Skip to content
Snippets Groups Projects
Unverified Commit 2eed12b2 authored by paulfantom's avatar paulfantom
Browse files

jsonnet: create function responsible for kube-state-metrics objects


Signed-off-by: default avatarpaulfantom <pawel@krupa.net.pl>
parent 4b47de57
Branches
Tags
No related merge requests found
local kubeRbacProxyContainer = import './kube-rbac-proxy/containerMixin.libsonnet'; local kubeRbacProxyContainer = import './kube-rbac-proxy/containerMixin.libsonnet';
local nodeExporter = import './node-exporter/node-exporter.libsonnet';
local alertmanager = import './alertmanager/alertmanager.libsonnet'; local alertmanager = import './alertmanager/alertmanager.libsonnet';
local prometheusAdapter = import './prometheus-adapter/prometheus-adapter.libsonnet';
local blackboxExporter = import './blackbox-exporter/blackbox-exporter.libsonnet'; local blackboxExporter = import './blackbox-exporter/blackbox-exporter.libsonnet';
local kubeStateMetrics = import './kube-state-metrics/kube-state-metrics.libsonnet';
local nodeExporter = import './node-exporter/node-exporter.libsonnet';
local prometheusAdapter = import './prometheus-adapter/prometheus-adapter.libsonnet';
(import 'github.com/brancz/kubernetes-grafana/grafana/grafana.libsonnet') + (import 'github.com/brancz/kubernetes-grafana/grafana/grafana.libsonnet') +
(import './kube-state-metrics/kube-state-metrics.libsonnet') +
(import 'github.com/kubernetes/kube-state-metrics/jsonnet/kube-state-metrics-mixin/mixin.libsonnet') + (import 'github.com/kubernetes/kube-state-metrics/jsonnet/kube-state-metrics-mixin/mixin.libsonnet') +
(import 'github.com/prometheus/node_exporter/docs/node-mixin/mixin.libsonnet') + (import 'github.com/prometheus/node_exporter/docs/node-mixin/mixin.libsonnet') +
(import 'github.com/prometheus/alertmanager/doc/alertmanager-mixin/mixin.libsonnet') + (import 'github.com/prometheus/alertmanager/doc/alertmanager-mixin/mixin.libsonnet') +
...@@ -20,28 +18,33 @@ local blackboxExporter = import './blackbox-exporter/blackbox-exporter.libsonnet ...@@ -20,28 +18,33 @@ local blackboxExporter = import './blackbox-exporter/blackbox-exporter.libsonnet
(import './alerts/alerts.libsonnet') + (import './alerts/alerts.libsonnet') +
(import './rules/rules.libsonnet') + (import './rules/rules.libsonnet') +
{ {
nodeExporter: nodeExporter({
namespace: $._config.namespace,
version: '1.0.1',
image: 'quay.io/prometheus/node-exporter:v1.0.1',
}),
alertmanager: alertmanager({ alertmanager: alertmanager({
name: 'main', name: 'main',
namespace: $._config.namespace, namespace: $._config.namespace,
version: '0.21.0', version: '0.21.0',
image: 'quay.io/prometheus/alertmanager:v0.21.0', image: 'quay.io/prometheus/alertmanager:v0.21.0',
}), }),
blackboxExporter: blackboxExporter({
namespace: $._config.namespace,
version: '0.18.0',
image: 'quay.io/prometheus/blackbox-exporter:v0.18.0',
}),
kubeStateMetrics: kubeStateMetrics({
namespace: $._config.namespace,
version: '1.9.7',
image: 'quay.io/coreos/kube-state-metrics:v1.9.7',
}),
nodeExporter: nodeExporter({
namespace: $._config.namespace,
version: '1.0.1',
image: 'quay.io/prometheus/node-exporter:v1.0.1',
}),
prometheusAdapter: prometheusAdapter({ prometheusAdapter: prometheusAdapter({
namespace: $._config.namespace, namespace: $._config.namespace,
version: '0.8.2', version: '0.8.2',
image: 'directxman12/k8s-prometheus-adapter:v0.8.2', image: 'directxman12/k8s-prometheus-adapter:v0.8.2',
prometheusURL: 'http://prometheus-' + $._config.prometheus.name + '.' + $._config.namespace + '.svc.cluster.local:9090/', prometheusURL: 'http://prometheus-' + $._config.prometheus.name + '.' + $._config.namespace + '.svc.cluster.local:9090/',
}), }),
blackboxExporter: blackboxExporter({
namespace: $._config.namespace,
version: '0.18.0',
image: 'quay.io/prometheus/blackbox-exporter:v0.18.0',
}),
kubePrometheus+:: { kubePrometheus+:: {
namespace: { namespace: {
apiVersion: 'v1', apiVersion: 'v1',
...@@ -217,10 +220,6 @@ local blackboxExporter = import './blackbox-exporter/blackbox-exporter.libsonnet ...@@ -217,10 +220,6 @@ local blackboxExporter = import './blackbox-exporter/blackbox-exporter.libsonnet
requests: { cpu: '10m', memory: '20Mi' }, requests: { cpu: '10m', memory: '20Mi' },
limits: { cpu: '20m', memory: '40Mi' }, limits: { cpu: '20m', memory: '40Mi' },
}, },
'kube-state-metrics': {
requests: { cpu: '100m', memory: '150Mi' },
limits: { cpu: '100m', memory: '150Mi' },
},
}, },
prometheus+:: { rules: $.prometheusRules + $.prometheusAlerts }, prometheus+:: { rules: $.prometheusRules + $.prometheusAlerts },
grafana+:: { grafana+:: {
......
