Prometheus: Ufuatiliaji wa HTTP kupitia Kisafirishaji cha Blackbox

Salaam wote. Mnamo Mei OTUS inazinduliwa warsha ya ufuatiliaji na ukataji miti, miundombinu na programu zinazotumia Zabbix, Prometheus, Grafana na ELK. Katika suala hili, sisi jadi kushiriki nyenzo muhimu juu ya mada.

Blackbox nje kwa Prometheus hukuruhusu kutekeleza ufuatiliaji wa huduma za nje kupitia HTTP, HTTPS, DNS, TCP, ICMP. Katika makala hii, nitakuonyesha jinsi ya kusanidi ufuatiliaji wa HTTP/HTTPS kwa kutumia Blackbox exporter. Tutazindua kisafirishaji cha Blackbox huko Kubernetes.

Mazingira

Tutahitaji zifuatazo:

  • Mabernet
  • Prometheus Opereta

Usanidi wa kisanduku cheusi cha nje

Inasanidi kisanduku Nyeusi kupitia ConfigMap kwa mipangilio http moduli ya ufuatiliaji wa huduma za wavuti.

apiVersion: v1
kind: ConfigMap
metadata:
  name: prometheus-blackbox-exporter
  labels:
    app: prometheus-blackbox-exporter
data:
  blackbox.yaml: |
    modules:
      http_2xx:
        http:
          no_follow_redirects: false
          preferred_ip_protocol: ip4
          valid_http_versions:
          - HTTP/1.1
          - HTTP/2
          valid_status_codes: []
        prober: http
        timeout: 5s

Moduli http_2xx hutumika kuangalia kuwa huduma ya wavuti inarudisha msimbo wa hali ya HTTP 2xx. Usanidi wa kisanduku cheusi umeelezewa kwa undani zaidi katika nyaraka.

Inapeleka kisafirishaji kisanduku cheusi kwenye nguzo ya Kubernetes

Eleza Deployment ΠΈ Service kwa ajili ya kupelekwa Kubernetes.

---
kind: Service
apiVersion: v1
metadata:
  name: prometheus-blackbox-exporter
  labels:
    app: prometheus-blackbox-exporter
spec:
  type: ClusterIP
  ports:
    - name: http
      port: 9115
      protocol: TCP
  selector:
    app: prometheus-blackbox-exporter

---
apiVersion: apps/v1
kind: Deployment
metadata:
  name: prometheus-blackbox-exporter
  labels:
    app: prometheus-blackbox-exporter
spec:
  replicas: 1
  selector:
    matchLabels:
      app: prometheus-blackbox-exporter
  template:
    metadata:
      labels:
        app: prometheus-blackbox-exporter
    spec:
      restartPolicy: Always
      containers:
        - name: blackbox-exporter
          image: "prom/blackbox-exporter:v0.15.1"
          imagePullPolicy: IfNotPresent
          securityContext:
            readOnlyRootFilesystem: true
            runAsNonRoot: true
            runAsUser: 1000
          args:
            - "--config.file=/config/blackbox.yaml"
          resources:
            {}
          ports:
            - containerPort: 9115
              name: http
          livenessProbe:
            httpGet:
              path: /health
              port: http
          readinessProbe:
            httpGet:
              path: /health
              port: http
          volumeMounts:
            - mountPath: /config
              name: config
        - name: configmap-reload
          image: "jimmidyson/configmap-reload:v0.2.2"
          imagePullPolicy: "IfNotPresent"
          securityContext:
            runAsNonRoot: true
            runAsUser: 65534
          args:
            - --volume-dir=/etc/config
            - --webhook-url=http://localhost:9115/-/reload
          resources:
            {}
          volumeMounts:
            - mountPath: /etc/config
              name: config
              readOnly: true
      volumes:
        - name: config
          configMap:
            name: prometheus-blackbox-exporter

Blackbox nje inaweza kupelekwa kwa kutumia amri ifuatayo. Nafasi ya majina monitoring inahusu Prometheus Operator.

kubectl --namespace=monitoring apply -f blackbox-exporter.yaml

Hakikisha huduma zote zinafanya kazi kwa kutumia amri ifuatayo:

kubectl --namespace=monitoring get all --selector=app=prometheus-blackbox-exporter

Angalia kisanduku cheusi

Unaweza kufikia kiolesura cha wavuti cha muuzaji cha Blackbox kwa kutumia port-forward:

kubectl --namespace=monitoring port-forward svc/prometheus-blackbox-exporter 9115:9115

Unganisha kwenye kiolesura cha wavuti cha kisafirishaji cha Blackbox kupitia kivinjari cha wavuti katika lochost: 9115.

Prometheus: Ufuatiliaji wa HTTP kupitia Kisafirishaji cha Blackbox

Ukienda kwa anwani http://localhost:9115/probe?module=http_2xx&target=https://www.google.com, utaona matokeo ya kuangalia URL maalum (https://www.google.com).

Prometheus: Ufuatiliaji wa HTTP kupitia Kisafirishaji cha Blackbox

Thamani ya kipimo probe_success sawa na 1 inamaanisha ukaguzi uliofaulu. Thamani ya 0 inaonyesha hitilafu.

Kuanzisha Prometheus

Baada ya kupeleka nje BlackBox, tunasanidi Prometheus ndani prometheus-additional.yaml.

- job_name: 'kube-api-blackbox'
  scrape_interval: 1w
  metrics_path: /probe
  params:
    module: [http_2xx]
  static_configs:
   - targets:
      - https://www.google.com
      - http://www.example.com
      - https://prometheus.io
  relabel_configs:
   - source_labels: [__address__]
     target_label: __param_target
   - source_labels: [__param_target]
     target_label: instance
   - target_label: __address__
     replacement: prometheus-blackbox-exporter:9115 # The blackbox exporter.

Tunazalisha Secretkwa kutumia amri ifuatayo.

PROMETHEUS_ADD_CONFIG=$(cat prometheus-additional.yaml | base64)
cat << EOF | kubectl --namespace=monitoring apply -f -
apiVersion: v1
kind: Secret
metadata:
  name: additional-scrape-configs
type: Opaque
data:
  prometheus-additional.yaml: $PROMETHEUS_ADD_CONFIG
EOF

Dhibitisho additional-scrape-configs kwa Prometheus Operator kutumia additionalScrapeConfigs.

kubectl --namespace=monitoring edit prometheuses k8s
...
spec:
  additionalScrapeConfigs:
    key: prometheus-additional.yaml
    name: additional-scrape-configs

Tunaenda kwenye kiolesura cha wavuti cha Prometheus na kuangalia vipimo na malengo.

kubectl --namespace=monitoring port-forward svc/prometheus-k8s 9090:9090

Prometheus: Ufuatiliaji wa HTTP kupitia Kisafirishaji cha Blackbox

Prometheus: Ufuatiliaji wa HTTP kupitia Kisafirishaji cha Blackbox

Tunaona vipimo na malengo ya Blackbox.

Kuongeza sheria za arifa (tahadhari)

Ili kupokea arifa kutoka kwa msafirishaji wa Blackbox, tutaongeza sheria kwa Prometheus Operator.

kubectl --namespace=monitoring edit prometheusrules prometheus-k8s-rules
...
  - name: blackbox-exporter
    rules:
    - alert: ProbeFailed
      expr: probe_success == 0
      for: 5m
      labels:
        severity: error
      annotations:
        summary: "Probe failed (instance {{ $labels.instance }})"
        description: "Probe failedn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: SlowProbe
      expr: avg_over_time(probe_duration_seconds[1m]) > 1
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "Slow probe (instance {{ $labels.instance }})"
        description: "Blackbox probe took more than 1s to completen  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: HttpStatusCode
      expr: probe_http_status_code <= 199 OR probe_http_status_code >= 400
      for: 5m
      labels:
        severity: error
      annotations:
        summary: "HTTP Status Code (instance {{ $labels.instance }})"
        description: "HTTP status code is not 200-399n  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: SslCertificateWillExpireSoon
      expr: probe_ssl_earliest_cert_expiry - time() < 86400 * 30
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "SSL certificate will expire soon (instance {{ $labels.instance }})"
        description: "SSL certificate expires in 30 daysn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: SslCertificateHasExpired
      expr: probe_ssl_earliest_cert_expiry - time()  <= 0
      for: 5m
      labels:
        severity: error
      annotations:
        summary: "SSL certificate has expired (instance {{ $labels.instance }})"
        description: "SSL certificate has expired alreadyn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: HttpSlowRequests
      expr: avg_over_time(probe_http_duration_seconds[1m]) > 1
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "HTTP slow requests (instance {{ $labels.instance }})"
        description: "HTTP request took more than 1sn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"
    - alert: SlowPing
      expr: avg_over_time(probe_icmp_duration_seconds[1m]) > 1
      for: 5m
      labels:
        severity: warning
      annotations:
        summary: "Slow ping (instance {{ $labels.instance }})"
        description: "Blackbox ping took more than 1sn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"

Katika kiolesura cha wavuti cha Prometheus, nenda kwa Hali => Kanuni na utafute sheria za tahadhari kwa kisanduku-nje.

Prometheus: Ufuatiliaji wa HTTP kupitia Kisafirishaji cha Blackbox

Inasanidi Arifa za Kuisha kwa Cheti cha SSL Seva ya Kubernetes API

Hebu tusanidi ufuatiliaji wa kuisha kwa cheti cha Kubernetes API Server SSL. Itatuma arifa mara moja kwa wiki.

Inaongeza sehemu ya kisanduku Nyeusi cha Uthibitishaji wa Seva ya Kubernetes API.

kubectl --namespace=monitoring edit configmap prometheus-blackbox-exporter
...
      kube-api:
        http:
          method: GET
          no_follow_redirects: false
          preferred_ip_protocol: ip4
          tls_config:
            insecure_skip_verify: false
            ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt
          bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
          valid_http_versions:
          - HTTP/1.1
          - HTTP/2
          valid_status_codes: []
        prober: http
        timeout: 5s

Inaongeza usanidi wa chakavu wa Prometheus

- job_name: 'kube-api-blackbox'
  metrics_path: /probe
  params:
    module: [kube-api]
  static_configs:
   - targets:
      - https://kubernetes.default.svc/api
  relabel_configs:
   - source_labels: [__address__]
     target_label: __param_target
   - source_labels: [__param_target]
     target_label: instance
   - target_label: __address__
     replacement: prometheus-blackbox-exporter:9115 # The blackbox exporter.

Kutumia Siri ya Prometheus

PROMETHEUS_ADD_CONFIG=$(cat prometheus-additional.yaml | base64)
cat << EOF | kubectl --namespace=monitoring apply -f -
apiVersion: v1
kind: Secret
metadata:
  name: additional-scrape-configs
type: Opaque
data:
  prometheus-additional.yaml: $PROMETHEUS_ADD_CONFIG
EOF

Kuongeza sheria za tahadhari

kubectl --namespace=monitoring edit prometheusrules prometheus-k8s-rules
...
  - name: k8s-api-server-cert-expiry
    rules:
    - alert: K8sAPIServerSSLCertExpiringAfterThreeMonths
      expr: probe_ssl_earliest_cert_expiry{job="kube-api-blackbox"} - time() < 86400 * 90 
      for: 1w
      labels:
        severity: warning
      annotations:
        summary: "Kubernetes API Server SSL certificate will expire after three months (instance {{ $labels.instance }})"
        description: "Kubernetes API Server SSL certificate expires in 90 daysn  VALUE = {{ $value }}n  LABELS: {{ $labels }}"

Viungo muhimu

Kufuatilia na kuingia kwenye Docker

Chanzo: mapenzi.com