From 17d2831fc510816699dd16a58bfa4e6c5b1f58b6 Mon Sep 17 00:00:00 2001 From: Vladislav Polyakov <polrkov.tm@gmail.com> Date: Tue, 19 Apr 2022 10:27:14 +0300 Subject: [PATCH] fet: include ingress network policy for thanos --- examples/prometheus-thanos.jsonnet | 47 +++++++++++++++++++ .../components/prometheus.libsonnet | 5 +- 2 files changed, 50 insertions(+), 2 deletions(-) create mode 100644 examples/prometheus-thanos.jsonnet diff --git a/examples/prometheus-thanos.jsonnet b/examples/prometheus-thanos.jsonnet new file mode 100644 index 00000000..6dca5439 --- /dev/null +++ b/examples/prometheus-thanos.jsonnet @@ -0,0 +1,47 @@ +local kp = + (import 'kube-prometheus/main.libsonnet') + + // Uncomment the following imports to enable its patches + // (import 'kube-prometheus/addons/anti-affinity.libsonnet') + + // (import 'kube-prometheus/addons/managed-cluster.libsonnet') + + // (import 'kube-prometheus/addons/node-ports.libsonnet') + + // (import 'kube-prometheus/addons/static-etcd.libsonnet') + + // (import 'kube-prometheus/addons/custom-metrics.libsonnet') + + // (import 'kube-prometheus/addons/external-metrics.libsonnet') + + // (import 'kube-prometheus/addons/pyrra.libsonnet') + + { + values+:: { + common+: { + namespace: 'monitoring', + }, + prometheus+: { + thanos: { + baseImage: 'quay.io/thanos/thanos', + version: 'v0.8.1', + objectStorageConfig: { + key: 'thanos.yaml', + name: 'thanos-objstore-config', + }, + }, + }, + }, + }; + +{ 'setup/0namespace-namespace': kp.kubePrometheus.namespace } + +{ + ['setup/prometheus-operator-' + name]: kp.prometheusOperator[name] + for name in std.filter((function(name) name != 'serviceMonitor' && name != 'prometheusRule'), std.objectFields(kp.prometheusOperator)) +} + +// { 'setup/pyrra-slo-CustomResourceDefinition': kp.pyrra.crd } + +// serviceMonitor and prometheusRule are separated so that they can be created after the CRDs are ready +{ 'prometheus-operator-serviceMonitor': kp.prometheusOperator.serviceMonitor } + +{ 'prometheus-operator-prometheusRule': kp.prometheusOperator.prometheusRule } + +{ 'kube-prometheus-prometheusRule': kp.kubePrometheus.prometheusRule } + +{ ['alertmanager-' + name]: kp.alertmanager[name] for name in std.objectFields(kp.alertmanager) } + +{ ['blackbox-exporter-' + name]: kp.blackboxExporter[name] for name in std.objectFields(kp.blackboxExporter) } + +{ ['grafana-' + name]: kp.grafana[name] for name in std.objectFields(kp.grafana) } + +// { ['pyrra-' + name]: kp.pyrra[name] for name in std.objectFields(kp.pyrra) if name != 'crd' } + +{ ['kube-state-metrics-' + name]: kp.kubeStateMetrics[name] for name in std.objectFields(kp.kubeStateMetrics) } + +{ ['kubernetes-' + name]: kp.kubernetesControlPlane[name] for name in std.objectFields(kp.kubernetesControlPlane) } +{ ['node-exporter-' + name]: kp.nodeExporter[name] for name in std.objectFields(kp.nodeExporter) } + +{ ['prometheus-' + name]: kp.prometheus[name] for name in std.objectFields(kp.prometheus) } + +{ ['prometheus-adapter-' + name]: kp.prometheusAdapter[name] for name in std.objectFields(kp.prometheusAdapter) } diff --git a/jsonnet/kube-prometheus/components/prometheus.libsonnet b/jsonnet/kube-prometheus/components/prometheus.libsonnet index 15d16c28..35fa5808 100644 --- a/jsonnet/kube-prometheus/components/prometheus.libsonnet +++ b/jsonnet/kube-prometheus/components/prometheus.libsonnet @@ -128,7 +128,8 @@ function(params) { port: 9090, protocol: 'TCP', }], - }, { + }] + ( if p._config.thanos != null then + [{ from: [{ podSelector: { matchLabels: { @@ -140,7 +141,7 @@ function(params) { port: 10901, protocol: 'TCP', }], - }], + }] else []), }, }, -- GitLab