local kubeRbacProxyContainer = import '../kube-rbac-proxy/containerMixin.libsonnet'; local krp = (import '../kube-rbac-proxy/container.libsonnet');
local ksm = import 'github.com/kubernetes/kube-state-metrics/jsonnet/kube-state-metrics/kube-state-metrics.libsonnet';
{ local defaults = {
_config+:: { local defaults = self,
versions+:: { namespace: error 'must provide namespace',
kubeStateMetrics: '1.9.7', version: error 'must provide version',
}, image: error 'must provide version',
imageRepos+:: { resources: {
kubeStateMetrics: 'quay.io/coreos/kube-state-metrics', requests: { cpu: '10m', memory: '190Mi' },
}, limits: { cpu: '100m', memory: '250Mi' },
kubeStateMetrics+:: { },
scrapeInterval: '30s',
scrapeTimeout: '30s', scrapeInterval: '30s',
labels: { scrapeTimeout: '30s',
'app.kubernetes.io/name': 'kube-state-metrics', commonLabels:: {
'app.kubernetes.io/version': $._config.versions.kubeStateMetrics, 'app.kubernetes.io/name': 'kube-state-metrics',
'app.kubernetes.io/component': 'exporter', 'app.kubernetes.io/version': defaults.version,
'app.kubernetes.io/part-of': 'kube-prometheus', 'app.kubernetes.io/component': 'exporter',
}, 'app.kubernetes.io/part-of': 'kube-prometheus',
selectorLabels: { },
[labelName]: $._config.kubeStateMetrics.labels[labelName] selectorLabels:: {
for labelName in std.objectFields($._config.kubeStateMetrics.labels) [labelName]: defaults.commonLabels[labelName]
if !std.setMember(labelName, ['app.kubernetes.io/version']) for labelName in std.objectFields(defaults.commonLabels)
}, if !std.setMember(labelName, ['app.kubernetes.io/version'])
},
};
function(params) (import 'github.com/kubernetes/kube-state-metrics/jsonnet/kube-state-metrics/kube-state-metrics.libsonnet') {
local ksm = self,
config:: defaults + params,
// Safety check
assert std.isObject(ksm.config.resources),
name:: 'kube-state-metrics',
namespace:: ksm.config.namespace,
version:: ksm.config.version,
image:: ksm.config.image,
commonLabels:: ksm.config.commonLabels,
podLabels:: ksm.config.selectorLabels,
service+: {
spec+: {
ports: [
{
name: 'https-main',
port: 8443,
targetPort: 'https-main',
},
{
name: 'https-self',
port: 9443,
targetPort: 'https-self',
},
],
}, },
}, },
kubeStateMetrics+::
ksm { local kubeRbacProxyMain = krp({
local version = self.version, name: 'kube-rbac-proxy-main',
name:: 'kube-state-metrics', upstream: 'http://127.0.0.1:8081/',
namespace:: $._config.namespace, secureListenAddress: ':8443',
version:: $._config.versions.kubeStateMetrics, ports: [
image:: $._config.imageRepos.kubeStateMetrics + ':v' + $._config.versions.kubeStateMetrics, { name: 'https-main', containerPort: 8443, },
commonLabels:: $._config.kubeStateMetrics.labels, ],
podLabels:: $._config.kubeStateMetrics.selectorLabels, }),
service+: {
local kubeRbacProxySelf = krp({
name: 'kube-rbac-proxy-self',
upstream: 'http://127.0.0.1:8082/',
secureListenAddress: ':9443',
ports: [
{ name: 'https-self', containerPort: 9443, },
],
}),
deployment+: {
spec+: {
template+: {
spec+: { spec+: {
ports: [ containers: std.map(function(c) c {
{ ports:: null,
name: 'https-main', livenessProbe:: null,
port: 8443, readinessProbe:: null,
