release 3.5.4
This commit is contained in:
@@ -4,7 +4,7 @@ helm_version: v3.10.3
|
||||
|
||||
# cmoa info
|
||||
cmoa_namespace: imxc
|
||||
cmoa_version: rel3.5.3
|
||||
cmoa_version: rel3.5.4
|
||||
|
||||
# files/00-default in role
|
||||
docker_secret_file: secret_nexus.yaml
|
||||
@@ -66,3 +66,6 @@ keycloak_clients:
|
||||
# default ip/version (not change)
|
||||
before_ip: 111.111.111.111
|
||||
before_version: rel0.0.0
|
||||
|
||||
# docker or nexus
|
||||
REPO: dockerhub
|
||||
|
||||
@@ -4,5 +4,5 @@ export KUBECONFIG=$1
|
||||
|
||||
kubectl wait node --for=condition=ready --all --timeout=60s
|
||||
|
||||
#kubectl -n imxc patch sa default -p '{"imagePullSecrets": [{"name": "regcred"}]}'
|
||||
kubectl -n imxc patch sa default -p '{"imagePullSecrets": [{"name": "regcred"}]}'
|
||||
kubectl -n default patch sa default -p '{"imagePullSecrets": [{"name": "regcred"}]}'
|
||||
|
||||
@@ -40,6 +40,8 @@ spec:
|
||||
labels:
|
||||
app: metric-analyzer-master
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: {{ .Values.global.imagepullsecrets }}
|
||||
containers:
|
||||
- image: {{ .Values.global.IMXC_IN_REGISTRY }}/metric_analyzer:{{ .Values.global.METRIC_ANALYZER_MASTER_VERSION }}
|
||||
imagePullPolicy: IfNotPresent
|
||||
|
||||
@@ -15,6 +15,8 @@ spec:
|
||||
labels:
|
||||
app: metric-analyzer-worker
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: {{ .Values.global.imagepullsecrets }}
|
||||
containers:
|
||||
- image: {{ .Values.global.IMXC_IN_REGISTRY }}/metric_analyzer_worker:{{ .Values.global.METRIC_ANALYZER_WORKER_VERSION }}
|
||||
imagePullPolicy: IfNotPresent
|
||||
|
||||
@@ -14,6 +14,8 @@ spec:
|
||||
labels:
|
||||
name: alertmanager
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: {{ .Values.global.imagepullsecrets }}
|
||||
containers:
|
||||
- name: alertmanager
|
||||
# image: quay.io/cortexproject/cortex:v1.9.0
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
image:
|
||||
#repository: quay.io/cortexproject/cortex
|
||||
repository: 0.0.0.0/cmoa3/cortex
|
||||
repository: 0.0.0.0/cortex
|
||||
# -- Allows you to override the cortex version in this chart. Use at your own risk.
|
||||
#tag: ""
|
||||
tag: v1.11.0
|
||||
@@ -334,7 +334,7 @@ alertmanager:
|
||||
# -- Sidecars that collect the configmaps with specified label and stores the included files them into the respective folders
|
||||
sidecar:
|
||||
image:
|
||||
repository: 0.0.0.0/cmoa3/k8s-sidecar
|
||||
repository: 0.0.0.0/k8s-sidecar
|
||||
tag: 1.10.7
|
||||
sha: ""
|
||||
imagePullPolicy: IfNotPresent
|
||||
@@ -701,7 +701,7 @@ ruler:
|
||||
# -- Sidecars that collect the configmaps with specified label and stores the included files them into the respective folders
|
||||
sidecar:
|
||||
image:
|
||||
repository: 0.0.0.0/cmoa3/k8s-sidecar
|
||||
repository: 0.0.0.0/k8s-sidecar
|
||||
tag: 1.10.7
|
||||
sha: ""
|
||||
imagePullPolicy: IfNotPresent
|
||||
@@ -1126,7 +1126,7 @@ nginx:
|
||||
basicAuthSecretName: ""
|
||||
|
||||
image:
|
||||
repository: 0.0.0.0/cmoa3/nginx
|
||||
repository: 0.0.0.0/nginx
|
||||
tag: 1.21
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
|
||||
@@ -55,6 +55,8 @@ spec:
|
||||
volumeMounts:
|
||||
- name: elasticsearch-data
|
||||
mountPath: /usr/share/elasticsearch/data
|
||||
imagePullSecrets:
|
||||
- name: {{ .Values.global.imagepullsecrets }}
|
||||
containers:
|
||||
- name: elasticsearch
|
||||
resources:
|
||||
|
||||
@@ -13,6 +13,8 @@ spec:
|
||||
labels:
|
||||
app: kafka-manager
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: {{ .Values.global.imagepullsecrets }}
|
||||
containers:
|
||||
- name: kafka-manager
|
||||
image: {{ .Values.global.IMXC_IN_REGISTRY }}/kafka-manager:{{ .Values.global.KAFKA_MANAGER_VERSION }}
