Prometheus: Çavdêriya HTTP bi rêya hinardekarê Blackbox

Silav hemû. Di Gulanê de OTUS dest pê dike atolyeya li ser şopandin û têketinê, hem binesaziyê û hem jî serîlêdanên ku Zabbix, Prometheus, Grafana û ELK bikar tînin. Di vî warî de, em bi kevneşopî li ser mijarê materyalên kêrhatî parve dikin.

hinardekarê Blackbox ji bo Prometheus destûrê dide we ku hûn çavdêriya karûbarên derveyî bi riya HTTP, HTTPS, DNS, TCP, ICMP bicîh bikin. Di vê gotarê de, ez ê nîşanî we bidim ka meriv çawa bi karanîna hinardekarê Blackbox-ê çavdêriya HTTP / HTTPS saz dike. Em ê hinardekarê Blackbox-ê li Kubernetes bidin destpêkirin.

Dor

Em ê hewceyê jêrîn hewce ne:

  • Kubernetes
  • Operatorê Prometheus

Veavakirina blackbox Exporter

Veavakirina Blackbox bi rêya ConfigMap ji bo mîhengan http module çavdêrîkirina xizmetên webê.

apiVersion: v1
kind: ConfigMap
metadata:
  name: prometheus-blackbox-exporter
  labels:
    app: prometheus-blackbox-exporter
data:
  blackbox.yaml: |
    modules:
      http_2xx:
        http:
          no_follow_redirects: false
          preferred_ip_protocol: ip4
          valid_http_versions:
          - HTTP/1.1
          - HTTP/2
          valid_status_codes: []
        prober: http
        timeout: 5s

Modûl http_2xx ji bo kontrolkirina ku karûbarê malperê kodek rewşa HTTP 2xx vedigere tê bikar anîn. Veavakirina hinardekarê qutiya reş bi hûrgulî tê ravekirin belgekirin.

Bicihkirina hinardekarek qutiya reş li komek Kubernetes

Terîfkirin Deployment и Service ji bo bicihkirina li Kubernetes.

---
kind: Service
apiVersion: v1
metadata:
  name: prometheus-blackbox-exporter
  labels:
    app: prometheus-blackbox-exporter
spec:
  type: ClusterIP
  ports:
    - name: http
      port: 9115
      protocol: TCP
  selector:
    app: prometheus-blackbox-exporter

---
apiVersion: apps/v1
kind: Deployment
metadata:
  name: prometheus-blackbox-exporter
  labels:
    app: prometheus-blackbox-exporter
spec:
  replicas: 1
  selector:
    matchLabels:
      app: prometheus-blackbox-exporter
  template:
    metadata:
      labels:
        app: prometheus-blackbox-exporter
    spec:
      restartPolicy: Always
      containers:
        - name: blackbox-exporter
          image: "prom/blackbox-exporter:v0.15.1"
          imagePullPolicy: IfNotPresent
          securityContext:
            readOnlyRootFilesystem: true
            runAsNonRoot: true
            runAsUser: 1000
          args:
            - "--config.file=/config/blackbox.yaml"
          resources:
            {}
          ports:
            - containerPort: 9115
              name: http
          livenessProbe:
            httpGet:
              path: /health
              port: http
          readinessProbe:
            httpGet:
              path: /health
              port: http
          volumeMounts:
            - mountPath: /config
              name: config
        - name: configmap-reload
          image: "jimmidyson/configmap-reload:v0.2.2"
          imagePullPolicy: "IfNotPresent"
          securityContext:
            runAsNonRoot: true
            runAsUser: 65534
          args:
            - --volume-dir=/etc/config
            - --webhook-url=http://localhost:9115/-/reload
          resources:
            {}
          volumeMounts:
            - mountPath: /etc/config
              name: config
              readOnly: true
      volumes:
        - name: config
          configMap:
            name: prometheus-blackbox-exporter

