aboutsummaryrefslogtreecommitdiffstats
path: root/fdio.infra.terraform/1n_nmd/prometheus
diff options
context:
space:
mode:
authorPeter Mikus <pmikus@cisco.com>2022-03-31 15:59:10 +0200
committerPeter Mikus <pmikus@cisco.com>2022-04-01 10:54:23 +0000
commitca81b6ccfdcee62846217f824c1e4a1610b8a950 (patch)
treef0f836509b346cd59e9d10b5d67abe71cddb3264 /fdio.infra.terraform/1n_nmd/prometheus
parente972e67afac3ab3eb785668d01d3bdf1833eade9 (diff)
refactor(terraform): Directory structure
Signed-off-by: Peter Mikus <pmikus@cisco.com> Change-Id: I2f3cdf0241aaf7c4a8ba4e00b701df10c9165cf8
Diffstat (limited to 'fdio.infra.terraform/1n_nmd/prometheus')
-rw-r--r--fdio.infra.terraform/1n_nmd/prometheus/conf/nomad/prometheus.hcl.tftpl624
-rw-r--r--fdio.infra.terraform/1n_nmd/prometheus/fdio/main.tf10
-rw-r--r--fdio.infra.terraform/1n_nmd/prometheus/fdio/providers.tf13
-rw-r--r--fdio.infra.terraform/1n_nmd/prometheus/fdio/variables.tf47
-rw-r--r--fdio.infra.terraform/1n_nmd/prometheus/fdio/versions.tf17
-rw-r--r--fdio.infra.terraform/1n_nmd/prometheus/main.tf42
-rw-r--r--fdio.infra.terraform/1n_nmd/prometheus/variables.tf127
-rw-r--r--fdio.infra.terraform/1n_nmd/prometheus/versions.tf9
8 files changed, 0 insertions, 889 deletions
diff --git a/fdio.infra.terraform/1n_nmd/prometheus/conf/nomad/prometheus.hcl.tftpl b/fdio.infra.terraform/1n_nmd/prometheus/conf/nomad/prometheus.hcl.tftpl
deleted file mode 100644
index 224f7e5e00..0000000000
--- a/fdio.infra.terraform/1n_nmd/prometheus/conf/nomad/prometheus.hcl.tftpl
+++ /dev/null
@@ -1,624 +0,0 @@
-job "${job_name}" {
- # The "region" parameter specifies the region in which to execute the job.
- # If omitted, this inherits the default region name of "global".
- # region = "${region}"
-
- # The "datacenters" parameter specifies the list of datacenters which should
- # be considered when placing this task. This must be provided.
- datacenters = "${datacenters}"
-
- # The "type" parameter controls the type of job, which impacts the scheduler's
- # decision on placement. This configuration is optional and defaults to
- # "service". For a full list of job types and their differences, please see
- # the online documentation.
- #
- # https://www.nomadproject.io/docs/jobspec/schedulers
- #
- type = "service"
-
- update {
- # The "max_parallel" parameter specifies the maximum number of updates to
- # perform in parallel. In this case, this specifies to update a single task
- # at a time.
- max_parallel = ${max_parallel}
-
- health_check = "checks"
-
- # The "min_healthy_time" parameter specifies the minimum time the allocation
- # must be in the healthy state before it is marked as healthy and unblocks
- # further allocations from being updated.
- min_healthy_time = "10s"
-
- # The "healthy_deadline" parameter specifies the deadline in which the
- # allocation must be marked as healthy after which the allocation is
- # automatically transitioned to unhealthy. Transitioning to unhealthy will
- # fail the deployment and potentially roll back the job if "auto_revert" is
- # set to true.
- healthy_deadline = "3m"
-
- # The "progress_deadline" parameter specifies the deadline in which an
- # allocation must be marked as healthy. The deadline begins when the first
- # allocation for the deployment is created and is reset whenever an allocation
- # as part of the deployment transitions to a healthy state. If no allocation
- # transitions to the healthy state before the progress deadline, the
- # deployment is marked as failed.
- progress_deadline = "10m"
-
-%{ if use_canary }
- # The "canary" parameter specifies that changes to the job that would result
- # in destructive updates should create the specified number of canaries
- # without stopping any previous allocations. Once the operator determines the
- # canaries are healthy, they can be promoted which unblocks a rolling update
- # of the remaining allocations at a rate of "max_parallel".
