Use 1 secret with all values
Signed-off-by: Michel Hollands <michel.hollands@gmail.com>
This commit is contained in:
parent
d9fc9e4f4e
commit
39f50d8580
@ -45,11 +45,6 @@ data:
|
|||||||
name = "logs"
|
name = "logs"
|
||||||
}
|
}
|
||||||
|
|
||||||
remote.kubernetes.configmap "logs_endpoint" {
|
|
||||||
namespace = "{{- .Values.metaMonitoringNamespace -}}"
|
|
||||||
name = "logs-endpoint"
|
|
||||||
}
|
|
||||||
|
|
||||||
loki.source.kubernetes "pods" {
|
loki.source.kubernetes "pods" {
|
||||||
clustering {
|
clustering {
|
||||||
enabled = true
|
enabled = true
|
||||||
@ -90,11 +85,6 @@ data:
|
|||||||
name = "metrics"
|
name = "metrics"
|
||||||
}
|
}
|
||||||
|
|
||||||
remote.kubernetes.configmap "metrics_endpoint" {
|
|
||||||
namespace = "{{- .Values.metaMonitoringNamespace -}}"
|
|
||||||
name = "metrics-endpoint"
|
|
||||||
}
|
|
||||||
|
|
||||||
prometheus.scrape "pods" {
|
prometheus.scrape "pods" {
|
||||||
clustering {
|
clustering {
|
||||||
enabled = true
|
enabled = true
|
||||||
@ -235,11 +225,6 @@ data:
|
|||||||
name = "traces"
|
name = "traces"
|
||||||
}
|
}
|
||||||
|
|
||||||
remote.kubernetes.configmap "traces_endpoint" {
|
|
||||||
namespace = "{{- .Values.metaMonitoringNamespace -}}"
|
|
||||||
name = "traces-endpoint"
|
|
||||||
}
|
|
||||||
|
|
||||||
// Shamelessly copied from https://github.com/grafana/intro-to-mlt/blob/main/agent/config.river
|
// Shamelessly copied from https://github.com/grafana/intro-to-mlt/blob/main/agent/config.river
|
||||||
otelcol.receiver.otlp "otlp_receiver" {
|
otelcol.receiver.otlp "otlp_receiver" {
|
||||||
// We don't technically need this, but it shows how to change listen address and incoming port.
|
// We don't technically need this, but it shows how to change listen address and incoming port.
|
||||||
@ -308,7 +293,7 @@ data:
|
|||||||
{{- if .Values.cloud.logs.enabled }}
|
{{- if .Values.cloud.logs.enabled }}
|
||||||
loki.write "cloud" {
|
loki.write "cloud" {
|
||||||
endpoint {
|
endpoint {
|
||||||
url = remote.kubernetes.configmap.logs_endpoint.data["endpoint"]
|
url = nonsensitive(remote.kubernetes.secret.logs_credentials.data["endpoint"])
|
||||||
basic_auth {
|
basic_auth {
|
||||||
username = nonsensitive(remote.kubernetes.secret.logs_credentials.data["username"])
|
username = nonsensitive(remote.kubernetes.secret.logs_credentials.data["username"])
|
||||||
password = remote.kubernetes.secret.logs_credentials.data["password"]
|
password = remote.kubernetes.secret.logs_credentials.data["password"]
|
||||||
@ -320,7 +305,7 @@ data:
|
|||||||
{{- if .Values.cloud.metrics.enabled }}
|
{{- if .Values.cloud.metrics.enabled }}
|
||||||
prometheus.remote_write "cloud" {
|
prometheus.remote_write "cloud" {
|
||||||
endpoint {
|
endpoint {
|
||||||
url = remote.kubernetes.configmap.metrics_endpoint.data["endpoint"]
|
url = nonsensitive(remote.kubernetes.secret.metrics_credentials.data["endpoint"])
|
||||||
basic_auth {
|
basic_auth {
|
||||||
username = nonsensitive(remote.kubernetes.secret.metrics_credentials.data["username"])
|
username = nonsensitive(remote.kubernetes.secret.metrics_credentials.data["username"])
|
||||||
password = remote.kubernetes.secret.metrics_credentials.data["password"]
|
password = remote.kubernetes.secret.metrics_credentials.data["password"]
|
||||||
@ -332,7 +317,7 @@ data:
|
|||||||
{{- if .Values.cloud.traces.enabled }}
|
{{- if .Values.cloud.traces.enabled }}
|
||||||
otelcol.exporter.otlp "cloud" {
|
otelcol.exporter.otlp "cloud" {
|
||||||
client {
|
client {
|
||||||
endpoint = remote.kubernetes.configmap.traces_endpoint.data["endpoint"]
|
endpoint = nonsensitive(remote.kubernetes.secret.traces_credentials.data["endpoint"])
|
||||||
auth = otelcol.auth.basic.creds.handler
|
auth = otelcol.auth.basic.creds.handler
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -3,20 +3,20 @@
|
|||||||
{{- end -}}
|
{{- end -}}
|
||||||
|
|
||||||
{{- if eq .Values.cloud.logs.enabled true -}}
|
{{- if eq .Values.cloud.logs.enabled true -}}
|
||||||
{{- if or (empty .Values.cloud.logs.secret) (empty .Values.cloud.logs.endpointConfigmap) -}}
|
{{- if empty .Values.cloud.logs.secret -}}
|
||||||
{{- fail "if cloud.logs is enabled then the secret and endpoint config map have to be filled in" -}}
|
{{- fail "if cloud.logs is enabled then the secret has to be filled in" -}}