Derhênerê Blackbox dikare bi karanîna fermana jêrîn were saz kirin. Navnîşan monitoring behsa Operatorê Prometheus dike.

kubectl --namespace=monitoring apply -f blackbox-exporter.yaml

Bawer bikin ku hemî karûbar bi karanîna fermana jêrîn têne xebitandin:

kubectl --namespace=monitoring get all --selector=app=prometheus-blackbox-exporter

Kontrola Blackbox

Hûn dikarin bi karanîna navgîniya webê ya derhênerê Blackbox bigihîjin port-forward:

kubectl --namespace=monitoring port-forward svc/prometheus-blackbox-exporter 9115:9115

Bi navgîniya gerokek webê ve bi navgîniya webê ya derhênerê Blackbox-ê ve girêdin localhost: 9115.

Prometheus: Çavdêriya HTTP bi rêya hinardekarê Blackbox

Ger hûn biçin navnîşanê http://localhost:9115/probe?module=http_2xx&target=https://www.google.com, hûn ê encama kontrolkirina URL-ya diyarkirî bibînin (https://www.google.com).

Prometheus: Çavdêriya HTTP bi rêya hinardekarê Blackbox

Nirxa metrîk probe_success wekhev 1 tê wateya kontrolkirina serkeftî. Nirxa 0 xeletiyek nîşan dide.

Avakirina Prometheus

Piştî bicihkirina hinardekarê BlackBox, em Prometheus tê de mîheng dikin prometheus-additional.yaml.

- job_name: 'kube-api-blackbox'
  scrape_interval: 1w
  metrics_path: /probe
  params:
    module: [http_2xx]
  static_configs:
   - targets:
      - https://www.google.com
      - http://www.example.com
      - https://prometheus.io
  relabel_configs:
   - source_labels: [__address__]
     target_label: __param_target
   - source_labels: [__param_target]
     target_label: instance
   - target_label: __address__
     replacement: prometheus-blackbox-exporter:9115 # The blackbox exporter.

Em hilberînin Secretbikaranîna fermana jêrîn.

PROMETHEUS_ADD_CONFIG=$(cat prometheus-additional.yaml | base64)
cat << EOF | kubectl --namespace=monitoring apply -f -
apiVersion: v1
kind: Secret
metadata:
  name: additional-scrape-configs
type: Opaque
data:
  prometheus-additional.yaml: $PROMETHEUS_ADD_CONFIG
EOF

Diyar bike additional-scrape-configs ji bo Prometheus Operator bi kar tîne additionalScrapeConfigs.

kubectl --namespace=monitoring edit prometheuses k8s
...
spec:
  additionalScrapeConfigs:
    key: prometheus-additional.yaml
    name: additional-scrape-configs

Em diçin navgîniya webê ya Prometheus û pîvan û armancan kontrol dikin.

kubectl --namespace=monitoring port-forward svc/prometheus-k8s 9090:9090

Prometheus: Çavdêriya HTTP bi rêya hinardekarê Blackbox

Prometheus: Çavdêriya HTTP bi rêya hinardekarê Blackbox

Em pîvan û armancên Blackbox dibînin.

Zêdekirina qaîdeyên ji bo ragihandinê (hişyarî)

Ji bo wergirtina agahdariyan ji hinardekarê Blackbox, em ê qaîdeyan li Operatorê Prometheus zêde bikin.