|
||||
|
||||
@@ -1,13 +1,14 @@
|
||||
replicaCount: 1
|
||||
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: provectuslabs/kafka-ui
|
||||
registry: 0.0.0.0
|
||||
repository: kafka-ui
|
||||
pullPolicy: IfNotPresent
|
||||
# Overrides the image tag whose default is the chart appVersion.
|
||||
tag: ""
|
||||
|
||||
imagePullSecrets: []
|
||||
imagePullSecrets:
|
||||
- name: regcred
|
||||
nameOverride: ""
|
||||
fullnameOverride: ""
|
||||
|
||||
|
||||
@@ -40,6 +40,8 @@ spec:
|
||||
- zookeeper
|
||||
topologyKey: "kubernetes.io/hostname"
|
||||
terminationGracePeriodSeconds: 30
|
||||
imagePullSecrets:
|
||||
- name: {{ .Values.global.imagepullsecrets }}
|
||||
initContainers:
|
||||
- name: init-config
|
||||
image: {{ .Values.global.IMXC_IN_REGISTRY }}/kafka-initutils:{{ .Values.global.KAFKA_INITUTILS_VERSION }}
|
||||
|
||||
@@ -19,6 +19,8 @@ spec:
|
||||
labels:
|
||||
app: postgres
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: {{ .Values.global.imagepullsecrets }}
|
||||
containers:
|
||||
- name: postgres
|
||||
image: {{ .Values.global.IMXC_IN_REGISTRY }}/postgres:{{ .Values.global.POSTGRES_VERSION }}
|
||||
|
||||
@@ -18,7 +18,7 @@
|
||||
## @param image.debug Set to true if you would like to see extra information on logs
|
||||
##
|
||||
image:
|
||||
registry: 0.0.0.0/cmoa3
|
||||
registry: 0.0.0.0
|
||||
repository: rabbitmq
|
||||
tag: v1.0.0 # {{ .Values.global.RABBITMQ_VERSION }}
|
||||
|
||||
@@ -1113,7 +1113,7 @@ volumePermissions:
|
||||
## @param volumePermissions.image.pullSecrets Specify docker-registry secret names as an array
|
||||
##
|
||||
image:
|
||||
registry: 0.0.0.0/cmoa3 # docker.io
|
||||
registry: 0.0.0.0 # docker.io
|
||||
repository: bitnami-shell # bitnami/bitnami-shell
|
||||
tag: 10-debian-10-r175
|
||||
## Specify a imagePullPolicy
|
||||
|
||||
@@ -13,7 +13,7 @@ global:
|
||||
## ref: https://hub.docker.com/r/bitnami/redis/tags/
|
||||
##
|
||||
image:
|
||||
registry: 0.0.0.0/cmoa3
|
||||
registry: 0.0.0.0
|
||||
repository: redis
|
||||
## Bitnami Redis(TM) image tag
|
||||
## ref: https://github.com/bitnami/bitnami-docker-redis#supported-tags-and-respective-dockerfile-links
|
||||
@@ -28,8 +28,8 @@ image:
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
pullSecrets:
|
||||
- regcred
|
||||
|
||||
## String to partially override redis.fullname template (will maintain the release name)
|
||||
##
|
||||
@@ -75,8 +75,8 @@ sentinel:
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
pullSecrets:
|
||||
- regcred
|
||||
masterSet: mymaster
|
||||
initialCheckTimeout: 5
|
||||
quorum: 2
|
||||
@@ -735,8 +735,8 @@ metrics:
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
pullSecrets:
|
||||
- regcred
|
||||
|
||||
## Metrics exporter resource requests and limits
|
||||
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
|
||||
@@ -863,8 +863,8 @@ volumePermissions:
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
pullSecrets:
|
||||
- regcred
|
||||
resources: {}
|
||||
# resources:
|
||||
# requests:
|
||||
@@ -906,8 +906,8 @@ sysctlImage:
