit status to reflect an
> error.  The -f option overrides any previous -i options.

This patch prevents the `build.sh` script from failing if files do not
exist when attempting to delete them.
2018-05-11 11:23:10 +02:00
piglei™
a9e667d24c kube-prometheus: fix alert rule K8SManyNodesNotReady (#1313)
* kube-prometheus: fix alert rule K8SManyNodesNotReady

* fix alert "K8SManyNodesNotReady" in helm templates & make generate

* Use sync_kube_prometheus.py to make rules in helm in sync
2018-05-11 10:59:34 +02:00
Giancarlo Rubio
2a6b3db38b Fix CI running make generate (#1327) 2018-05-10 17:50:14 +02:00
Frederic Branczyk
116aaf88be kube-prometheus: regenerate 2018-05-08 07:36:13 -07:00
Frederic Branczyk
3388f96afe Address comments 2018-05-06 08:29:52 -07:00
Frederic Branczyk
edf21e4382 kube-prometheus/jsonnet: Use jsonnet-bundler 2018-04-28 19:05:19 +01:00
Max Leonard Inden
992bcdccc1 *: Bump version to v0.19.0 2018-04-26 21:42:57 +02:00
Frederic Branczyk
8406f8a7a0 Merge pull request #1254 from mxinden/fix-jsonnet-version
kube-prometheus: Remove hard-coded Prometheus Operator version
2018-04-26 13:39:08 +01:00
Max Leonard Inden
157ad7eaea kube-prometheus: Update Prometheus Operator version before generating 2018-04-26 12:50:51 +02:00
Brandon Dimcheff
45076a6a1f kube-prometheus: fix addon-resizer role binding
The addon resizer was referring to an incorrect role binding and was unable to
access the API.  This changes the rolebinding name to refer to the correctly
defined rolebinding.
2018-04-25 22:05:56 -04:00
Max Inden
c776fa4c48 Merge pull request #1238 from brancz/kube-prometheus-fixes
Various kube-prometheus fixes
2018-04-23 14:15:17 +02:00
Frederic Branczyk
8c49a641e2 kube-prometheus/hack: Fix cyclic ServiceMonitor dependency
Previously the script errored out, as ServiceMonitor objects are only
registered once the Prometheus Operator is running.
2018-04-23 10:16:07 +01:00
naseemkullah
754ba95991 Update Monitoring external etcd.md 2018-04-22 22:31:04 -04:00
Frederic Branczyk
2afaeab294 kube-prometheus: Update to latest kubernetes-grafana 2018-04-22 16:37:13 +01:00
Frederic Branczyk
0610c45e13 kube-prometheus: Fix rule label selector 2018-04-22 10:50:58 +01:00
Frederic Branczyk
7c07940cb8 kube-prometheus: Fix config reloader RBAC 2018-04-22 10:50:26 +01:00
Max Inden
26d1dc86c9 Merge pull request #1229 from mxinden/move-serv-mon-to-target
kube-prometheus: Move service monitors to target folder
2018-04-18 14:15:26 +02:00
Max Leonard Inden
971ed1010e kube-prometheus: Move service monitors to target folder
With 1d00e0ab ("ServiceMonitor: Enable Prometheus to select ServMon
outside own ns") merged: To emphasize the fact, that ServiceMonitors can
be deployed alongside their targets, this patch moves the Alertmanager,
Kube-State-Metrics, Node-Exporter and Prometheus Operator
Service-Monitor into the respective target folder in the kube-prometheus
project.
2018-04-18 13:44:45 +02:00
Joakim Karlsson
f6dae8bd71 updated jsonnet code 2018-04-18 12:52:58 +02:00
Joakim Karlsson
00df72cf5e cleanup 2018-04-18 11:20:45 +02:00
Joakim Karlsson
e3e5105699 added rbac permissions for operator to work properly 2018-04-18 11:15:18 +02:00
Max Inden
73e9a9882f Merge pull request #1206 from brancz/jsonnet
Convert kube-prometheus to jsonnet
2018-04-17 09:52:49 +02:00
naseemkullah
73b3259f62 Update kube-prometheus-on-kubeadm.md
In kubeadm 1.10 (and perhaps earlier versions, not sure), ctrl-mgr and scheduler pods' label key is `component=` rather than `k8s-app=`, which is the selector key used for kube-prometheus exporters for these components.
2018-04-15 02:01:30 -04:00
Max Inden
b1aae67d99 Merge pull request #1219 from coreos/thanos4
Enable Thanos sidecar
2018-04-13 17:05:38 +02:00
Max Leonard Inden
3b13afb562 kube-prometheus/thanos: Move to experimental folder
In preparation of PR #1206 [1], This patch moves the Thanos manifests to the
`experimental` folder.

