Skip to content

Commit

Permalink
feat: review helm chart prometheus
Browse files Browse the repository at this point in the history
  • Loading branch information
StuxxNet authored and ramon.silveira-borges@telekom.com committed Dec 6, 2023
1 parent 027df86 commit dd5a6b2
Show file tree
Hide file tree
Showing 7 changed files with 25 additions and 306 deletions.
18 changes: 10 additions & 8 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -10,9 +10,9 @@ DOCKER_LINT_CONFIG := configs/hadolint/hadolint-config.yaml

METRICS_SERVER_RELEASE := metrics-server
METRICS_SERVER_NAMESPACE := kube-system
METRICS_SERVER_CHART_VALUES := configs/helm/metric-server/values.yml
METRICS_SERVER_CHART_LOCAL_VALUES := configs/helm/metric-server/values-kind.yml
METRICS_SERVER_CHART_EKS_VALUES := configs/helm/metric-server/values-eks.yml
METRICS_SERVER_CHART_VALUES := configs/helm/metrics-server/values.yml
METRICS_SERVER_CHART_LOCAL_VALUES := configs/helm/metrics-server/values-kind.yml
METRICS_SERVER_CHART_EKS_VALUES := configs/helm/metrics-server/values-eks.yml

INGRESS_RELEASE := ingress-nginx
INGRESS_NAMESPACE := ingress-nginx
Expand Down Expand Up @@ -67,8 +67,9 @@ deploy-eks-cluster: # Cria o cluster na AWS
delete-eks-cluster: # Remove o cluster na AWS
eksctl delete cluster --name=${CLUSTER_NAME}

generate-context-aws: # Atualiza contexto para EKS
set-context-eks: # Atualiza contexto para EKS
aws eks --region eu-central-1 update-kubeconfig --name ${CLUSTER_NAME}
kubectl config use-context arn:aws:eks:eu-central-1:$(shell aws sts get-caller-identity --output json | jq '.Account' -r):cluster/${CLUSTER_NAME}

##------------------------------------------------------------------------
## Comandos do Ingress - EKS
Expand Down Expand Up @@ -210,13 +211,13 @@ push-image-dockerhub-ci: # Realiza o push da imagem para o Dockerhub - Som
docker push ${DOCKERHUB_USERNAME}/giropops-senhas-python-chainguard:${GIROPOPS_SENHAS_TAG}
cosign sign --yes --rekor-url "https://rekor.sigstore.dev/" ${DOCKERHUB_USERNAME}/giropops-senhas-python-chainguard:${GIROPOPS_SENHAS_TAG}

deploy-giropops-senhas-kind: # Realiza a instalação do Giropops no Kind
deploy-giropops-senhas-kind:
kubectl create ns ${GIROPOPS_SENHAS_NAMESPACE} || echo "Namespace já existe"
cd ${GIROPOPS_SENHAS_BASE} && kustomize edit set image giropops-senhas=giropops-senhas-python-chainguard:${GIROPOPS_SENHAS_TAG}
kubectl apply -k ${GIROPOPS_SENHAS_LOCAL}
kubectl rollout restart deployment -n ${GIROPOPS_SENHAS_NAMESPACE} giropops-senhas

deploy-giropops-senhas-eks: # Realiza a instalação do Giropops no EKS
deploy-giropops-senhas-eks:
kubectl create ns ${GIROPOPS_SENHAS_NAMESPACE} || echo "Namespace já existe"
cd ${GIROPOPS_SENHAS_BASE} && kustomize edit set image giropops-senhas-python-chainguard=${DOCKERHUB_USERNAME}/giropops-senhas-python-chainguard:${GIROPOPS_SENHAS_TAG}
kubectl apply -k ${GIROPOPS_SENHAS_EKS}
Expand All @@ -226,10 +227,10 @@ deploy-giropops-senhas-local: # Realiza deploy no Kind
$(MAKE) deploy-giropops-senhas-kind

deploy-giropops-senhas-aws: # Realiza deploy no EKS
$(MAKE) generate-context-aws
$(MAKE) set-context-eks
$(MAKE) deploy-giropops-senhas-eks

delete-giropops-senhas: # Remove a instalação do Giropops
delete-giropops-senhas: # Remove a instalação do Giropops Senhas
kubectl delete -f ${GIROPOPS_SENHAS_MANIFESTS}