- #
- # Further, setting "canary" equal to the count of the task group allows
- # blue/green deployments. When the job is updated, a full set of the new
- # version is deployed and upon promotion the old version is stopped.
- canary = ${canary}
-
- # Specifies if the job should auto-promote to the canary version when all
- # canaries become healthy during a deployment. Defaults to false which means
- # canaries must be manually updated with the nomad deployment promote
- # command.
- auto_promote = ${auto_promote}
-
- # The "auto_revert" parameter specifies if the job should auto-revert to the
- # last stable job on deployment failure. A job is marked as stable if all the
- # allocations as part of its deployment were marked healthy.
- auto_revert = ${auto_revert}
-%{ endif }
- }
-
- # The "group" stanza defines a series of tasks that should be co-located on
- # the same Nomad client. Any task within a group will be placed on the same
- # client.
- #
- # https://www.nomadproject.io/docs/job-specification/group
- #
- group "${job_name}-group-1" {
- # The "count" parameter specifies the number of the task groups that should
- # be running under this group. This value must be non-negative and defaults
- # to 1.
- count = ${group_count}
-
- # The volume stanza allows the group to specify that it requires a given
- # volume from the cluster. The key of the stanza is the name of the volume
- # as it will be exposed to task configuration.
- #
- # https://www.nomadproject.io/docs/job-specification/volume
- %{ if use_host_volume }
- volume "${job_name}-volume-1" {
- type = "host"
- read_only = false
- source = "${volume_source}"
- }
- %{ endif }
-
- # The restart stanza configures a tasks's behavior on task failure. Restarts
- # happen on the client that is running the task.
- #
- # https://www.nomadproject.io/docs/job-specification/restart
- #
- restart {
- interval = "30m"
- attempts = 40
- delay = "15s"
- mode = "delay"
- }
-
- # The constraint allows restricting the set of eligible nodes. Constraints
- # may filter on attributes or client metadata.
- #
- # https://www.nomadproject.io/docs/job-specification/constraint
- #
- constraint {
- attribute = "$${attr.cpu.arch}"
- operator = "!="
- value = "arm64"
- }
-
- constraint {
- attribute = "$${node.class}"
- value = "builder"
- }
-
- # The network stanza specifies the networking requirements for the task
- # group, including the network mode and port allocations. When scheduling
- # jobs in Nomad they are provisioned across your fleet of machines along
- # with other jobs and services. Because you don't know in advance what host
- # your job will be provisioned on, Nomad will provide your tasks with
- # network configuration when they start up.
- #
- # https://www.nomadproject.io/docs/job-specification/network
- #
- network {
- port "${service_name}" {
- static = ${port}
- to = ${port}
- }
- }
-
- # The "task" stanza creates an individual unit of work, such as a Docker
- # container, web application, or batch processing.
- #
- # https://www.nomadproject.io/docs/job-specification/task
- #
- task "${job_name}-task-1" {
- # The "driver" parameter specifies the task driver that should be used to
- # run the task.
- driver = "exec"
-
- %{ if use_host_volume }
- volume_mount {
- volume = "${job_name}-volume-1"
- destination = "${volume_destination}"
- read_only = false
- }
- %{ endif }
-
- %{ if use_vault_provider }
- vault {
- policies = "${vault_kv_policy_name}"
- }
- %{ endif }
-
- # The "config" stanza specifies the driver configuration, which is passed
- # directly to the driver to start the task. The details of configurations
- # are specific to each driver, so please see specific driver
- # documentation for more information.
- config {
- command = "local/prometheus-${version}.linux-amd64/prometheus"
- args = [
- "--config.file=secrets/prometheus.yml",
- "--storage.tsdb.path=${volume_destination}prometheus/",
- "--storage.tsdb.retention.time=7d"
- ]
- }
-
- # The artifact stanza instructs Nomad to fetch and unpack a remote resource,
- # such as a file, tarball, or binary. Nomad downloads artifacts using the
- # popular go-getter library, which permits downloading artifacts from a
- # variety of locations using a URL as the input source.
- #
- # https://www.nomadproject.io/docs/job-specification/artifact
- #
- artifact {
- source = "${url}"
- }
-
- # The "template" stanza instructs Nomad to manage a template, such as
- # a configuration file or script. This template can optionally pull data
- # from Consul or Vault to populate runtime configuration data.
