summaryrefslogtreecommitdiff
path: root/roles/monitoring/prometheus/exporter/nftables
diff options
context:
space:
mode:
Diffstat (limited to 'roles/monitoring/prometheus/exporter/nftables')
-rw-r--r--roles/monitoring/prometheus/exporter/nftables/defaults/main.yml2
-rw-r--r--roles/monitoring/prometheus/exporter/nftables/handlers/main.yml10
-rw-r--r--roles/monitoring/prometheus/exporter/nftables/tasks/main.yml55
-rw-r--r--roles/monitoring/prometheus/exporter/nftables/templates/config.yml.j24
-rw-r--r--roles/monitoring/prometheus/exporter/nftables/templates/service.j231
5 files changed, 102 insertions, 0 deletions
diff --git a/roles/monitoring/prometheus/exporter/nftables/defaults/main.yml b/roles/monitoring/prometheus/exporter/nftables/defaults/main.yml
new file mode 100644
index 00000000..c4c42756
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/nftables/defaults/main.yml
@@ -0,0 +1,2 @@
+---
+# prometheus_exporter_nftables_version:
diff --git a/roles/monitoring/prometheus/exporter/nftables/handlers/main.yml b/roles/monitoring/prometheus/exporter/nftables/handlers/main.yml
new file mode 100644
index 00000000..a78363f8
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/nftables/handlers/main.yml
@@ -0,0 +1,10 @@
+---
+- name: restart prometheus-nftables-exporter
+ service:
+ name: prometheus-nftables-exporter
+ state: restarted
+
+- name: reload nginx
+ service:
+ name: nginx
+ state: reloaded
diff --git a/roles/monitoring/prometheus/exporter/nftables/tasks/main.yml b/roles/monitoring/prometheus/exporter/nftables/tasks/main.yml
new file mode 100644
index 00000000..47022026
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/nftables/tasks/main.yml
@@ -0,0 +1,55 @@
+---
+- name: generate apt pin file for exporter-nftables package
+ when: prometheus_exporter_nftables_version is defined
+ copy:
+ dest: "/etc/apt/preferences.d/prom-exporter-nftables.pref"
+ content: |
+ Package: prom-exporter-nftables
+ Pin: version {{ prometheus_exporter_nftables_version }}-1
+ Pin-Priority: 1001
+
+- name: remove apt pin file for exporter-nftables package
+ when: prometheus_exporter_nftables_version is not defined
+ file:
+ path: "/etc/apt/preferences.d/prom-exporter-nftables.pref"
+ state: absent
+
+- name: install apt packages
+ apt:
+ name: "prom-exporter-nftables{% if prometheus_exporter_nftables_version is defined %}={{ prometheus_exporter_nftables_version }}-1{% endif %}"
+ state: present
+ allow_downgrade: yes
+ notify: restart prometheus-nftables-exporter
+
+- name: create config directory
+ file:
+ path: /etc/prometheus/exporter/nftables
+ state: directory
+
+- name: generate configuration
+ template:
+ src: config.yml.j2
+ dest: /etc/prometheus/exporter/nftables/config.yml
+ notify: restart prometheus-nftables-exporter
+
+- name: generate systemd service unit
+ template:
+ src: service.j2
+ dest: /etc/systemd/system/prometheus-nftables-exporter.service
+ notify: restart prometheus-nftables-exporter
+
+- name: make sure prometheus-nftables-exporter is enabled and started
+ systemd:
+ name: prometheus-nftables-exporter.service
+ daemon_reload: yes
+ state: started
+ enabled: yes
+
+- name: register exporter
+ copy:
+ content: |
+ location = /nftables {
+ proxy_pass http://127.0.0.1:9630/metrics;
+ }
+ dest: /etc/prometheus/exporter/nftables.locations
+ notify: reload nginx
diff --git a/roles/monitoring/prometheus/exporter/nftables/templates/config.yml.j2 b/roles/monitoring/prometheus/exporter/nftables/templates/config.yml.j2
new file mode 100644
index 00000000..07c32bd1
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/nftables/templates/config.yml.j2
@@ -0,0 +1,4 @@
+# {{ ansible_managed }}
+
+nftables_exporter:
+ bind_to: "127.0.0.1:9630"
diff --git a/roles/monitoring/prometheus/exporter/nftables/templates/service.j2 b/roles/monitoring/prometheus/exporter/nftables/templates/service.j2
new file mode 100644
index 00000000..b22d9582
--- /dev/null
+++ b/roles/monitoring/prometheus/exporter/nftables/templates/service.j2
@@ -0,0 +1,31 @@
+[Unit]
+Description=Prometheus nftables exporter
+After=systemd-modules-load.service
+
+[Service]
+Restart=always
+User=prometheus-exporter
+ExecStart=/usr/bin/prometheus-nftables-exporter --config=/etc/prometheus/exporter/nftables/config.yml
+ExecReload=/bin/kill -HUP $MAINPID
+
+# systemd hardening-options
+AmbientCapabilities=CAP_NET_ADMIN
+CapabilityBoundingSet=CAP_NET_ADMIN
+DeviceAllow=/dev/null rw
+DevicePolicy=strict
+LockPersonality=true
+MemoryDenyWriteExecute=true
+NoNewPrivileges=true
+PrivateTmp=true
+ProtectControlGroups=true
+ProtectHome=true
+ProtectKernelModules=true
+ProtectKernelTunables=true
+ProtectSystem=strict
+RemoveIPC=true
+RestrictNamespaces=true
+RestrictRealtime=true
+SystemCallArchitectures=native
+
+[Install]
+WantedBy=multi-user.target