Skip to content

Commit 2f1c350

Browse files
Merge pull request #172 from sysdiglabs/staging
Staging to Production
2 parents 97a5fdb + 1a9a4ab commit 2f1c350

File tree

6 files changed

+57
-52
lines changed

6 files changed

+57
-52
lines changed

resources/ceph/INSTALL.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,9 @@
11
# Prerequisites
2-
Make sure the Sysdig agent has the right configuration.
3-
Ceph instruments Prometheus metrics and annotates the manager pod with Prometheus annotations, so there is not further configuration needed.
2+
Ceph instruments Prometheus metrics and annotates the manager pod with Prometheus annotations.
43

5-
For the Sysdig agent to discover and scrape it automatically, enable the `use_promscrape` option in the agent configuration.
4+
Make sure that the prometheus module is activated in the Ceph cluster by running the following command:
65

7-
```yaml
8-
dragent.yaml: |-
9-
use_promscrape: true
10-
prometheus:
11-
enabled: true
12-
prom_service_discovery: true
136
```
7+
ceph mgr module enable prometheus
8+
```
9+

resources/elasticsearch/INSTALL.md

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
# Installing the exporter
2-
To install the exporter, do the following:
3-
1. Verify whether your elastic is secured or not
4-
2. If it is not secured, download the `exporter_no_credentials.yaml` file and execute:
2+
## Without credentials
3+
If it is not secured, download the `exporter_no_credentials.yaml` file and execute:
54
```
65
kubectl apply -f exporter_no_credentials.yaml
76
```
@@ -24,15 +23,16 @@ spec:
2423
value: https://elasticsearch:9200
2524
...
2625
```
27-
3. If the elasticsearch is secured similar to the elasticseach deployed in the Sysdig on-prem environments, download the `exporter_with_credentials.yaml` file.
26+
## With credentials
27+
If elasticsearch is secured, download the `exporter_with_credentials.yaml` file.
2828

29-
4. Apply by configuration changes by executing the following:
30-
```
31-
kubectl apply -f exporter_with_credentials.yaml
32-
```
33-
This configuration will use the user and the password saved as secrets, and will mount a volume with the ca.
29+
This configuration will use the user and the password saved as secrets, and will mount a volume with the ca certificate.
3430

35-
5. If you are using the exporter with credentials but you are not using sysdig, then edit the secrets name, the service, and the port.
31+
Create the secret with the ElasticSearch certificates for the exporter and edit in the yaml file:
32+
* Secrets name (by default `elasticsearch-tls` and `es-certs`)
33+
* Service
34+
* Host
35+
* Port
3636

3737
```yaml
3838
...
@@ -49,12 +49,17 @@ spec:
4949
key: elasticsearch.adminuser
5050
name: sysdigcloud-config
5151
- name: ES_URI
52-
value: https://$(ELASTIC_USER):$(ELASTICSEARCH_ADMIN_PASSWORD)@sysdigcloud-elasticsearch:9200
52+
value: https://$(ELASTIC_USER):$(ELASTICSEARCH_ADMIN_PASSWORD)@YOUR-HOST:9200
5353
envFrom:
5454
- secretRef:
5555
name: elasticsearch-tls
5656
...
5757
```
58+
59+
Apply by configuration changes by executing the following:
60+
```
61+
kubectl apply -f exporter_with_credentials.yaml
62+
```
5863
# Sysdig Agent configuration
5964
> Requires Sysdig Agent >= v11.3
6065
@@ -67,15 +72,15 @@ spec:
6772
template:
6873
metadata:
6974
annotations:
75+
promcat.sysdig.com/integration_type: elasticsearch
7076
promcat.sysdig.com/port: "9108"
7177
# Add here the namespace, workload type (deployment, statefulset, replicaset, daemonset)
7278
# and workload name of the instance that the exporter will take data from
7379
promcat.sysdig.com/target_ns: elastic-namespace
7480
promcat.sysdig.com/target_workload_type: statefulset
7581
promcat.sysdig.com/target_workload_name: elasticsearch
76-
promcat.sysdig.com/integration_type: elasticsearch
7782
```
78-
This way, on the Sysdig Monitor, you can view the associated metrics corresponding to the database pods and the exporter.
83+
This way, on Sysdig Monitor, you can view the associated metrics corresponding to ElasticSearch pods and the exporter.
7984
8085
After you configure the Sysdig annotations, download the sample configuration file and apply it by:
8186
```bash

