diff options
Diffstat (limited to 'roles/monitoring/prometheus/exporter/smokeping')
5 files changed, 112 insertions, 0 deletions
diff --git a/roles/monitoring/prometheus/exporter/smokeping/defaults/main.yml b/roles/monitoring/prometheus/exporter/smokeping/defaults/main.yml new file mode 100644 index 00000000..2bf90a2b --- /dev/null +++ b/roles/monitoring/prometheus/exporter/smokeping/defaults/main.yml @@ -0,0 +1,10 @@ +--- +# prometheus_exporter_smokeping_version: + +# prometheus_exporter_smokeping_targets: +# - hosts: +# - 1.2.3.4 +# interval: 1s +# network: ip +# protocol: icmp +# size: 56 diff --git a/roles/monitoring/prometheus/exporter/smokeping/handlers/main.yml b/roles/monitoring/prometheus/exporter/smokeping/handlers/main.yml new file mode 100644 index 00000000..3ce9c2eb --- /dev/null +++ b/roles/monitoring/prometheus/exporter/smokeping/handlers/main.yml @@ -0,0 +1,10 @@ +--- +- name: restart prometheus-smokeping-exporter + service: + name: prometheus-smokeping-exporter + state: restarted + +- name: reload nginx + service: + name: nginx + state: reloaded diff --git a/roles/monitoring/prometheus/exporter/smokeping/tasks/main.yml b/roles/monitoring/prometheus/exporter/smokeping/tasks/main.yml new file mode 100644 index 00000000..23c5eda5 --- /dev/null +++ b/roles/monitoring/prometheus/exporter/smokeping/tasks/main.yml @@ -0,0 +1,58 @@ +--- +- name: generate apt pin file for exporter-smokeping package + when: prometheus_exporter_smokeping_version is defined + copy: + dest: "/etc/apt/preferences.d/prom-exporter-smokeping.pref" + content: | + Package: prom-exporter-smokeping + Pin: version {{ prometheus_exporter_smokeping_version }}-1 + Pin-Priority: 1001 + +- name: remove apt pin file for exporter-smokeping package + when: prometheus_exporter_smokeping_version is not defined + file: + path: "/etc/apt/preferences.d/prom-exporter-smokeping.pref" + state: absent + +- name: install apt packages + apt: + name: "prom-exporter-smokeping{% if prometheus_exporter_smokeping_version is defined %}={{ prometheus_exporter_smokeping_version }}-1{% endif %}" + state: present + allow_downgrade: yes + notify: restart prometheus-smokeping-exporter + +- name: create config directory + file: + path: /etc/prometheus/exporter/smokeping + state: directory + +- name: generate configuration + template: + src: config.yml.j2 + dest: /etc/prometheus/exporter/smokeping/config.yml + owner: root + group: prometheus-exporter + mode: 0640 + notify: restart prometheus-smokeping-exporter + +- name: generate systemd service unit + template: + src: service.j2 + dest: /etc/systemd/system/prometheus-smokeping-exporter.service + notify: restart prometheus-smokeping-exporter + +- name: make sure prometheus-smokeping-exporter is enabled and started + systemd: + name: prometheus-smokeping-exporter.service + daemon_reload: yes + state: started + enabled: yes + +- name: register exporter + copy: + content: | + location = /smokeping { + proxy_pass http://127.0.0.1:9374/metrics; + } + dest: /etc/prometheus/exporter/smokeping.locations + notify: reload nginx diff --git a/roles/monitoring/prometheus/exporter/smokeping/templates/config.yml.j2 b/roles/monitoring/prometheus/exporter/smokeping/templates/config.yml.j2 new file mode 100644 index 00000000..f4d9020a --- /dev/null +++ b/roles/monitoring/prometheus/exporter/smokeping/templates/config.yml.j2 @@ -0,0 +1,4 @@ +# {{ ansible_managed }} + +targets: + {{ prometheus_exporter_smokeping_targets | to_nice_yaml(indent=2) | indent(2) }} diff --git a/roles/monitoring/prometheus/exporter/smokeping/templates/service.j2 b/roles/monitoring/prometheus/exporter/smokeping/templates/service.j2 new file mode 100644 index 00000000..5250f752 --- /dev/null +++ b/roles/monitoring/prometheus/exporter/smokeping/templates/service.j2 @@ -0,0 +1,30 @@ +[Unit] +Description=Prometheus smokeping prober + +[Service] +Restart=always +User=prometheus-exporter +ExecStart=/usr/bin/prometheus-smokeping-prober --web.listen-address="127.0.0.1:9374" --config.file /etc/prometheus/exporter/smokeping/config.yml + +# systemd hardening-options +AmbientCapabilities=CAP_NET_RAW +CapabilityBoundingSet=CAP_NET_RAW +DeviceAllow=/dev/null rw +DevicePolicy=strict +LockPersonality=true +MemoryDenyWriteExecute=true +NoNewPrivileges=true +PrivateDevices=true +PrivateTmp=true +ProtectControlGroups=true +ProtectHome=true +ProtectKernelModules=true +ProtectKernelTunables=true +ProtectSystem=strict +RemoveIPC=true +RestrictNamespaces=true +RestrictRealtime=true +SystemCallArchitectures=native + +[Install] +WantedBy=multi-user.target |