summaryrefslogtreecommitdiff
path: root/roles/monitoring/prometheus
diff options
context:
space:
mode:
authorChristian Pointner <equinox@spreadspace.org>2022-11-06 18:15:09 +0100
committerChristian Pointner <equinox@spreadspace.org>2022-11-06 18:15:09 +0100
commitdbfbf6b9eea6455c62ca6d2dd4ddbff62b913227 (patch)
tree0246842d0d6806d4bccb2241c09a458027e5cfe6 /roles/monitoring/prometheus
parentdebian-installer: proper support hd-media varant for usb (diff)
monitoring/prometheus: add smokeping-prober
Diffstat (limited to 'roles/monitoring/prometheus')
-rw-r--r--roles/monitoring/prometheus/exporter/meta/main.yml2
-rw-r--r--roles/monitoring/prometheus/exporter/smokeping/defaults/main.yml10
-rw-r--r--roles/monitoring/prometheus/exporter/smokeping/handlers/main.yml10
-rw-r--r--roles/monitoring/prometheus/exporter/smokeping/tasks/main.yml58
-rw-r--r--roles/monitoring/prometheus/exporter/smokeping/templates/config.yml.j24
-rw-r--r--roles/monitoring/prometheus/exporter/smokeping/templates/service.j230
-rw-r--r--roles/monitoring/prometheus/server/defaults/main/main.yml1
-rw-r--r--roles/monitoring/prometheus/server/defaults/main/rules_smokeping.yml11
8 files changed, 126 insertions, 0 deletions
diff --git a/roles/monitoring/prometheus/exporter/meta/main.yml b/roles/monitoring/prometheus/exporter/meta/main.yml
index 31dbd611..704b0f00 100644
--- a/roles/monitoring/prometheus/exporter/meta/main.yml
+++ b/roles/monitoring/prometheus/exporter/meta/main.yml
@@ -13,3 +13,5 @@ dependencies:
when: "'nut' in (prometheus_exporters_default | union(prometheus_exporters_extra))"
- role: monitoring/prometheus/exporter/ssl
when: "'ssl' in (prometheus_exporters_default | union(prometheus_exporters_extra))"
+ - role: monitoring/prometheus/exporter/smokeping
+ when: "'smokeping' in (prometheus_exporters_default | union(prometheus_exporters_extra))"
diff --git a/roles/monitoring/prometheus/exporter/smokeping/defaults/main.yml b/roles/monitoring/prometheus/exporter/smokeping/defaults/main.yml
new file mode 100644
index 00000000..2bf90a2b
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/smokeping/defaults/main.yml
@@ -0,0 +1,10 @@
+---
+# prometheus_exporter_smokeping_version:
+
+# prometheus_exporter_smokeping_targets:
+# - hosts:
+# - 1.2.3.4
+# interval: 1s
+# network: ip
+# protocol: icmp
+# size: 56
diff --git a/roles/monitoring/prometheus/exporter/smokeping/handlers/main.yml b/roles/monitoring/prometheus/exporter/smokeping/handlers/main.yml
new file mode 100644
index 00000000..3ce9c2eb
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/smokeping/handlers/main.yml
@@ -0,0 +1,10 @@
+---
+- name: restart prometheus-smokeping-exporter
+ service:
+ name: prometheus-smokeping-exporter
+ state: restarted
+
+- name: reload nginx
+ service:
+ name: nginx
+ state: reloaded
diff --git a/roles/monitoring/prometheus/exporter/smokeping/tasks/main.yml b/roles/monitoring/prometheus/exporter/smokeping/tasks/main.yml
new file mode 100644
index 00000000..23c5eda5
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/smokeping/tasks/main.yml
@@ -0,0 +1,58 @@
+---
+- name: generate apt pin file for exporter-smokeping package
+ when: prometheus_exporter_smokeping_version is defined
+ copy:
+ dest: "/etc/apt/preferences.d/prom-exporter-smokeping.pref"
+ content: |
+ Package: prom-exporter-smokeping
+ Pin: version {{ prometheus_exporter_smokeping_version }}-1
+ Pin-Priority: 1001
+
+- name: remove apt pin file for exporter-smokeping package
+ when: prometheus_exporter_smokeping_version is not defined
+ file:
+ path: "/etc/apt/preferences.d/prom-exporter-smokeping.pref"
+ state: absent
+
+- name: install apt packages
+ apt:
+ name: "prom-exporter-smokeping{% if prometheus_exporter_smokeping_version is defined %}={{ prometheus_exporter_smokeping_version }}-1{% endif %}"
+ state: present
+ allow_downgrade: yes
+ notify: restart prometheus-smokeping-exporter
+
+- name: create config directory