|
||||||
{{- end -}}
|
{{- end -}}
|
||||||
{{- end -}}
|
{{- end -}}
|
||||||
|
|
||||||
{{- if eq .Values.cloud.metrics.enabled true -}}
|
{{- if eq .Values.cloud.metrics.enabled true -}}
|
||||||
{{- if or (empty .Values.cloud.metrics.secret) (empty .Values.cloud.logs.endpointConfigmap) -}}
|
{{- if empty .Values.cloud.metrics.secret -}}
|
||||||
{{- fail "if cloud.metrics is enabled then the secret and endpoint config map have to be filled in" -}}
|
{{- fail "if cloud.metrics is enabled then the secret has to be filled in" -}}
|
||||||
{{- end -}}
|
{{- end -}}
|
||||||
{{- end -}}
|
{{- end -}}
|
||||||
|
|
||||||
{{- if eq .Values.cloud.traces.enabled true -}}
|
{{- if eq .Values.cloud.traces.enabled true -}}
|
||||||
{{- if or (empty .Values.cloud.traces.secret) (empty .Values.cloud.logs.endpointConfigmap) -}}
|
{{- if empty .Values.cloud.traces.secret -}}
|
||||||
{{- fail "if cloud.traces is enabled then the secret and endpoint config map have to be filled in" -}}
|
{{- fail "if cloud.traces is enabled then the secret has to be filled in" -}}
|
||||||
{{- end -}}
|
{{- end -}}
|
||||||
{{- end -}}
|
{{- end -}}
|
||||||
|
|
||||||
|
@ -13,15 +13,12 @@ cloud:
|
|||||||
logs:
|
logs:
|
||||||
enabled: true
|
enabled: true
|
||||||
secret: ""
|
secret: ""
|
||||||
endpointConfigmap: ""
|
|
||||||
metrics:
|
metrics:
|
||||||
enabled: true
|
enabled: true
|
||||||
secret: ""
|
secret: ""
|
||||||
endpointConfigmap: ""
|
|
||||||
traces:
|
traces:
|
||||||
enabled: true
|
enabled: true
|
||||||
secret: ""
|
secret: ""
|
||||||
endpointConfigmap: ""
|
|
||||||
|
|
||||||
# Set to true for a local version of logs, metrics or traces
|
# Set to true for a local version of logs, metrics or traces
|
||||||
local:
|
local:
|
||||||
|
@ -6,32 +6,26 @@
|
|||||||
kubectl create namespace meta
|
kubectl create namespace meta
|
||||||
```
|
```
|
||||||
|
|
||||||
1. Create secrets with credentials and a configmap with the endpoint (as needed) when sending logs, metrics or traces to Grafana Cloud.
|
1. Create secrets with credentials and the endpoint when sending logs, metrics or traces to Grafana Cloud.
|
||||||
|
|
||||||
```
|
```
|
||||||
kubectl create configmap logs-endpoint -n meta \
|
|
||||||
--from-literal=endpoint='https://logs-prod-us-central1.grafana.net/loki/api/v1/push'
|
|
||||||
|
|
||||||
kubectl create secret generic logs -n meta \
|
kubectl create secret generic logs -n meta \
|
||||||
--from-literal=username=<logs username> \
|
--from-literal=username=<logs username> \
|
||||||
--from-literal=password=<logs password>
|
--from-literal=password=<logs password>
|
||||||
|
--from-literal=endpoint='https://logs-prod-us-central1.grafana.net/loki/api/v1/push'
|
||||||
kubectl create configmap metrics-endpoint -n meta \
|
|
||||||
--from-literal=endpoint='https://prometheus-us-central1.grafana.net/api/prom/push'
|
|
||||||
|
|
||||||
kubectl create secret generic metrics -n meta \
|
kubectl create secret generic metrics -n meta \
|
||||||
--from-literal=username=<metrics username> \
|
--from-literal=username=<metrics username> \
|
||||||
--from-literal=password=<metrics password>
|
--from-literal=password=<metrics password>
|
||||||
|
--from-literal=endpoint='https://prometheus-us-central1.grafana.net/api/prom/push'
|
||||||
kubectl create configmap traces-endpoint -n meta \
|
|
||||||
--from-literal=endpoint='https://tempo-us-central1.grafana.net/tempo'
|
|
||||||
|
|
||||||
kubectl create secret generic traces -n meta \
|
kubectl create secret generic traces -n meta \
|
||||||
--from-literal=username=<traces username> \
|
--from-literal=username=<traces username> \
|
||||||
--from-literal=password=<traces password>
|
--from-literal=password=<traces password>
|
||||||
|
--from-literal=endpoint='https://tempo-us-central1.grafana.net/tempo'
|
||||||
```
|
```
|
||||||
|
|
||||||
1. Create a values.yaml file based on the [default one](../charts/meta-monitoring/values.yaml). Fill in the names of the secrets and configmaps created above as needed.
|
1. Create a values.yaml file based on the [default one](../charts/meta-monitoring/values.yaml). Fill in the names of the secrets created above as needed.
|
||||||
|
|
||||||
1. Install this helm chart
|
1. Install this helm chart
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user