- #
- # https://www.nomadproject.io/docs/job-specification/template
- #
- template {
- change_mode = "noop"
- change_signal = "SIGINT"
- destination = "secrets/alerts.yml"
- left_delimiter = "{{{"
- right_delimiter = "}}}"
- data = <<EOH
----
-groups:
-- name: "Jenkins Job Health Exporter"
- rules:
- - alert: JenkinsJobHealthExporterFailures
- expr: jenkins_job_failure{id=~".*"} > jenkins_job_success{id=~".*"}
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Jenkins Job Health detected high failure rate on jenkins jobs."
- description: "Job: {{ $labels.id }}"
- - alert: JenkinsJobHealthExporterUnstable
- expr: jenkins_job_unstable{id=~".*"} > jenkins_job_success{id=~".*"}
- for: 0m
- labels:
- severity: warning
- annotations:
- summary: "Jenkins Job Health detected high unstable rate on jenkins jobs."
- description: "Job: {{ $labels.id }}"
-- name: "Consul"
- rules:
- - alert: ConsulServiceHealthcheckFailed
- expr: consul_catalog_service_node_healthy == 0
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Consul service healthcheck failed (instance {{ $labels.instance }})."
- description: "Service: `{{ $labels.service_name }}` Healthcheck: `{{ $labels.service_id }}`."
- - alert: ConsulMissingMasterNode
- expr: consul_raft_peers < 3
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Consul missing master node (instance {{ $labels.instance }})."
- description: "Numbers of consul raft peers should be 3, in order to preserve quorum."
- - alert: ConsulAgentUnhealthy
- expr: consul_health_node_status{status="critical"} == 1
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Consul agent unhealthy (instance {{ $labels.instance }})."
- description: "A Consul agent is down."
-- name: "Hosts"
- rules:
- - alert: NodeDown
- expr: up == 0
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Prometheus target missing (instance {{ $labels.instance }})."
- description: "A Prometheus target has disappeared. An exporter might be crashed."
- - alert: HostOutOfMemory
- expr: node_memory_MemAvailable_bytes / node_memory_MemTotal_bytes * 100 < 10
- for: 2m
- labels:
- severity: warning
- annotations:
- summary: "Host out of memory (instance {{ $labels.instance }})."
- description: "Node memory is filling up (< 10% left)."
- - alert: HostOomKillDetected
- expr: increase(node_vmstat_oom_kill[1m]) > 0
- for: 0m
- labels:
- severity: warning
- annotations:
- summary: "Host OOM kill detected (instance {{ $labels.instance }})."
- description: "OOM kill detected."
- - alert: HostMemoryUnderMemoryPressure
- expr: rate(node_vmstat_pgmajfault[1m]) > 1000
- for: 2m
- labels:
- severity: warning
- annotations:
- summary: "Host memory under memory pressure (instance {{ $labels.instance }})."
- description: "The node is under heavy memory pressure. High rate of major page faults."
- - alert: HostOutOfDiskSpace
- expr: (node_filesystem_avail_bytes * 100) / node_filesystem_size_bytes < 10 and ON (instance, device, mountpoint) node_filesystem_readonly == 0
- for: 2m
- labels:
- severity: warning
- annotations:
- summary: "Host out of disk space (instance {{ $labels.instance }})."
- description: "Disk is almost full (< 10% left)."
- - alert: HostRaidDiskFailure
- expr: node_md_disks{state="failed"} > 0
- for: 2m
- labels:
- severity: warning
- annotations:
- summary: "Host RAID disk failure (instance {{ $labels.instance }})."
- description: "At least one device in RAID array on {{ $labels.instance }} failed. Array {{ $labels.md_device }} needs attention and possibly a disk swap."
- - alert: HostConntrackLimit
- expr: node_nf_conntrack_entries / node_nf_conntrack_entries_limit > 0.8
- for: 5m
- labels:
- severity: warning
- annotations:
- summary: "Host conntrack limit (instance {{ $labels.instance }})."
- description: "The number of conntrack is approching limit."
- - alert: HostNetworkInterfaceSaturated
- expr: (rate(node_network_receive_bytes_total{device!~"^tap.*"}[1m]) + rate(node_network_transmit_bytes_total{device!~"^tap.*"}[1m])) / node_network_speed_bytes{device!~"^tap.*"} > 0.8
- for: 1m
- labels:
- severity: warning
- annotations:
- summary: "Host Network Interface Saturated (instance {{ $labels.instance }})."
- description: "The network interface {{ $labels.interface }} on {{ $labels.instance }} is getting overloaded."