|
||||
## Secrets must be manually created in the namespace.
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
##
|
||||
# pullSecrets:
|
||||
# - myRegistryKeySecretName
|
||||
pullSecrets:
|
||||
- regcred
|
||||
mountHostSys: false
|
||||
resources: {}
|
||||
# resources:
|
||||
|
||||
@@ -20,6 +20,8 @@ spec:
|
||||
storage: persistent
|
||||
annotations:
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: {{ .Values.global.imagepullsecrets }}
|
||||
terminationGracePeriodSeconds: 10
|
||||
initContainers:
|
||||
- name: init-config
|
||||
|
||||
@@ -71,3 +71,5 @@ global:
|
||||
image:
|
||||
registry: 10.10.43.230:5000/cmoa3 # {{ .Values.global.IMXC_REGISTRY }}
|
||||
tag: v1.0.0 # {{ .Values.global.RABBITMQ_VERSION }}
|
||||
|
||||
imagepullsecrets: regcred
|
||||
|
||||
@@ -0,0 +1,68 @@
|
||||
-- DeploymentConfig 지원을 위한 Table 추가
|
||||
CREATE TABLE cmoa_deploymentconfig_base(
|
||||
kube_flatting_time bigint,
|
||||
cluster_id varchar(255),
|
||||
kind varchar(30),
|
||||
metadata_uid varchar(40),
|
||||
row_index int,
|
||||
kind_status varchar(50),
|
||||
metadata_creationTimestamp varchar(25),
|
||||
metadata_name text,
|
||||
metadata_namespace text,
|
||||
metadata_resourceVersion text,
|
||||
spec_replicas text,
|
||||
spec_template_spec_containers_image text,
|
||||
spec_template_metadata_labels text,
|
||||
status_availableReplicas text,
|
||||
status_updatedReplicas text,
|
||||
status_replicas text,
|
||||
status_unavailableReplicas text,
|
||||
create_time timestamp default now(),
|
||||
PRIMARY KEY (kube_flatting_time, cluster_id, kind, metadata_uid, row_index)
|
||||
);
|
||||
|
||||
-- ReplicationController 지원을 위한 Table 추가
|
||||
CREATE TABLE cmoa_replicationcontroller_base (
|
||||
kube_flatting_time bigint,
|
||||
cluster_id varchar(255),
|
||||
kind varchar(30),
|
||||
metadata_uid varchar(40),
|
||||
row_index int,
|
||||
kind_status varchar(50),
|
||||
metadata_annotations text,
|
||||
metadata_creationtimestamp varchar(25),
|
||||
metadata_labels text,
|
||||
metadata_name text,
|
||||
metadata_namespace text,
|
||||
metadata_resourceversion text,
|
||||
spec_replicas text,
|
||||
status_availablereplicas text,
|
||||
status_readyreplicas text,
|
||||
status_replicas text,
|
||||
status_observedgeneration text,
|
||||
create_time timestamp default now(),
|
||||
PRIMARY KEY (kube_flatting_time, cluster_id, kind, metadata_uid, row_index)
|
||||
);
|
||||
|
||||
create table public.audit_log
|
||||
(
|
||||
id bigserial
|
||||
constraint audit_log_pk
|
||||
primary key,
|
||||
created_date timestamp not null,
|
||||
user_id varchar not null,
|
||||
type varchar not null,
|
||||
menu_path varchar not null,
|
||||
result boolean not null,
|
||||
target jsonb
|
||||
);
|
||||
|
||||
|
||||
|
||||
-- DeploymentConfig Event 관련 metric meta 추가
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_deploymentconfig','Kubernetes DeploymentConfig Event','Kubernetes DeploymentConfig Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="DeploymentConfig", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('host_count','Host Count','Host Count','count(node_boot_time_seconds{is_host="true"})','Host','System','','true','false','Host Count : {{humanize $value}}');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('host_alive','Host Alive','Host Alive','count(node_boot_time_seconds{is_host="true", {filter}})','Host','System','','true','false','Host Alive : {{$labels.instance}}');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('host_dead','Host Dead','Host Dead','absent(node_boot_time_seconds{is_host="true", {filter}})','Host','System','','true','false','Host Dead : {{$labels.instance}}');
|
||||
|
||||
commit;
|
||||
@@ -1085,6 +1085,28 @@ CREATE TABLE cmoa_deployment_base(
|
||||