+ file:
+ path: /etc/prometheus/exporter/smokeping
+ state: directory
+
+- name: generate configuration
+ template:
+ src: config.yml.j2
+ dest: /etc/prometheus/exporter/smokeping/config.yml
+ owner: root
+ group: prometheus-exporter
+ mode: 0640
+ notify: restart prometheus-smokeping-exporter
+
+- name: generate systemd service unit
+ template:
+ src: service.j2
+ dest: /etc/systemd/system/prometheus-smokeping-exporter.service
+ notify: restart prometheus-smokeping-exporter
+
+- name: make sure prometheus-smokeping-exporter is enabled and started
+ systemd:
+ name: prometheus-smokeping-exporter.service
+ daemon_reload: yes
+ state: started
+ enabled: yes
+
+- name: register exporter
+ copy:
+ content: |
+ location = /smokeping {
+ proxy_pass http://127.0.0.1:9374/metrics;
+ }
+ dest: /etc/prometheus/exporter/smokeping.locations
+ notify: reload nginx
diff --git a/roles/monitoring/prometheus/exporter/smokeping/templates/config.yml.j2 b/roles/monitoring/prometheus/exporter/smokeping/templates/config.yml.j2
new file mode 100644
index 00000000..f4d9020a
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/smokeping/templates/config.yml.j2
@@ -0,0 +1,4 @@
+# {{ ansible_managed }}
+
+targets:
+ {{ prometheus_exporter_smokeping_targets | to_nice_yaml(indent=2) | indent(2) }}
diff --git a/roles/monitoring/prometheus/exporter/smokeping/templates/service.j2 b/roles/monitoring/prometheus/exporter/smokeping/templates/service.j2
new file mode 100644
index 00000000..5250f752
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/smokeping/templates/service.j2
@@ -0,0 +1,30 @@
+[Unit]
+Description=Prometheus smokeping prober
+
+[Service]
+Restart=always
+User=prometheus-exporter
+ExecStart=/usr/bin/prometheus-smokeping-prober --web.listen-address="127.0.0.1:9374" --config.file /etc/prometheus/exporter/smokeping/config.yml
+
+# systemd hardening-options
+AmbientCapabilities=CAP_NET_RAW
+CapabilityBoundingSet=CAP_NET_RAW
+DeviceAllow=/dev/null rw
+DevicePolicy=strict
+LockPersonality=true
+MemoryDenyWriteExecute=true
+NoNewPrivileges=true
+PrivateDevices=true
+PrivateTmp=true
+ProtectControlGroups=true
+ProtectHome=true
+ProtectKernelModules=true
+ProtectKernelTunables=true
+ProtectSystem=strict
+RemoveIPC=true
+RestrictNamespaces=true
+RestrictRealtime=true
+SystemCallArchitectures=native
+
+[Install]
+WantedBy=multi-user.target
diff --git a/roles/monitoring/prometheus/server/defaults/main/main.yml b/roles/monitoring/prometheus/server/defaults/main/main.yml
index 20bd8e7c..611b1fef 100644
--- a/roles/monitoring/prometheus/server/defaults/main/main.yml
+++ b/roles/monitoring/prometheus/server/defaults/main/main.yml
@@ -27,6 +27,7 @@ prometheus_server_rules:
ipmi/remote: "{{ prometheus_server_rules_ipmi__remote + prometheus_server_rules_ipmi__remote_extra }}"
ssl: "{{ prometheus_server_rules_ssl + prometheus_server_rules_ssl_extra }}"
ssl/probe: "{{ prometheus_server_rules_ssl__probe + prometheus_server_rules_ssl__probe_extra }}"
+ smokeping: "{{ prometheus_server_rules_smokeping + prometheus_server_rules_smokeping_extra }}"
# prometheus_server_alertmanager:
# url: "127.0.0.1:9093"
diff --git a/roles/monitoring/prometheus/server/defaults/main/rules_smokeping.yml b/roles/monitoring/prometheus/server/defaults/main/rules_smokeping.yml
new file mode 100644
index 00000000..5bab05f1
--- /dev/null
+++ b/roles/monitoring/prometheus/server/defaults/main/rules_smokeping.yml
@@ -0,0 +1,11 @@
+---
+prometheus_server_rules_smokeping_extra: []
+prometheus_server_rules_smokeping:
+ - alert: SmokepingProberConfigReloadFailure
+ expr: smokeping_prober_config_last_reload_successful != 1
+ for: 0m
+ labels:
+ severity: warning
+ annotations:
+ summary: Smokeping-prober configuration reload failure (instance {{ '{{' }} $labels.instance {{ '}}' }})
+ description: "Smokeping-prober configuration reload error\n VALUE = {{ '{{' }} $value {{ '}}' }}\n LABELS = {{ '{{' }} $labels {{ '}}' }}"