- - alert: HostSystemdServiceCrashed
- expr: node_systemd_unit_state{state="failed"} == 1
- for: 0m
- labels:
- severity: warning
- annotations:
- summary: "Host SystemD service crashed (instance {{ $labels.instance }})."
- description: "SystemD service crashed."
- - alert: HostEdacCorrectableErrorsDetected
- expr: increase(node_edac_correctable_errors_total[1m]) > 0
- for: 0m
- labels:
- severity: info
- annotations:
- summary: "Host EDAC Correctable Errors detected (instance {{ $labels.instance }})."
- description: '{{ $labels.instance }} has had {{ printf "%.0f" $value }} correctable memory errors reported by EDAC in the last 5 minutes.'
- - alert: HostEdacUncorrectableErrorsDetected
- expr: node_edac_uncorrectable_errors_total > 0
- for: 0m
- labels:
- severity: warning
- annotations:
- summary: "Host EDAC Uncorrectable Errors detected (instance {{ $labels.instance }})."
- description: '{{ $labels.instance }} has had {{ printf "%.0f" $value }} uncorrectable memory errors reported by EDAC in the last 5 minutes.'
-- name: "Min.io"
- rules:
- - alert: MinioDiskOffline
- expr: minio_offline_disks > 0
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Minio disk offline (instance {{ $labels.instance }})"
- description: "Minio disk is offline."
- - alert: MinioStorageSpaceExhausted
- expr: minio_disk_storage_free_bytes / 1024 / 1024 / 1024 < 10
- for: 2m
- labels:
- severity: warning
- annotations:
- summary: "Minio storage space exhausted (instance {{ $labels.instance }})."
- description: "Minio storage space is low (< 10 GB)."
-- name: "Prometheus"
- rules:
- - alert: PrometheusConfigurationReloadFailure
- expr: prometheus_config_last_reload_successful != 1
- for: 0m
- labels:
- severity: warning
- annotations:
- summary: "Prometheus configuration reload failure (instance {{ $labels.instance }})."
- description: "Prometheus configuration reload error."
- - alert: PrometheusTooManyRestarts
- expr: changes(process_start_time_seconds{job=~"prometheus|pushgateway|alertmanager"}[15m]) > 2
- for: 0m
- labels:
- severity: warning
- annotations:
- summary: "Prometheus too many restarts (instance {{ $labels.instance }})."
- description: "Prometheus has restarted more than twice in the last 15 minutes. It might be crashlooping."
- - alert: PrometheusAlertmanagerConfigurationReloadFailure
- expr: alertmanager_config_last_reload_successful != 1
- for: 0m
- labels:
- severity: warning
- annotations:
- summary: "Prometheus AlertManager configuration reload failure (instance {{ $labels.instance }})."
- description: "AlertManager configuration reload error."
- - alert: PrometheusRuleEvaluationFailures
- expr: increase(prometheus_rule_evaluation_failures_total[3m]) > 0
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Prometheus rule evaluation failures (instance {{ $labels.instance }})."
- description: "Prometheus encountered {{ $value }} rule evaluation failures, leading to potentially ignored alerts."
- - alert: PrometheusTargetScrapingSlow
- expr: prometheus_target_interval_length_seconds{quantile="0.9"} > 60
- for: 5m
- labels:
- severity: warning
- annotations:
- summary: "Prometheus target scraping slow (instance {{ $labels.instance }})."
- description: "Prometheus is scraping exporters slowly."
- - alert: PrometheusTsdbCompactionsFailed
- expr: increase(prometheus_tsdb_compactions_failed_total[1m]) > 0
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Prometheus TSDB compactions failed (instance {{ $labels.instance }})."
- description: "Prometheus encountered {{ $value }} TSDB compactions failures."
- - alert: PrometheusTsdbHeadTruncationsFailed
- expr: increase(prometheus_tsdb_head_truncations_failed_total[1m]) > 0
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Prometheus TSDB head truncations failed (instance {{ $labels.instance }})."
- description: "Prometheus encountered {{ $value }} TSDB head truncation failures."
- - alert: PrometheusTsdbWalCorruptions
- expr: increase(prometheus_tsdb_wal_corruptions_total[1m]) > 0
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Prometheus TSDB WAL corruptions (instance {{ $labels.instance }})."
- description: "Prometheus encountered {{ $value }} TSDB WAL corruptions."