##------------------------------------------------------------------------
Expand Down Expand Up @@ -267,6 +268,7 @@ clean-local: # Clean do ambiente local
$(MAKE) delete-kind-cluster

clean-aws: # Clean do ambiente na AWS
$(MAKE) set-context-eks
$(MAKE) drop-pdb
$(MAKE) delete-eks-cluster

Expand Down
130 changes: 5 additions & 125 deletions configs/helm/kube-prometheus-stack/values-eks.yml
Original file line number Diff line number Diff line change
@@ -1,155 +1,35 @@
defaultRules:
create: true
rules:
etcd: false
kubeControllerManager: false
kubeProxy: false
kubeSchedulerAlerting: false
kubeSchedulerRecording: false
disabled:
Watchdog: true
InfoInhibitor: true

alertmanager:
podDisruptionBudget:
enabled: true
minAvailable: 1
maxUnavailable: ""
ingress:
enabled: true
hosts:
- alertmanager.kubernetes.docker.internal
- alertmanager.aws-cluster.com.br
paths:
- /
alertmanagerSpec:
image:
registry: cgr.dev
repository: chainguard/prometheus-alertmanager
tag: ""
sha: "09594d189f6a21ab2b293ad6761f2c8003d67d1fca463c83b592715f64ee3f48"
resources:
requests:
memory: 400Mi
cpu: 500m
limits:
memory: 1Gi


grafana:
enabled: true
ingress:
enabled: true
hosts:
- grafana.kubernetes.docker.internal
dashboardProviders:
dashboardproviders.yaml:
apiVersion: 1
providers:
- name: 'default'
orgId: 1
folder: 'Imported'
type: file
disableDeletion: false
editable: true
options:
path: /var/lib/grafana/dashboards/default
dashboards:
default:
k6-results:
url: https://raw.githubusercontent.com/StuxxNet/pick-esquenta/main/configs/helm/kube-prometheus-stack/dashboards/k6_results.json
redis:
url: https://raw.githubusercontent.com/StuxxNet/pick-esquenta/main/configs/helm/kube-prometheus-stack/dashboards/redis.json

kubeControllerManager:
enabled: false

kubeEtcd:
enabled: false

kubeScheduler:
enabled: false
- grafana.aws-cluster.com.br

kubeProxy:
enabled: false
enabled: true

kubeStateMetrics:
enabled: true

kube-state-metrics:
image:
registry: cgr.dev
repository: chainguard/kube-state-metrics
sha: "sha256:3e29688126c13479b90d590f61de01378bd37eec83342aaf3066185e47819758"
pullPolicy: IfNotPresent
resources:
limits:
memory: 64Mi
requests:
cpu: 10m
memory: 32Mi

nodeExporter:
operatingSystems:
darwin:
enabled: false

prometheus-node-exporter:
image:
registry: cgr.dev
repository: chainguard/prometheus-node-exporter
pullPolicy: IfNotPresent
digest: "sha256:09f68e470dd249b87600023adac65e9b466543b1bb9e32ecdfb6ecded378b4d9"
resources:
limits:
memory: 64Mi
requests:
cpu: 10m
memory: 32Mi

prometheusOperator:
resources:
limits:
cpu: 200m
memory: 200Mi
requests:
cpu: 100m
memory: 100Mi
image:
registry: cgr.dev
repository: chainguard/prometheus-operator
sha: "2bbdce268f8146d50bf3d9e6bf44bd0cf9b154105d8b2df08227a962f41882fa"
pullPolicy: IfNotPresent
prometheusConfigReloader:
image:
registry: cgr.dev
repository: chainguard/prometheus-config-reloader
sha: "c128598b3a0fd5b7c2b8de6079eb051ce9c290e0d05c1a7a6fc49007a180dc9f"
enableProbe: true
resources:
requests:
cpu: 200m
memory: 50Mi
limits:
cpu: 200m
memory: 50Mi

prometheus:
enabled: true
podDisruptionBudget:
enabled: true
minAvailable: 1
maxUnavailable: ""
ingress:
enabled: true
hosts:
- prometheus.kubernetes.docker.internal
- prometheus.aws-cluster.com.br
paths:
- /
prometheusSpec:
image:
registry: cgr.dev
repository: chainguard/prometheus
sha: "8d893c8fae39b7ebf7338e694a38a73cefa362d6b867a72b76fbc6f695349973"
externalUrl: ""
enableRemoteWriteReceiver: true
ruleSelectorNilUsesHelmValues: false
serviceMonitorSelectorNilUsesHelmValues: false
Expand Down
Loading

0 comments on commit dd5a6b2

Please sign in to comment.