kubectl --namespace=monitoring edit prometheusrules prometheus-k8s-rules
...
  - name: blackbox-exporter
    rules:
    - alert: ProbeFailed
      expr: probe_success == 0
      for: 5m
      labels:
        severity: error
      annotations:
        summary: "Probe failed (instance {{ $labels.instance }})"
        description: "Probe failedn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: SlowProbe
      expr: avg_over_time(probe_duration_seconds[1m]) > 1
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "Slow probe (instance {{ $labels.instance }})"
        description: "Blackbox probe took more than 1s to completen  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: HttpStatusCode
      expr: probe_http_status_code <= 199 OR probe_http_status_code >= 400
      for: 5m
      labels:
        severity: error
      annotations:
        summary: "HTTP Status Code (instance {{ $labels.instance }})"
        description: "HTTP status code is not 200-399n  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: SslCertificateWillExpireSoon
      expr: probe_ssl_earliest_cert_expiry - time() < 86400 * 30
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "SSL certificate will expire soon (instance {{ $labels.instance }})"
        description: "SSL certificate expires in 30 daysn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: SslCertificateHasExpired
      expr: probe_ssl_earliest_cert_expiry - time()  <= 0
      for: 5m
      labels:
        severity: error
      annotations:
        summary: "SSL certificate has expired (instance {{ $labels.instance }})"
        description: "SSL certificate has expired alreadyn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: HttpSlowRequests
      expr: avg_over_time(probe_http_duration_seconds[1m]) > 1
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "HTTP slow requests (instance {{ $labels.instance }})"
        description: "HTTP request took more than 1sn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: SlowPing
      expr: avg_over_time(probe_icmp_duration_seconds[1m]) > 1
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "Slow ping (instance {{ $labels.instance }})"
        description: "Blackbox ping took more than 1sn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"

Di navgîniya webê ya Prometheus de, biçin Status => Rules û qaîdeyên hişyariyê ji bo blackbox-exporter bibînin.

Prometheus: Çavdêriya HTTP bi rêya hinardekarê Blackbox

Veavakirina Agahiyên Bidawîbûna Sertîfîkaya Sertîfîka SSL ya Kubernetes API

Werin em çavdêriya bidawîbûna sertîfîkaya SSL ya Kubernetes API-ê mîheng bikin. Ew ê heftê carekê agahdariyan bişîne.

Ji bo Nasnameya Pêşkêşkara Kubernetes API-ê modula hinardekarê Blackbox zêde dike.

kubectl --namespace=monitoring edit configmap prometheus-blackbox-exporter
...
      kube-api:
        http:
          method: GET
          no_follow_redirects: false
          preferred_ip_protocol: ip4
          tls_config:
            insecure_skip_verify: false
            ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
          bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
          valid_http_versions:
          - HTTP/1.1
          - HTTP/2
          valid_status_codes: []
        prober: http
        timeout: 5s

Zêdekirina konfigurasyona scrape Prometheus

- job_name: 'kube-api-blackbox'
  metrics_path: /probe
  params:
    module: [kube-api]
  static_configs:
   - targets:
      - https://kubernetes.default.svc/api
  relabel_configs:
   - source_labels: [__address__]
     target_label: __param_target
   - source_labels: [__param_target]
     target_label: instance
   - target_label: __address__
     replacement: prometheus-blackbox-exporter:9115 # The blackbox exporter.

Bikaranîna Prometheus Secret

PROMETHEUS_ADD_CONFIG=$(cat prometheus-additional.yaml | base64)
cat << EOF | kubectl --namespace=monitoring apply -f -
apiVersion: v1
kind: Secret
metadata:
  name: additional-scrape-configs
type: Opaque
data:
  prometheus-additional.yaml: $PROMETHEUS_ADD_CONFIG
EOF

Zêdekirina qaîdeyên hişyariyê

kubectl --namespace=monitoring edit prometheusrules prometheus-k8s-rules
...
  - name: k8s-api-server-cert-expiry
    rules:
    - alert: K8sAPIServerSSLCertExpiringAfterThreeMonths
      expr: probe_ssl_earliest_cert_expiry{job="kube-api-blackbox"} - time() < 86400 * 90 
      for: 1w
      labels:
        severity: warning
      annotations:
        summary: "Kubernetes API Server SSL certificate will expire after three months (instance {{ $labels.instance }})"
        description: "Kubernetes API Server SSL certificate expires in 90 daysn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"

Girêdanên bikarhêner

Şopandin û têketina Docker

Source: www.habr.com