- - alert: PrometheusTsdbWalTruncationsFailed
- expr: increase(prometheus_tsdb_wal_truncations_failed_total[1m]) > 0
- for: 0m
- labels:
- severity: critical
- annotations:
- summary: "Prometheus TSDB WAL truncations failed (instance {{ $labels.instance }})."
- description: "Prometheus encountered {{ $value }} TSDB WAL truncation failures."
-EOH
- }
-
- template {
- change_mode = "noop"
- change_signal = "SIGINT"
- destination = "secrets/prometheus.yml"
- data = <<EOH
----
-global:
- scrape_interval: 5s
- scrape_timeout: 5s
- evaluation_interval: 5s
-
-alerting:
- alertmanagers:
- - consul_sd_configs:
- - server: '{{ env "NOMAD_IP_prometheus" }}:8500'
- services: [ 'alertmanager' ]
-
-rule_files:
- - 'alerts.yml'
-
-scrape_configs:
-
- - job_name: 'Nomad Cluster'
- consul_sd_configs:
- - server: '{{ env "NOMAD_IP_prometheus" }}:8500'
- services: [ 'nomad-client', 'nomad' ]
- relabel_configs:
- - source_labels: [__meta_consul_tags]
- regex: '(.*)http(.*)'
- action: keep
- metrics_path: /v1/metrics
- params:
- format: [ 'prometheus' ]
-
- - job_name: 'Consul Cluster'
- static_configs:
- - targets: [ '10.30.51.22:8500' ]
- - targets: [ '10.30.51.24:8500' ]
- - targets: [ '10.30.51.25:8500' ]
- - targets: [ '10.30.51.26:8500' ]
- - targets: [ '10.30.51.28:8500' ]
- - targets: [ '10.30.51.29:8500' ]
- - targets: [ '10.30.51.30:8500' ]
- - targets: [ '10.30.51.39:8500' ]
- - targets: [ '10.30.51.40:8500' ]
- - targets: [ '10.30.51.50:8500' ]
- - targets: [ '10.30.51.51:8500' ]
- - targets: [ '10.30.51.65:8500' ]
- - targets: [ '10.30.51.66:8500' ]
- - targets: [ '10.30.51.67:8500' ]
- - targets: [ '10.30.51.68:8500' ]
- - targets: [ '10.30.51.70:8500' ]
- - targets: [ '10.30.51.71:8500' ]
- - targets: [ '10.32.8.14:8500' ]
- - targets: [ '10.32.8.15:8500' ]
- - targets: [ '10.32.8.16:8500' ]
- - targets: [ '10.32.8.17:8500' ]
- metrics_path: /v1/agent/metrics
- params:
- format: [ 'prometheus' ]
-
- - job_name: 'Blackbox Exporter (icmp)'
- static_configs:
- - targets: [ 'gerrit.fd.io' ]
- - targets: [ 'jenkins.fd.io' ]
- - targets: [ '10.32.8.17' ]
- params:
- module: [ 'icmp_v4' ]
- relabel_configs:
- - source_labels: [__address__]
- target_label: __param_target
- - source_labels: [__param_target]
- target_label: instance
- - target_label: __address__
- replacement: localhost:9115
- metrics_path: /probe
-
- - job_name: 'Blackbox Exporter (http)'
- static_configs:
- - targets: [ 'gerrit.fd.io' ]
- - targets: [ 'jenkins.fd.io' ]
- params:
- module: [ 'http_2xx' ]
- relabel_configs:
- - source_labels: [__address__]
- target_label: __param_target
- - source_labels: [__param_target]
- target_label: instance
- - target_label: __address__
- replacement: localhost:9115
- metrics_path: /probe
-
- - job_name: 'Jenkins Job Health Exporter'
- static_configs:
- - targets: [ '10.30.51.22:9186' ]
- metric_relabel_configs:
- - source_labels: [ __name__ ]
