You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: resources/elasticsearch/INSTALL.md
+18-13Lines changed: 18 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,6 @@
1
1
# Installing the exporter
2
-
To install the exporter, do the following:
3
-
1. Verify whether your elastic is secured or not
4
-
2. If it is not secured, download the `exporter_no_credentials.yaml` file and execute:
2
+
## Without credentials
3
+
If it is not secured, download the `exporter_no_credentials.yaml` file and execute:
5
4
```
6
5
kubectl apply -f exporter_no_credentials.yaml
7
6
```
@@ -24,15 +23,16 @@ spec:
24
23
value: https://elasticsearch:9200
25
24
...
26
25
```
27
-
3. If the elasticsearch is secured similar to the elasticseach deployed in the Sysdig on-prem environments, download the `exporter_with_credentials.yaml` file.
26
+
## With credentials
27
+
If elasticsearch is secured, download the `exporter_with_credentials.yaml` file.
28
28
29
-
4. Apply by configuration changes by executing the following:
30
-
```
31
-
kubectl apply -f exporter_with_credentials.yaml
32
-
```
33
-
This configuration will use the user and the password saved as secrets, and will mount a volume with the ca.
29
+
This configuration will use the user and the password saved as secrets, and will mount a volume with the ca certificate.
34
30
35
-
5. If you are using the exporter with credentials but you are not using sysdig, then edit the secrets name, the service, and the port.
31
+
Create the secret with the ElasticSearch certificates for the exporter and edit in the yaml file:
32
+
* Secrets name (by default `elasticsearch-tls` and `es-certs`)
Copy file name to clipboardExpand all lines: resources/nginx-ingress/INSTALL.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,15 @@
1
1
# Installing the exporter
2
2
Nginx ingress controller is already instrumented so you don't have to add any extra exporter. However, ensure that your nginx ingress controller is already exposing these metrics.
3
3
4
-
For exmaple if you are deploying your nginx ingress controller with helm, make sure you have these values.
4
+
For example if you are deploying your nginx ingress controller with helm, make sure you have these values.
5
5
6
6
```yaml
7
7
controller:
8
8
metrics:
9
9
port: 10254
10
-
# if this port is changed, change healthz-port: in extraArgs: accordingly
The exporter can be installed as a sidecar of the pod with the Nginx server. You can find a deployment below with the exporter as a sidecar and the configmap with the configuration required to scrape metrics from the server.
2
+
The exporter can be installed as a sidecar of the pod with the Nginx server. In order to get the nginx a endpoint to scrap the metrics you have to enable the metrics endpoint.
3
3
4
-
Note that the deployment has a label, `app`. This label will be included in the metrics to be able to use it as a variable in the dashboards and alerts.
5
-
6
-
# Sysdig Agent configuration
7
-
In the Sysdig Agent configuration, add the following snippet to include the label `app` as a metric label.
8
4
```yaml
9
-
dragent.yaml: |-
10
-
metrics_excess_log: true
11
-
k8s_cluster_name: YourClusterName
12
-
10s_flush_enable: true
13
-
app_checks_enabled: false
14
-
use_promscrape: true
15
-
new_k8s: true
16
-
promscrape_fastproto: true
17
-
prometheus:
18
-
enabled: true
19
-
prom_service_discovery: true
20
-
log_errors: true
21
-
max_metrics: 200000
22
-
max_metrics_per_process: 200000
23
-
max_tags_per_metric: 100
24
-
ingest_raw: true
25
-
ingest_calculated: false
5
+
apiVersion: v1
6
+
kind: ConfigMap
7
+
metadata:
8
+
name: nginx-config
9
+
data:
10
+
nginx.conf: |
11
+
server {
12
+
listen 80;
13
+
server_name localhost;
14
+
location /nginx_status {
15
+
stub_status on;
16
+
access_log on;
17
+
allow all; # REPLACE with your access policy
18
+
}
19
+
}
26
20
```
27
21
28
-
You can download the sample configuration file below and apply it by:
29
-
```bash
30
-
kubectl apply -f sysdig-agent-config.yaml
22
+
You can find a deployment below with the exporter as a sidecar and the ConfigMap with the configuration required to scrape metrics from the server.
23
+
24
+
Also, be sure to add the following annotations to the deployment:
25
+
26
+
```yaml
27
+
spec:
28
+
template:
29
+
metadata:
30
+
annotations:
31
+
promcat.sysdig.com/integration_type: nginx
32
+
promcat.sysdig.com/port: "9113"
31
33
```
34
+
35
+
# Sysdig Agent configuration
36
+
Below you can find the configuration for the sysdig agent.
0 commit comments