resources/elasticsearch/include/exporter_with_credentials.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ spec:
4747
key: elasticsearch.adminuser
4848
name: sysdigcloud-config
4949
- name: ES_URI
50-
value: https://$(ELASTIC_USER):$(ELASTICSEARCH_ADMIN_PASSWORD)@sysdigcloud-elasticsearch:9200
50+
value: https://$(ELASTIC_USER):$(ELASTICSEARCH_ADMIN_PASSWORD)@YOURHOST:9200
5151
envFrom:
5252
- secretRef:
5353
name: elasticsearch-tls

resources/nginx-ingress/INSTALL.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,15 @@
11
# Installing the exporter
22
Nginx ingress controller is already instrumented so you don't have to add any extra exporter. However, ensure that your nginx ingress controller is already exposing these metrics.
33

4-
For exmaple if you are deploying your nginx ingress controller with helm, make sure you have these values.
4+
For example if you are deploying your nginx ingress controller with helm, make sure you have these values.
55

66
```yaml
77
controller:
88
metrics:
99
port: 10254
10-
# if this port is changed, change healthz-port: in extraArgs: accordingly
1110
enabled: true
1211
podAnnotations:
13-
promcat.sysdig.com/port: "10254"
12+
prometheus.io/port: "10254"
1413
```
1514
1615
# Sysdig Agent configuration

resources/nginx/INSTALL.md

Lines changed: 30 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,36 @@
11
# Installing the exporter
2-
The exporter can be installed as a sidecar of the pod with the Nginx server. You can find a deployment below with the exporter as a sidecar and the configmap with the configuration required to scrape metrics from the server.
2+
The exporter can be installed as a sidecar of the pod with the Nginx server. In order to get the nginx a endpoint to scrap the metrics you have to enable the metrics endpoint.
33

4-
Note that the deployment has a label, `app`. This label will be included in the metrics to be able to use it as a variable in the dashboards and alerts.
5-
6-
# Sysdig Agent configuration
7-
In the Sysdig Agent configuration, add the following snippet to include the label `app` as a metric label.
84
```yaml
9-
dragent.yaml: |-
10-
metrics_excess_log: true
11-
k8s_cluster_name: YourClusterName
12-
10s_flush_enable: true
13-
app_checks_enabled: false
14-
use_promscrape: true
15-
new_k8s: true
16-
promscrape_fastproto: true
17-
prometheus:
18-
enabled: true
19-
prom_service_discovery: true
20-
log_errors: true
21-
max_metrics: 200000
22-
max_metrics_per_process: 200000
23-
max_tags_per_metric: 100
24-
ingest_raw: true
25-
ingest_calculated: false
5+
apiVersion: v1
6+
kind: ConfigMap
7+
metadata:
8+
name: nginx-config
9+
data:
10+
nginx.conf: |
11+
server {
12+
listen 80;
13+
server_name localhost;
14+
location /nginx_status {
15+
stub_status on;
16+
access_log on;
17+
allow all; # REPLACE with your access policy
18+
}
19+
}
2620
```
2721
28-
You can download the sample configuration file below and apply it by:
29-
```bash
30-
kubectl apply -f sysdig-agent-config.yaml
22+
You can find a deployment below with the exporter as a sidecar and the ConfigMap with the configuration required to scrape metrics from the server.
23+
24+
Also, be sure to add the following annotations to the deployment:
25+
26+
```yaml
27+
spec:
28+
template:
29+
metadata:
30+
annotations:
31+
promcat.sysdig.com/integration_type: nginx
32+
promcat.sysdig.com/port: "9113"
3133
```
34+
35+
# Sysdig Agent configuration
36+
Below you can find the configuration for the sysdig agent.

resources/redis/INSTALL.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ spec:
3939
template:
4040
metadata:
4141
annotations:
42+
promcat.sysdig.com/integration_type: redis
4243
promcat.sysdig.com/port: "9121"
43-
4444
# Add here the namespace, workload type (deployment, statefulset, replicaset, daemonset)
4545
# and workload name of the Redis instance that the exporter will take data from
4646
promcat.sysdig.com/target_ns: default

0 commit comments

Comments
 (0)