- regex: '^(vpp.*|csit.*)_(success|failure|total|unstable|reqtime_ms)$'
- action: replace
- replacement: '$1'
- target_label: id
- - source_labels: [ __name__ ]
- regex: '^(vpp.*|csit.*)_(success|failure|total|unstable|reqtime_ms)$'
- replacement: 'jenkins_job_$2'
- target_label: __name__
-
- - job_name: 'Node Exporter'
- static_configs:
- - targets: [ '10.30.51.22:9100' ]
- - targets: [ '10.30.51.24:9100' ]
- - targets: [ '10.30.51.25:9100' ]
- - targets: [ '10.30.51.26:9100' ]
- - targets: [ '10.30.51.28:9100' ]
- - targets: [ '10.30.51.29:9100' ]
- - targets: [ '10.30.51.30:9100' ]
- - targets: [ '10.30.51.39:9100' ]
- - targets: [ '10.30.51.40:9100' ]
- - targets: [ '10.30.51.50:9100' ]
- - targets: [ '10.30.51.51:9100' ]
- - targets: [ '10.30.51.65:9100' ]
- - targets: [ '10.30.51.66:9100' ]
- - targets: [ '10.30.51.67:9100' ]
- - targets: [ '10.30.51.68:9100' ]
- - targets: [ '10.30.51.70:9100' ]
- - targets: [ '10.30.51.71:9100' ]
- - targets: [ '10.32.8.14:9100' ]
- - targets: [ '10.32.8.15:9100' ]
- - targets: [ '10.32.8.16:9100' ]
- - targets: [ '10.32.8.17:9100' ]
-
- - job_name: 'Alertmanager'
- consul_sd_configs:
- - server: '{{ env "NOMAD_IP_prometheus" }}:8500'
- services: [ 'alertmanager' ]
-
- - job_name: 'Grafana'
- consul_sd_configs:
- - server: '{{ env "NOMAD_IP_prometheus" }}:8500'
- services: [ 'grafana' ]
-
- - job_name: 'Prometheus'
- consul_sd_configs:
- - server: '{{ env "NOMAD_IP_prometheus" }}:8500'
- services: [ 'prometheus' ]
-
- - job_name: 'Minio'
- bearer_token: eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCJ9.eyJleHAiOjQ3NjQ1ODEzMzcsImlzcyI6InByb21ldGhldXMiLCJzdWIiOiJtaW5pbyJ9.oeTw3EIaiFmlDikrHXWiWXMH2vxLfDLkfjEC7G2N3M_keH_xyA_l2ofLLNYtopa_3GCEZnxLQdPuFZrmgpkDWg
- consul_sd_configs:
- - server: '{{ env "NOMAD_IP_prometheus" }}:8500'
- services: [ 'storage' ]
- metrics_path: /minio/prometheus/metrics
-
- - job_name: 'Minio Proxy'
- bearer_token: eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCJ9.eyJleHAiOjQ3OTAwNjE1NDIsImlzcyI6InByb21ldGhldXMiLCJzdWIiOiJBS0lBUTJBSDdZUFBXVDZDV1hYSSJ9.CU9x9j-yO0_Uta5iep6yqNiGQPolrr2608E3lpU6Yg21rIv_eOwS5zqzXaSvrhzkJP9H5kO1Pj6kqjYhbqjN_w
- consul_sd_configs:
- - server: '{{ env "NOMAD_IP_prometheus" }}:8500'
- services: [ 'minio' ]
- metrics_path: /minio/v2/metrics/cluster
-EOH
- }
-
- # The service stanza instructs Nomad to register a service with Consul.
- #
- # https://www.nomadproject.io/docs/job-specification/service
- #
- service {
- name = "${service_name}"
- port = "${service_name}"
- tags = [ "${service_name}$${NOMAD_ALLOC_INDEX}" ]
- check {
- name = "Prometheus Check Live"
- type = "http"
- path = "/-/healthy"
- interval = "10s"
- timeout = "2s"
- }
- }
-
- # The "resources" stanza describes the requirements a task needs to
- # execute. Resource requirements include memory, network, cpu, and more.
- # This ensures the task will execute on a machine that contains enough
- # resource capacity.