PRIMARY KEY (kube_flatting_time, cluster_id, kind, metadata_uid, row_index)
|
||||
);
|
||||
----------------------------
|
||||
CREATE TABLE cmoa_deploymentconfig_base(
|
||||
kube_flatting_time bigint,
|
||||
cluster_id varchar(255),
|
||||
kind varchar(30),
|
||||
metadata_uid varchar(40),
|
||||
row_index int,
|
||||
kind_status varchar(50),
|
||||
metadata_creationTimestamp varchar(25),
|
||||
metadata_name text,
|
||||
metadata_namespace text,
|
||||
metadata_resourceVersion text,
|
||||
spec_replicas text,
|
||||
spec_template_spec_containers_image text,
|
||||
spec_template_metadata_labels text,
|
||||
status_availableReplicas text,
|
||||
status_updatedReplicas text,
|
||||
status_replicas text,
|
||||
status_unavailableReplicas text,
|
||||
create_time timestamp default now(),
|
||||
PRIMARY KEY (kube_flatting_time, cluster_id, kind, metadata_uid, row_index)
|
||||
);
|
||||
----------------------------
|
||||
CREATE TABLE cmoa_endpoint_addresses(
|
||||
kube_flatting_time bigint,
|
||||
kind varchar(30),
|
||||
@@ -1558,6 +1580,28 @@ CREATE TABLE cmoa_replicaset_base (
|
||||
PRIMARY KEY (kube_flatting_time, cluster_id, kind, metadata_uid, row_index)
|
||||
);
|
||||
----------------------------
|
||||
CREATE TABLE cmoa_replicationcontroller_base (
|
||||
kube_flatting_time bigint,
|
||||
cluster_id varchar(255),
|
||||
kind varchar(30),
|
||||
metadata_uid varchar(40),
|
||||
row_index int,
|
||||
kind_status varchar(50),
|
||||
metadata_annotations text,
|
||||
metadata_creationtimestamp varchar(25),
|
||||
metadata_labels text,
|
||||
metadata_name text,
|
||||
metadata_namespace text,
|
||||
metadata_resourceversion text,
|
||||
spec_replicas text,
|
||||
status_availablereplicas text,
|
||||
status_readyreplicas text,
|
||||
status_replicas text,
|
||||
status_observedgeneration text,
|
||||
create_time timestamp default now(),
|
||||
PRIMARY KEY (kube_flatting_time, cluster_id, kind, metadata_uid, row_index)
|
||||
);
|
||||
----------------------------
|
||||
CREATE TABLE cmoa_resourcequota_base (
|
||||
kube_flatting_time bigint,
|
||||
cluster_id varchar(255),
|
||||
@@ -1734,3 +1778,17 @@ CREATE TABLE public.tenant_info_auth_resources (
|
||||
|
||||
ALTER TABLE public.tenant_info_auth_resources ADD CONSTRAINT fkkecsc13ydhwg8u05aumkqbnx1 FOREIGN KEY (tenant_info_id) REFERENCES public.tenant_info(id);
|
||||
ALTER TABLE public.tenant_info_auth_resources ADD CONSTRAINT fkpvvec4ju3hsma6s1rtgvr4mf6 FOREIGN KEY (auth_resources_id) REFERENCES public.auth_resource3(id);
|
||||
|
||||
create table public.audit_log
|
||||
(
|
||||
id bigserial
|
||||
constraint audit_log_pk
|
||||
primary key,
|
||||
created_date timestamp not null,
|
||||
user_id varchar not null,
|
||||
type varchar not null,
|
||||
menu_path varchar not null,
|
||||
result boolean not null,
|
||||
target jsonb
|
||||
);
|
||||
|
||||
|
||||
@@ -1291,6 +1291,10 @@ INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,ent
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('host_process_write_bytes','Host Process write bytes(KiB)','number of bytes written by this group/1024','sum by (groupname) (rate(namedprocess_namegroup_write_bytes_total{{filter}}[1m]))/1024','Process','Host','','true','false','"Host:{{$labels.instance}} Disk Write Size:{{humanize $value}}KiB|{threshold}KiB."');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('host_process_count','Host Process number','number of processes in this group', 'sum by (groupname) (namedprocess_namegroup_num_procs{{filter}})', 'Process','Host','','true','false','"Host:{{$labels.instance}} Count:{{humanize $value}}|{threshold}."');
|
||||
