Skip to content

Commit 6214c28

Browse files
committed
Improve and fix files
1 parent 9a1a1de commit 6214c28

File tree

21 files changed

+39
-27
lines changed

21 files changed

+39
-27
lines changed

resources/apache/INSTALL.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,8 @@ To configure Apache server to produce common logs, include (or uncomment) the fo
7878
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
7979
CustomLog /usr/local/apache2/logs/accesss.log common
8080
</IfModule>
81-
```# Installation
81+
```
82+
# Installation
8283

8384
You can use our helm-charts in order to install the exporter in your cluster.
8485
```sh

resources/ceph/INSTALL.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ Make sure that the Prometheus module is activated in the Ceph cluster by running
77

88
```
99
ceph mgr module enable prometheus
10-
```# Installation
10+
```
11+
# Installation
1112

1213
The application is ready to be scraped

resources/consul/INSTALL.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ If you install Consul with Helm, you need to use the following flags:
1111
--set 'global.metrics.enableAgentMetrics=true'
1212
--set 'server.extraConfig="{"telemetry": {"disable_hostname": true}}"'
1313
--set 'client.extraConfig="{"telemetry": {"disable_hostname": true}}"'
14-
```# Installation
14+
```
15+
# Installation
1516

1617
The application is ready to be scraped

resources/elasticsearch/INSTALL.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,24 +2,17 @@
22

33
### Create the Secrets
44
Keep in mind:
5-
* If your ElasticSearch cluster is using basic authentication, the secret that contains the url must have the user and password.
5+
* If your ElasticSearch cluster is using basic authentication, you have to create the secret that contains the user and password.
66
* The secrets need to be created **in the same namespace where the exporter** will be deployed.
77
* Use the **same _user name_ and _password_ that you used for the api**.
88
* You can change the name of the secret. If you do this, you will need to **select it in the next steps** of the integration.
99

10-
#### Create the Secret for the URL
11-
##### Without Authentication
12-
```sh
13-
kubectl -n Your-Application-Namespace create secret generic elastic-url-secret \
14-
--from-literal=url='http://SERVICE:PORT'
15-
```
10+
#### Create the Secret for the username and password with Basic Auth option
1611

17-
##### With Basic Auth
1812
```sh
19-
kubectl -n Your-Application-Namespace create secret generic elastic-url-secret \
20-
--from-literal=url='https://USERNAME:PASSWORD@SERVICE:PORT'
13+
kubectl -n Your-Exporter-Namespace create secret generic elastic-user-pass-secret \
14+
--from-literal=username='<your-username>' --from-literal=password='<your-password>'
2115
```
22-
NOTE: You can use either http or https in the URL.
2316

2417
#### Create the Secret for the TLS Certs
2518
If you are using HTTPS with custom certificates, follow the instructions given below.
@@ -29,6 +22,7 @@ kubectl create -n Your-Application-Namespace secret generic elastic-tls-secret \
2922
--from-file=root-ca.key=/path/to/tls/ca-key \
3023
--from-file=root-ca.pem=/path/to/tls/ca-pem
3124
```
25+
3226
# Installation
3327

3428
You can use our helm-charts in order to install the exporter in your cluster.

resources/fluentd/INSTALL.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ As seen in the [official plugin documentation](https://github.com/fluent/fluent-
3434
```
3535

3636
If you are deploying Fluentd using the [official Helm chart](https://github.com/fluent/helm-charts/tree/main/charts/fluentd), it already has these plugins enabled by default in its configuration, so no additional actions are needed.
37+
3738
# Installation
3839

3940
The application is ready to be scraped

resources/haproxy-ingress/INSTALL.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ frontend prometheus
2626
http-request use-service lua.send-prometheus-root if { path / }
2727
http-request use-service lua.send-404
2828
no log
29-
```# Installation
29+
```
30+
# Installation
3031

3132
The application is ready to be scraped

resources/harbor/INSTALL.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ As seen in the Harbor documentation page [Configure the Harbor YML File](https:/
77
If you install Harbor with Helm, you need to use the following flag:
88
```
99
--set 'metrics.enabled=true'
10-
```# Installation
10+
```
11+
# Installation
1112

1213
The application is ready to be scraped

resources/kafka/INSTALL.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,8 @@ kubectl create secret generic kafka-exporter-sasl-scram --from-file=username --f
3636
If using SASL+Kerberos, you'll need to create a Secret which contains the "kerberos.conf". If the 'Kerberos Auth Type' is 'keytabAuth', it should also contain the "kerberos.keytab". Example:
3737
```
3838
kubectl create secret generic kafka-exporter-sasl-kerberos --from-file=./kerberos.conf --from-file=./kerberos.keytab --dry-run=true -o yaml | kubectl apply -f -
39-
```# Installation
39+
```
40+
# Installation
4041

4142
You can use our helm-charts in order to install the exporter in your cluster.
4243
```sh

resources/keda/INSTALL.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ Make sure that the prometheus metrics are activated. If you install Keda with He
77
```
88
--set prometheus.metricServer.enabled=true
99
```
10+
1011
# Installation
1112

1213
The application is ready to be scraped

resources/mongodb/INSTALL.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,10 @@ To configure authentication, do the following:
3030
mongodb://<YOUR-EXPORTER-USER>:<YOUR-EXPORTER-PASSWORD>@<YOUR-MONGODB-HOST>:<PORT>
3131
3232
# TLS
33-
mongodb://<YOUR-EXPORTER-USER>:<YOUR-EXPORTER-PASSWORD>@<YOUR-MONGODB-HOST>:<PORT>/admin?tls=true&amp;tlsCertificateKeyFile=/etc/mongodb/mongodb-exporter-key.pem&amp;tlsAllowInvalidCertificates=true&amp;tlsCAFile=/etc/mongodb/mongodb-exporter-ca.pem
33+
mongodb://<YOUR-EXPORTER-USER>:<YOUR-EXPORTER-PASSWORD>@<YOUR-MONGODB-HOST>:<PORT>/admin?tls=true&tlsCertificateKeyFile=/etc/mongodb/mongodb-exporter-key.pem&tlsAllowInvalidCertificates=true&tlsCAFile=/etc/mongodb/mongodb-exporter-ca.pem
3434
3535
# SSL
36-
mongodb://<YOUR-EXPORTER-USER>:<YOUR-EXPORTER-PASSWORD>@<YOUR-MONGODB-HOST>:<PORT>/admin?ssl=true&amp;sslclientcertificatekeyfile=/etc/mongodb/mongodb-exporter-key.pem&amp;sslinsecure=true&amp;sslcertificateauthorityfile=/etc/mongodb/mongodb-exporter-ca.pem
36+
mongodb://<YOUR-EXPORTER-USER>:<YOUR-EXPORTER-PASSWORD>@<YOUR-MONGODB-HOST>:<PORT>/admin?ssl=true&sslclientcertificatekeyfile=/etc/mongodb/mongodb-exporter-key.pem&sslinsecure=true&sslcertificateauthorityfile=/etc/mongodb/mongodb-exporter-ca.pem
3737
```
3838
2. Create the secret for the connection string:
3939
```
@@ -45,7 +45,8 @@ To configure authentication, do the following:
4545
kubectl create secret -n Your-Exporter-Namespace generic mongodb-exporter-auth \
4646
--from-file=mongodb-key=<route-to-your-private-key.pem> \
4747
--from-file=mongodb-ca=<route-to-your-ca.pem>
48-
```# Installation
48+
```
49+
# Installation
4950

5051
You can use our helm-charts in order to install the exporter in your cluster.
5152
```sh

0 commit comments

Comments
 (0)