- #
- # https://www.nomadproject.io/docs/job-specification/resources
- #
- resources {
- cpu = ${cpu}
- memory = ${memory}
- }
- }
- }
-}
diff --git a/fdio.infra.terraform/1n_nmd/prometheus/fdio/main.tf b/fdio.infra.terraform/1n_nmd/prometheus/fdio/main.tf
deleted file mode 100644
index e0ca417a78..0000000000
--- a/fdio.infra.terraform/1n_nmd/prometheus/fdio/main.tf
+++ /dev/null
@@ -1,10 +0,0 @@
-module "prometheus" {
- providers = {
- nomad = nomad.yul1
- }
- source = "../"
-
- # prometheus
- datacenters = ["yul1"]
- pm_version = "2.33.1"
-} \ No newline at end of file
diff --git a/fdio.infra.terraform/1n_nmd/prometheus/fdio/providers.tf b/fdio.infra.terraform/1n_nmd/prometheus/fdio/providers.tf
deleted file mode 100644
index 42a6a45ce0..0000000000
--- a/fdio.infra.terraform/1n_nmd/prometheus/fdio/providers.tf
+++ /dev/null
@@ -1,13 +0,0 @@
-provider "nomad" {
- address = var.nomad_provider_address
- alias = "yul1"
- # ca_file = var.nomad_provider_ca_file
- # cert_file = var.nomad_provider_cert_file
- # key_file = var.nomad_provider_key_file
-}
-
-provider "vault" {
- address = var.vault_provider_address
- skip_tls_verify = var.vault_provider_skip_tls_verify
- token = var.vault_provider_token
-} \ No newline at end of file
diff --git a/fdio.infra.terraform/1n_nmd/prometheus/fdio/variables.tf b/fdio.infra.terraform/1n_nmd/prometheus/fdio/variables.tf
deleted file mode 100644
index 7d5be09d21..0000000000
--- a/fdio.infra.terraform/1n_nmd/prometheus/fdio/variables.tf
+++ /dev/null
@@ -1,47 +0,0 @@
-variable "nomad_acl" {
- description = "Nomad ACLs enabled/disabled."
- type = bool
- default = false
-}
-
-variable "nomad_provider_address" {
- description = "FD.io Nomad cluster address."
- type = string
- default = "http://10.32.8.14:4646"
-}
-
-variable "nomad_provider_ca_file" {
- description = "A local file path to a PEM-encoded certificate authority."
- type = string
- default = "/etc/nomad.d/ssl/nomad-ca.pem"
-}
-
-variable "nomad_provider_cert_file" {
- description = "A local file path to a PEM-encoded certificate."
- type = string
- default = "/etc/nomad.d/ssl/nomad-cli.pem"
-}
-
-variable "nomad_provider_key_file" {
- description = "A local file path to a PEM-encoded private key."
- type = string
- default = "/etc/nomad.d/ssl/nomad-cli-key.pem"
-}
-
-variable "vault_provider_address" {
- description = "Vault cluster address."
- type = string
- default = "http://10.30.51.28:8200"
-}
-
-variable "vault_provider_skip_tls_verify" {
- description = "Verification of the Vault server's TLS certificate."
- type = bool
- default = false
-}
-
-variable "vault_provider_token" {
- description = "Vault root token."
- type = string
- sensitive = true
-} \ No newline at end of file
diff --git a/fdio.infra.terraform/1n_nmd/prometheus/fdio/versions.tf b/fdio.infra.terraform/1n_nmd/prometheus/fdio/versions.tf
deleted file mode 100644
index f83709d154..0000000000
--- a/fdio.infra.terraform/1n_nmd/prometheus/fdio/versions.tf
+++ /dev/null
@@ -1,17 +0,0 @@
-terraform {
- backend "consul" {
- address = "10.32.8.14:8500"
- scheme = "http"
- path = "terraform/prometheus"
- }
- required_providers {
- nomad = {
- source = "hashicorp/nomad"
- version = ">= 1.4.16"
- }
- vault = {
- version = ">= 3.2.1"
- }
- }
- required_version = ">= 1.1.4"
-} \ No newline at end of file
diff --git a/fdio.infra.terraform/1n_nmd/prometheus/main.tf b/fdio.infra.terraform/1n_nmd/prometheus/main.tf
deleted file mode 100644
index 0a4d987831..0000000000
--- a/fdio.infra.terraform/1n_nmd/prometheus/main.tf
+++ /dev/null
@@ -1,42 +0,0 @@
-locals {
- datacenters = join(",", var.datacenters)
- url = join("",
- [
- "https://github.com",
- "/prometheus/prometheus/releases/download/",
- "v${var.pm_version}/",
- "prometheus-${var.pm_version}.linux-amd64.tar.gz"
- ]
- )
-}
-
-resource "nomad_job" "nomad_job_prometheus" {
- jobspec = templatefile(
- "${path.module}/conf/nomad/prometheus.hcl.tftpl",
- {
- auto_promote = var.auto_promote,
- auto_revert = var.auto_revert,
- canary = var.canary,
- cpu = var.cpu,
- datacenters = local.datacenters,
- group_count = var.group_count,
- job_name = var.job_name,
- max_parallel = var.max_parallel,
- memory = var.memory
- port = var.port,
- region = var.region,
- service_name = var.service_name,
- url = local.url,
- use_canary = var.use_canary,
- use_host_volume = var.use_host_volume,
- use_vault_provider = var.vault_secret.use_vault_provider,
- vault_kv_policy_name = var.vault_secret.vault_kv_policy_name,
- vault_kv_path = var.vault_secret.vault_kv_path,
- vault_kv_field_access_key = var.vault_secret.vault_kv_field_access_key,
- vault_kv_field_secret_key = var.vault_secret.vault_kv_field_secret_key,
- version = var.pm_version,
- volume_destination = var.volume_destination,
- volume_source = var.volume_source
- })
- detach = false
-}
diff --git a/fdio.infra.terraform/1n_nmd/prometheus/variables.tf b/fdio.infra.terraform/1n_nmd/prometheus/variables.tf
deleted file mode 100644
index eab4d3b466..0000000000
--- a/fdio.infra.terraform/1n_nmd/prometheus/variables.tf
+++ /dev/null
@@ -1,127 +0,0 @@
-# Nomad
-variable "datacenters" {
- description = "Specifies the list of DCs to be considered placing this task"
- type = list(string)
- default = ["dc1"]
-}
-
-variable "region" {
- description = "Specifies the list of DCs to be considered placing this task"
- type = string
- default = "global"
-}
-
-variable "volume_source" {
- description = "The name of the volume to request"
- type = string
- default = "prod-volume-data1-1"
-}
-
-# Prometheus
-variable "pm_version" {
- description = "Prometheus version"
- type = string
- default = "2.33.1"
-}
-
-variable "auto_promote" {
- description = "Specifies if the job should auto-promote to the canary version"
- type = bool
- default = true
-}
-
-variable "auto_revert" {
- description = "Specifies if the job should auto-revert to the last stable job"
- type = bool
- default = true
-}
-
-variable "canary" {
- description = "Equal to the count of the task group allows blue/green depl."
- type = number
- default = 1
-}
-
-variable "cpu" {
- description = "CPU allocation"
- type = number
- default = 2000
-}
-
-variable "data_dir" {
- description = "Prometheus DISK allocation"
- type = string
- default = "/data"
-}
-
-variable "group_count" {
- description = "Specifies the number of the task groups running under this one"
- type = number
- default = 4
-}
-
-variable "job_name" {
- description = "Specifies a name for the job"
- type = string
- default = "prometheus"
-}
-
-variable "max_parallel" {
- description = "Specifies the maximum number of updates to perform in parallel"
- type = number
- default = 1
-}
-
-variable "memory" {
- description = "Specifies the memory required in MB"
- type = number
- default = 4096
-}
-
-variable "port" {
- description = "Specifies the static TCP/UDP port to allocate"
- type = number
- default = 9090
-}
-
-variable "service_name" {
- description = "Specifies the name this service will be advertised in Consul"
- type = string
- default = "prometheus"
-}
-
-variable "use_canary" {
- description = "Uses canary deployment"
- type = bool
- default = true
-}
-
-variable "use_host_volume" {
- description = "Use Nomad host volume feature"
- type = bool
- default = true
-}
-
-variable "volume_destination" {
- description = "Specifies where the volume should be mounted inside the task"
- type = string
- default = "/data/"
-}
-
-variable "vault_secret" {
- type = object({
- use_vault_provider = bool,
- vault_kv_policy_name = string,
- vault_kv_path = string,
- vault_kv_field_access_key = string,
- vault_kv_field_secret_key = string
- })
- description = "Set of properties to be able to fetch secret from vault."
- default = {
- use_vault_provider = false
- vault_kv_policy_name = "kv"
- vault_kv_path = "secret/data/prometheus"
- vault_kv_field_access_key = "access_key"
- vault_kv_field_secret_key = "secret_key"
- }
-}
diff --git a/fdio.infra.terraform/1n_nmd/prometheus/versions.tf b/fdio.infra.terraform/1n_nmd/prometheus/versions.tf
deleted file mode 100644
index a01708f28a..0000000000
--- a/fdio.infra.terraform/1n_nmd/prometheus/versions.tf
+++ /dev/null
@@ -1,9 +0,0 @@
-terraform {
- required_providers {
- nomad = {
- source = "hashicorp/nomad"
- version = ">= 1.4.16"
- }
- }
- required_version = ">= 1.1.4"
-}