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('host_count','Host Count','Host Count','count(node_boot_time_seconds{is_host="true"})','Host','System','','true','false','Host Count : {{humanize $value}}');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('host_alive','Host Alive','Host Alive','count(node_boot_time_seconds{is_host="true", {filter}})','Host','System','','true','false','Host Alive : {{$labels.instance}}');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('host_dead','Host Dead','Host Dead','absent(node_boot_time_seconds{is_host="true", {filter}})','Host','System','','true','false','Host Dead : {{$labels.instance}}');
|
||||
|
||||
INSERT INTO public.license_key (id, license_key, set_time, in_used, tenant_id) VALUES (nextval('hibernate_sequence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now(), true, 'DEFAULT_TENANT');
|
||||
insert into public.license_key2 (id, license_key, set_time, cluster_id, license_used) values (nextval('hibernate_sequence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', now(), null, true);
|
||||
|
||||
@@ -2455,17 +2459,18 @@ INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,ent
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('nginx_http_requests_total','Nginx Http Requests','Http request count of Nginx','sum by (instance) (irate(nginx_http_requests_total{ {filter} }[1m]))','Request','Nginx','','true','false','"Http requests : {{$value}}|{threshold}"');
|
||||
|
||||
-- Kube Event 관련 metric meta 추가
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_node','Kubernetes Node Event','Kubernetes Node Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Node"})','Event','Node','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_job','Kubernetes Job Event','Kubernetes Job Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Job"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_cronjob','Kubernetes CronJob Event','Kubernetes CronJob Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="CronJob"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_daemonset','Kubernetes DaemonSet Event','Kubernetes DaemonSet Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="DaemonSet"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_deployment','Kubernetes Deployment Event','Kubernetes Deployment Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Deployment"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_endpoints','Kubernetes Endpoints Event','Kubernetes Endpoints Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Endpoints"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_persistentvolumeclaim','Kubernetes PersistentVolumeClaim Event','Kubernetes PersistentVolumeClaim Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="PersistentVolumeClaim"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_pod','Kubernetes Pod Event','Kubernetes Pod Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Pod"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_warning','Kubernetes Warning Event','Kubernetes Warning Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{type="Warning"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Name: {{$involved_name}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_replicaset','Kubernetes ReplicaSet Event','Kubernetes ReplicaSet Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="ReplicaSet"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_statefulset','Kubernetes StatefulSet Event','Kubernetes StatefulSet Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="StatefulSet"})','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_node','Kubernetes Node Event','Kubernetes Node Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Node", {filter} })','Event','Node','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_job','Kubernetes Job Event','Kubernetes Job Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Job", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_cronjob','Kubernetes