targetPort: 'https-main', args: ['--host=127.0.0.1', '--port=8081', '--telemetry-host=127.0.0.1', '--telemetry-port=8082'],
}, resources: ksm.config.resources,
{ }, super.containers) + [kubeRbacProxyMain, kubeRbacProxySelf],
name: 'https-self',
port: 9443,
targetPort: 'https-self',
},
],
}, },
}, },
deployment+: { },
spec+: { },
template+: { serviceMonitor:
spec+: { {
containers: std.map(function(c) c { apiVersion: 'monitoring.coreos.com/v1',
ports:: null, kind: 'ServiceMonitor',
livenessProbe:: null, metadata: {
readinessProbe:: null, name: ksm.name,
args: ['--host=127.0.0.1', '--port=8081', '--telemetry-host=127.0.0.1', '--telemetry-port=8082'], namespace: ksm.config.namespace,
}, super.containers), labels: ksm.config.commonLabels,
},
},
},
}, },
serviceMonitor: spec: {
{ jobLabel: 'app.kubernetes.io/name',
apiVersion: 'monitoring.coreos.com/v1', selector: { matchLabels: ksm.config.selectorLabels },
kind: 'ServiceMonitor', endpoints: [
metadata: { {
name: 'kube-state-metrics', port: 'https-main',
namespace: $._config.namespace, scheme: 'https',
labels: $._config.kubeStateMetrics.labels, interval: ksm.config.scrapeInterval,
}, scrapeTimeout: ksm.config.scrapeTimeout,
spec: { honorLabels: true,
jobLabel: 'app.kubernetes.io/name', bearerTokenFile: '/var/run/secrets/kubernetes.io/serviceaccount/token',
selector: { matchLabels: $._config.kubeStateMetrics.selectorLabels }, relabelings: [
endpoints: [
{
port: 'https-main',
scheme: 'https',
interval: $._config.kubeStateMetrics.scrapeInterval,
scrapeTimeout: $._config.kubeStateMetrics.scrapeTimeout,
honorLabels: true,
bearerTokenFile: '/var/run/secrets/kubernetes.io/serviceaccount/token',
relabelings: [
{
regex: '(pod|service|endpoint|namespace)',
action: 'labeldrop',
},
],
tlsConfig: {
insecureSkipVerify: true,
},
},
{ {
port: 'https-self', regex: '(pod|service|endpoint|namespace)',
scheme: 'https', action: 'labeldrop',
interval: $._config.kubeStateMetrics.scrapeInterval,
bearerTokenFile: '/var/run/secrets/kubernetes.io/serviceaccount/token',
tlsConfig: {
insecureSkipVerify: true,
},
}, },
], ],
tlsConfig: {
insecureSkipVerify: true,
},
}, },
}, {
} + port: 'https-self',
(kubeRbacProxyContainer { scheme: 'https',
config+:: { interval: ksm.config.scrapeInterval,
kubeRbacProxy: { bearerTokenFile: '/var/run/secrets/kubernetes.io/serviceaccount/token',
local cfg = self, tlsConfig: {
image: $._config.imageRepos.kubeRbacProxy + ':' + $._config.versions.kubeRbacProxy, insecureSkipVerify: true,
name: 'kube-rbac-proxy-main', },
securePortName: 'https-main', },
securePort: 8443, ],
secureListenAddress: ':%d' % self.securePort, },
upstream: 'http://127.0.0.1:8081/', },
tlsCipherSuites: $._config.tlsCipherSuites,
},
},
}).deploymentMixin +
(kubeRbacProxyContainer {
config+:: {
kubeRbacProxy: {
local cfg = self,
image: $._config.imageRepos.kubeRbacProxy + ':' + $._config.versions.kubeRbacProxy,
name: 'kube-rbac-proxy-self',
securePortName: 'https-self',
securePort: 9443,
secureListenAddress: ':%d' % self.securePort,
upstream: 'http://127.0.0.1:8082/',
tlsCipherSuites: $._config.tlsCipherSuites,
},
},
}).deploymentMixin,
} }
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment