summaryrefslogtreecommitdiff
path: root/roles/monitoring/prometheus
diff options
context:
space:
mode:
authorChristian Pointner <equinox@spreadspace.org>2022-12-17 18:21:12 +0100
committerChristian Pointner <equinox@spreadspace.org>2022-12-17 18:21:12 +0100
commitb362c4a1b1462b1ccf26750752c2147615508f52 (patch)
treea86c60116991ec5460931c33259b076ef77035ae /roles/monitoring/prometheus
parentch-epimetheus: decrease zfs ARC size (diff)
add prometheus snmp exporter
Diffstat (limited to 'roles/monitoring/prometheus')
-rw-r--r--roles/monitoring/prometheus/exporter/meta/main.yml2
-rw-r--r--roles/monitoring/prometheus/exporter/snmp/defaults/main.yml8
-rw-r--r--roles/monitoring/prometheus/exporter/snmp/handlers/main.yml15
-rw-r--r--roles/monitoring/prometheus/exporter/snmp/tasks/main.yml64
-rw-r--r--roles/monitoring/prometheus/exporter/snmp/templates/config.yml.j23
-rw-r--r--roles/monitoring/prometheus/exporter/snmp/templates/service.j231
-rw-r--r--roles/monitoring/prometheus/server/defaults/main/main.yml2
-rw-r--r--roles/monitoring/prometheus/server/defaults/main/rules_snmp.yml11
-rw-r--r--roles/monitoring/prometheus/server/defaults/main/rules_snmp__probe.yml11
-rw-r--r--roles/monitoring/prometheus/server/templates/targets/snmp/probe.yml.j25
10 files changed, 152 insertions, 0 deletions
diff --git a/roles/monitoring/prometheus/exporter/meta/main.yml b/roles/monitoring/prometheus/exporter/meta/main.yml
index 3999b608..21b43396 100644
--- a/roles/monitoring/prometheus/exporter/meta/main.yml
+++ b/roles/monitoring/prometheus/exporter/meta/main.yml
@@ -17,3 +17,5 @@ dependencies:
when: "'smokeping' in (prometheus_exporters_default | union(prometheus_exporters_extra))"
- role: monitoring/prometheus/exporter/bind
when: "'bind' in (prometheus_exporters_default | union(prometheus_exporters_extra))"
+ - role: monitoring/prometheus/exporter/snmp
+ when: "'snmp' in (prometheus_exporters_default | union(prometheus_exporters_extra))"
diff --git a/roles/monitoring/prometheus/exporter/snmp/defaults/main.yml b/roles/monitoring/prometheus/exporter/snmp/defaults/main.yml
new file mode 100644
index 00000000..a8c67a23
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/snmp/defaults/main.yml
@@ -0,0 +1,8 @@
+---
+# prometheus_exporter_snmp_version:
+
+## the default config will be replaced with this
+# prometheus_exporter_snmp_config:
+
+## this extends the default config
+# prometheus_exporter_snmp_config_extra:
diff --git a/roles/monitoring/prometheus/exporter/snmp/handlers/main.yml b/roles/monitoring/prometheus/exporter/snmp/handlers/main.yml
new file mode 100644
index 00000000..f6059aa6
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/snmp/handlers/main.yml
@@ -0,0 +1,15 @@
+---
+- name: restart prometheus-snmp-exporter
+ service:
+ name: prometheus-snmp-exporter
+ state: restarted
+
+- name: reload prometheus-snmp-exporter
+ service:
+ name: prometheus-snmp-exporter
+ state: reloaded
+
+- name: reload nginx
+ service:
+ name: nginx
+ state: reloaded
diff --git a/roles/monitoring/prometheus/exporter/snmp/tasks/main.yml b/roles/monitoring/prometheus/exporter/snmp/tasks/main.yml
new file mode 100644
index 00000000..8fc93f0b
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/snmp/tasks/main.yml
@@ -0,0 +1,64 @@
+---
+- name: generate apt pin file for exporter-snmp package
+ when: prometheus_exporter_snmp_version is defined
+ copy:
+ dest: "/etc/apt/preferences.d/prom-exporter-snmp.pref"
+ content: |
+ Package: prom-exporter-snmp
+ Pin: version {{ prometheus_exporter_snmp_version }}-1
+ Pin-Priority: 1001
+
+- name: remove apt pin file for exporter-snmp package
+ when: prometheus_exporter_snmp_version is not defined
+ file:
+ path: "/etc/apt/preferences.d/prom-exporter-snmp.pref"
+ state: absent
+
+- name: install apt packages
+ apt:
+ name: "prom-exporter-snmp{% if prometheus_exporter_snmp_version is defined %}={{ prometheus_exporter_snmp_version }}-1{% endif %}"
+ state: present
+ allow_downgrade: yes
+ notify: restart prometheus-snmp-exporter
+
+- name: generate configuration
+ when: prometheus_exporter_snmp_config is defined
+ template:
+ src: config.yml.j2
+ dest: /etc/prometheus/exporter/snmp/config.yml
+ notify: reload prometheus-snmp-exporter
+
+- name: extend the default configuration
+ when:
+ - prometheus_exporter_snmp_config is not defined
+ - prometheus_exporter_snmp_config_extra is defined
+ blockinfile:
+ path: /etc/prometheus/exporter/snmp/config.yml
+ block: |
+ {{ prometheus_exporter_snmp_config_extra | to_nice_yaml(indent=2) }}
+ notify: reload prometheus-snmp-exporter
+
+- name: generate systemd service unit
+ template:
+ src: service.j2
+ dest: /etc/systemd/system/prometheus-snmp-exporter.service
+ notify: restart prometheus-snmp-exporter
+
+- name: make sure prometheus-snmp-exporter is enabled and started
+ systemd:
+ name: prometheus-snmp-exporter.service
+ daemon_reload: yes
+ state: started
+ enabled: yes
+
+- name: register exporter
+ copy:
+ content: |
+ location = /snmp {
+ proxy_pass http://127.0.0.1:9116/metrics;
+ }
+ location = /snmp/probe {
+ proxy_pass http://127.0.0.1:9116/snmp;
+ }
+ dest: /etc/prometheus/exporter/snmp.locations
+ notify: reload nginx
diff --git a/roles/monitoring/prometheus/exporter/snmp/templates/config.yml.j2 b/roles/monitoring/prometheus/exporter/snmp/templates/config.yml.j2
new file mode 100644
index 00000000..c75b8469
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/snmp/templates/config.yml.j2
@@ -0,0 +1,3 @@
+# {{ ansible_managed }}
+
+{{ prometheus_exporter_snmp_config | combine(prometheus_exporter_snmp_config_extra | default({})) | to_nice_yaml(indent=2) }}
diff --git a/roles/monitoring/prometheus/exporter/snmp/templates/service.j2 b/roles/monitoring/prometheus/exporter/snmp/templates/service.j2
new file mode 100644
index 00000000..7fccb2da
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/snmp/templates/service.j2
@@ -0,0 +1,31 @@
+[Unit]
+Description=Prometheus snmp exporter
+
+[Service]
+Restart=always
+User=prometheus-exporter
+ExecStart=/usr/bin/prometheus-snmp-exporter --web.listen-address="127.0.0.1:9116" --config.file=/etc/prometheus/exporter/snmp/config.yml
+ExecReload=/bin/kill -HUP $MAINPID
+
+# systemd hardening-options
+AmbientCapabilities=
+CapabilityBoundingSet=
+DeviceAllow=/dev/null rw
+DevicePolicy=strict
+LockPersonality=true
+MemoryDenyWriteExecute=true
+NoNewPrivileges=true
+PrivateDevices=true
+PrivateTmp=true
+ProtectControlGroups=true
+ProtectHome=true
+ProtectKernelModules=true
+ProtectKernelTunables=true
+ProtectSystem=strict
+RemoveIPC=true
+RestrictNamespaces=true
+RestrictRealtime=true
+SystemCallArchitectures=native
+
+[Install]
+WantedBy=multi-user.target
diff --git a/roles/monitoring/prometheus/server/defaults/main/main.yml b/roles/monitoring/prometheus/server/defaults/main/main.yml
index 375b3458..b377a7f0 100644
--- a/roles/monitoring/prometheus/server/defaults/main/main.yml
+++ b/roles/monitoring/prometheus/server/defaults/main/main.yml
@@ -29,6 +29,8 @@ prometheus_server_rules:
ssl/probe: "{{ prometheus_server_rules_ssl__probe + prometheus_server_rules_ssl__probe_extra }}"
smokeping: "{{ prometheus_server_rules_smokeping + prometheus_server_rules_smokeping_extra }}"
bind: "{{ prometheus_server_rules_bind + prometheus_server_rules_bind_extra }}"
+ snmp: "{{ prometheus_server_rules_snmp + prometheus_server_rules_snmp_extra }}"
+ snmp/probe: "{{ prometheus_server_rules_snmp__probe + prometheus_server_rules_snmp__probe_extra }}"
# prometheus_server_alertmanager:
# url: "127.0.0.1:9093"
diff --git a/roles/monitoring/prometheus/server/defaults/main/rules_snmp.yml b/roles/monitoring/prometheus/server/defaults/main/rules_snmp.yml
new file mode 100644
index 00000000..7aec66c4
--- /dev/null
+++ b/roles/monitoring/prometheus/server/defaults/main/rules_snmp.yml
@@ -0,0 +1,11 @@
+---
+prometheus_server_rules_snmp_extra: []
+prometheus_server_rules_snmp:
+ - alert: SNMPRequestErrors
+ expr: increase(snmp_request_errors_total[1m]) > 0
+ for: 5m
+ labels:
+ severity: warning
+ annotations:
+ summary: SNMP Exporter reports request errors (instance {{ '{{' }} $labels.instance {{ '}}' }})
+ description: "SNMP expoter on {{ '{{' }} $labels.instance {{ '}}' }} reports request errors \n VALUE = {{ '{{' }} $value {{ '}}' }}\n LABELS = {{ '{{' }} $labels {{ '}}' }}"
diff --git a/roles/monitoring/prometheus/server/defaults/main/rules_snmp__probe.yml b/roles/monitoring/prometheus/server/defaults/main/rules_snmp__probe.yml
new file mode 100644
index 00000000..548144c2
--- /dev/null
+++ b/roles/monitoring/prometheus/server/defaults/main/rules_snmp__probe.yml
@@ -0,0 +1,11 @@
+---
+prometheus_server_rules_snmp__probe_extra: []
+prometheus_server_rules_snmp__probe:
+ - alert: SNMPSlowScrape
+ expr: snmp_scrape_duration_seconds > 5
+ for: 0m
+ labels:
+ severity: warning
+ annotations:
+ summary: SNMP slow scrape (instance {{ '{{' }} $labels.instance {{ '}}' }})
+ description: "Scraping SNMP target took more than 5 seconds \n VALUE = {{ '{{' }} $value {{ '}}' }}\n LABELS = {{ '{{' }} $labels {{ '}}' }}"
diff --git a/roles/monitoring/prometheus/server/templates/targets/snmp/probe.yml.j2 b/roles/monitoring/prometheus/server/templates/targets/snmp/probe.yml.j2
new file mode 100644
index 00000000..47e6dceb
--- /dev/null
+++ b/roles/monitoring/prometheus/server/templates/targets/snmp/probe.yml.j2
@@ -0,0 +1,5 @@
+- targets: [ '{{ (target.exporter_hostname == prometheus_server) | ternary('127.0.0.1:9999', hostvars[target.exporter_hostname].prometheus_scrape_endpoint) }}' ]
+ labels:
+ instance: '{{ target.instance }}'
+ __param_target: '{{ target.config.target }}'
+ __param_module: '{{ target.config.module }}'