CronJob Event','Kubernetes CronJob Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="CronJob", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_daemonset','Kubernetes DaemonSet Event','Kubernetes DaemonSet Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="DaemonSet", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_deployment','Kubernetes Deployment Event','Kubernetes Deployment Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Deployment", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_deploymentconfig','Kubernetes DeploymentConfig Event','Kubernetes DeploymentConfig Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="DeploymentConfig", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_endpoints','Kubernetes Endpoints Event','Kubernetes Endpoints Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Endpoints", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_persistentvolumeclaim','Kubernetes PersistentVolumeClaim Event','Kubernetes PersistentVolumeClaim Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="PersistentVolumeClaim", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_pod','Kubernetes Pod Event','Kubernetes Pod Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="Pod", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_warning','Kubernetes Warning Event','Kubernetes Warning Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{type="Warning", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Name: {{$involved_name}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_replicaset','Kubernetes ReplicaSet Event','Kubernetes ReplicaSet Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="ReplicaSet", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('kube_event_statefulset','Kubernetes StatefulSet Event','Kubernetes StatefulSet Event','count by (xm_clst_id,xm_namespace,entity_type,involved_kind,involved_name,reason,type) (imxc_kubernetes_event_in_last_min{involved_kind="StatefulSet", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} ');
|
||||
|
||||
-- Event Alert 관련 metric meta 추가
|
||||
INSERT INTO public.metric_meta2 (id,meta_name,description,expr,resource_type,entity_type,groupby_keys,in_use,anomaly_score,message) VALUES('event_alert_successful_create','Event Alert SuccessfulCreate','Event Alert SuccessfulCreate','count by (xm_clst_id, xm_namespace, entity_type, involved_kind, involved_name, reason, type) (imxc_kubernetes_event_in_last_min{reason=~"SuccessfulCreate", {filter} })','Event','Workload','','true','false','CLST:{{$labels.xm_clst_id}} NS:{{$labels.xm_namespace}} Reason : {{$labels.reason}} Level : {{$labels.type}} Name : {{$labels.involved_name}} ');
|
||||
|
||||
@@ -98,9 +98,21 @@ spec:
|
||||
value: {{ .Values.global.IMXC_NAMESPACE }}
|
||||
- name: IMXC_ALERT_KUBERNETES_NAMESPACE
|
||||
value: {{ .Values.global.IMXC_NAMESPACE }}
|
||||
|
||||
# log4j
|
||||
- name: LOG4J_FORMAT_MSG_NO_LOOKUPS
|
||||
value: "true"
|
||||
|
||||
# service-now
|
||||
- name: IMXC_ALERT_NOTIFICATION_SERVICE-NOW_ENABLED
|
||||
value: "false"
|
||||
- name: IMXC_ALERT_NOTIFICATION_SERVICE-NOW_KEY
|
||||
value: ""
|
||||
- name: IMXC_ALERT_NOTIFICATION_SERVICE-NOW_AUTH_ID
|
||||
value: ""
|
||||
- name: IMXC_ALERT_NOTIFICATION_SERVICE-NOW_AUTH_PASSWORD
|
||||
value: ""
|
||||
|
||||
resources:
|
||||
requests:
|
||||
memory: "100Mi"
|
||||
|
||||
@@ -10,7 +10,7 @@
|
||||
kubernetes.core.k8s:
|
||||
state: present
|
||||
namespace: "{{ item }}"
|
||||
src: "{{ role_path }}/files/00-default/secret_nexus.yaml"
|
||||
src: "{{ role_path }}/files/00-default/secret_{{ REPO }}.yaml"
|
||||
apply: yes
|
||||
with_items:
|
||||
- "{{ cmoa_namespace }}"
|
||||
|
||||
@@ -20,11 +20,9 @@
|
||||
- "{{ role_path }}/files/01-storage/{{item}}/values.yaml"