[1] https://github.com/coreos/prometheus-operator/pull/1206
2018-04-13 15:10:18 +02:00
Frederic Branczyk
507617e150 Remove old manifests and replace with jsonnet build 2018-04-13 13:36:34 +02:00
Fabian Reinartz
e7e23cd81f contrib: add Thanos example manifests 2018-04-13 11:53:43 +02:00
Frederic Branczyk
d8692794a9 kube-prometheus: Convert to jsonnet 2018-04-11 18:51:35 +02:00
Frederic Branczyk
0d142fe9da Merge pull request #1205 from zuzzas/cpu-rules
Fixed CPU accounting in recording rules
2018-04-11 15:08:15 +02:00
Arslanbekov Denis
a2d273b11a In description is displayed correctly namespace (#1190)
* in description is displayed correctly namespace

* Bump kube state version

* Update Chart.yaml
2018-04-10 17:18:24 +02:00
Andrey Klimentyev
f9b03ddd9d kube-prometheus: fixed CPU accounting
Currently, node recording rules feature
an incorrect idle CPU accounting. This
change aims to fix that.
2018-04-10 15:14:48 +03:00
Max Leonard Inden
b10e343689 kube-prometheus: Fix minor typo 2018-04-10 10:27:54 +02:00
Frederic Branczyk
63ae4ee19e Merge pull request #1200 from coreos/release-0.18
Cut 0.18.1 back to master
2018-04-09 18:32:57 +02:00
Max Leonard Inden
46c49616e0 *: Bump version to v0.18.1 2018-04-09 14:47:34 +02:00
Keyvan Hedayati
b6e2f2ae31 Minor typo fix 2018-04-07 17:09:22 +04:30
Richard Maynard
889eca2cd4 charts: Add Core DNS Support (#1176)
* charts: Add Core DNS Support

With CoreDNS becoming a first class citizen it should be an optional part
of the kube-prometheus deployment.

Fixes: #1174

* added kube-prometheus service and service monitor

In order to work directly with a cluster created by bootkube used port 9153,
and created a service exposing metrics since bootkube does does not. Also in
the helm chart changed the default port to 9153 since that is the coredns
plugins default port and to be consistent throughout the repo.
2018-04-05 09:57:56 +02:00
Frederic Branczyk
b566db5d4b *: Bump version to v0.18.0 2018-04-04 10:06:38 +02:00
Sébastien GLON
2c10f81102 Add new alert for samples rejected due ti duplicate timestamp (#1148)
Signed-off-by: Sébastien GLON <sebastien.glon@akeneo.com>
2018-03-26 18:11:40 +02:00
Frederic Branczyk
22513e0475 Merge pull request #1145 from brancz/targetlabels
prometheus: Add ability to whitelist Kubernetes labels
2018-03-26 05:49:39 -04:00
Michael Pietzsch
e50adc0926 Grafana Update to 5.0.3 (#1149) 2018-03-26 05:25:41 -04:00
Frederic Branczyk
3246c48913 prometheus: Add ability to whitelist Kubernetes labels 2018-03-23 16:13:28 +01:00
Alexander Holte-Davidsen
4c77a9db1d Update Alert Manager rules for NodeDiskRunningFull with summary 2018-03-22 11:32:38 +01:00
Frederic Branczyk
07263e98c0 *: upgrade client-go 2018-03-21 14:24:45 +01:00
Frederic Branczyk
3c278a202f Merge branch 'master' into restrict-service-monitor 2018-03-20 08:47:43 -04:00
Max Leonard Inden
310f471cf6 contrib/kube: Add rbac role to discover prometheus
The current example-app setup in the kube-prometheus project is able to
discover scraping targets in the default namespace. It is not able to
discover the configured Alertmanager in the monitoring namespace.

This patch adds an alertmanager-discovery rbac role, to permit the
above described action. In addition it does the following cleanups:

- Remove kubeconfig configuration in deploy and teardown script. kubectl
chooses .kube/config whenever KUBECONFIG is not set by default

- Remove namespace specification option via NAMESPACE env var. In most
of the manifests the metadata/namespace was hardcoded anyways, in
addition in the promtheus frontend role binding the service account
namespace is hardcoded to default as well.

- Instead of `kubectl {apply,delete}` individual manifests, the deploy
and teardown shell scripts {apply,delete} on the entire folder.
2018-03-19 17:13:33 +01:00
Max Leonard Inden
2f302943fe Unify rule file label accross repository
In some cases we have been using `alert-rules` in some cases
`prometheus-rulefiles`. This led to confusion [1]. Instead, unify the
Prometheus rules configmap labels to:

```yaml
labels:
  role: alert-rules
```

[1] https://github.com/coreos/prometheus-operator/issues/1102
2018-03-19 14:24:48 +01:00
Max Leonard Inden
3a6d38ea0e contrib/kube: Restrict example-app servicemonitor to default ns
The `prometheus-frontend` role of the example app kubeprometheus section
is scoped to the default namespace. Thereby the frontend Prometheus
instance is not able to discover anything outside of the default
namespace. We might as well restrict the front end service monitor to
the default namespace too.
2018-03-19 13:34:18 +01:00
Laurent Godet
0bda22e380 Update Prometheus to 2.2.1 2018-03-14 19:34:35 +00:00