|
||||
values:
|
||||
image:
|
||||
repository: "{{ REGISTRY }}/cmoa3/minio"
|
||||
imagePullSecrets:
|
||||
- name: "{{ PullSecret }}"
|
||||
repository: "{{ REGISTRY }}/minio"
|
||||
mcImage:
|
||||
repository: "{{ REGISTRY }}/cmoa3/mc"
|
||||
repository: "{{ REGISTRY }}/mc"
|
||||
with_items:
|
||||
- minio
|
||||
|
||||
|
||||
@@ -18,11 +18,12 @@
|
||||
- 01-coredns.yaml
|
||||
|
||||
- name: 3. Change Registry Address
|
||||
command: "sed -i 's/0.0.0.0/{{ REGISTRY }}/g' {{ role_path }}/files/02-base/base/charts/{{ item }}/values.yaml"
|
||||
command: "sed -i 's#0.0.0.0#{{ REGISTRY }}#g' {{ role_path }}/files/02-base/base/charts/{{ item }}/values.yaml"
|
||||
with_items:
|
||||
- cortex
|
||||
- rabbitmq
|
||||
- redis
|
||||
- kafka-ui
|
||||
|
||||
- name: 4. helmchart install (base)
|
||||
kubernetes.core.helm:
|
||||
@@ -36,10 +37,10 @@
|
||||
- "{{ role_path }}/files/02-base/{{item}}/values.yaml"
|
||||
values:
|
||||
global:
|
||||
IMXC_IN_REGISTRY: "{{ REGISTRY }}/cmoa3"
|
||||
IMXC_IN_REGISTRY: "{{ REGISTRY }}"
|
||||
rabbitmq:
|
||||
image:
|
||||
registry: "{{ REGISTRY }}/cmoa3"
|
||||
registry: "{{ REGISTRY }}"
|
||||
tag: v1.0.0
|
||||
with_items:
|
||||
- base
|
||||
@@ -82,8 +83,9 @@
|
||||
apply: yes
|
||||
|
||||
- name: 8. Change Registry Address - origin
|
||||
command: "sed -i 's/{{ REGISTRY }}/0.0.0.0/g' {{ role_path }}/files/02-base/base/charts/{{ item }}/values.yaml"
|
||||
command: "sed -i 's#{{ REGISTRY }}#0.0.0.0#g' {{ role_path }}/files/02-base/base/charts/{{ item }}/values.yaml"
|
||||
with_items:
|
||||
- cortex
|
||||
- rabbitmq
|
||||
- redis
|
||||
- kafka-ui
|
||||
|
||||
@@ -11,12 +11,10 @@
|
||||
- "{{ role_path }}/files/04-keycloak/values.yaml"
|
||||
values:
|
||||
image:
|
||||
repository: "{{ REGISTRY }}/cmoa3/keycloak"
|
||||
imagePullSecrets:
|
||||
- name: "{{ PullSecret }}"
|
||||
repository: "{{ REGISTRY }}/keycloak"
|
||||
extraInitContainers: |
|
||||
- name: theme-provider
|
||||
image: "{{ REGISTRY }}/cmoa3/theme-provider:latest"
|
||||
image: "{{ REGISTRY }}/theme-provider:latest"
|
||||
imagePullPolicy: IfNotPresent
|
||||
command:
|
||||
- sh
|
||||
@@ -30,7 +28,7 @@
|
||||
mountPath: /theme
|
||||
pgchecker:
|
||||
image:
|
||||
repository: "{{ REGISTRY }}/cmoa3/busybox"
|
||||
repository: "{{ REGISTRY }}/busybox"
|
||||
tag: 1.32
|
||||
pullPolicy: Always
|
||||
with_items:
|
||||
|
||||
@@ -11,9 +11,9 @@
|
||||
- "{{ role_path }}/files/05-imxc/values.yaml"
|
||||
values:
|
||||
image:
|
||||
repository: "{{ REGISTRY }}/cmoa3/nginx"
|
||||
repository: "{{ REGISTRY }}/nginx"
|
||||
global:
|
||||
IMXC_IN_REGISTRY: "{{ REGISTRY }}/cmoa3"
|
||||
IMXC_IN_REGISTRY: "{{ REGISTRY }}"
|
||||
with_items:
|
||||
- imxc
|
||||
|
||||
|
||||
@@ -11,9 +11,9 @@
|
||||
- "{{ role_path }}/files/06-imxc-ui/{{ item }}/values.yaml"
|
||||
values:
|
||||
image:
|
||||
repository: "{{ REGISTRY }}/cmoa3/nginx"
|
||||
repository: "{{ REGISTRY }}/nginx"
|
||||
global:
|
||||
IMXC_IN_REGISTRY: "{{ REGISTRY }}/cmoa3"
|
||||
IMXC_IN_REGISTRY: "{{ REGISTRY }}"
|
||||
with_items:
|
||||
- imxc-ui
|
||||
ignore_errors: true
|
||||
|
||||
@@ -15,6 +15,12 @@ kubernetes_calico_manifest_file: "{{ role_path }}/files/calico.yaml"
|
||||
|
||||
kubernetes_metric_server_file: "{{ role_path }}/files/components.yaml"
|
||||
|
||||
|
||||
crio:
|
||||
version: 1.23
|
||||
os: xUbuntu_20.04
|
||||
|
||||
|
||||
containerd_config:
|
||||
version: 2
|
||||
root: /var/lib/containerd
|
||||
@@ -110,7 +116,7 @@ containerd_config:
|
||||
- https://registry-1.docker.io
|
||||
"10.10.31.243:5000":
|
||||
endpoint:
|
||||
- http://10.10.31.243:5000
|
||||
- "http://10.10.31.243:5000"
|
||||
x509_key_pair_streaming:
|
||||
tls_cert_file: ""
|
||||
tls_key_file: ""
|
||||
|
||||
Reference in New Issue
Block a user