Fixes #448
Fixes #434
Note: this PR is still Work-In-Progress as I have not tested all edge cases but it does work. Perhaps you have the time to take a look on your side and maybe your will either immediately tell me that is totally wrong or the other way around. I will get back to this when I will have more time.
modulesync 5.3.0
Fixes #614
The "name" block is an object. This actually matches the example in
prometheus::alertmanager's documentation:
```
```
I wonder why unit tests didn't catch those...?
Closes: #539
This PR is intended to allow environment variables to be set for the blackbox exporter.
This can be useful, for example, if you want to use SSL_CERT_FILE
.
Fixes #535
<!--
Thank you for contributing to this project!
-->
<!--
Replace this comment with a description of your pull request.
-->
<!--
Replace this comment with the list of issues or n/a.
Use format:
Fixes #123
Fixes #124
-->
<!--
Thank you for contributing to this project!
-->
Add package prometheus-node-exporter
package name for Debian.
Installation on Ubuntu 18.04
Change-Id: I9e4a0166d789bcc553bfb59f621846339fa8ded4
<!--
Thank you for contributing to this project!
-->
This is to add an iperf3 exporter. Details in https://github.com/edgard/iperf3_exporter
Together with #430 this PR adapts the Debian-defaults regarding package- and service-names like they are actually present in Debian. e.g. all exporters are prefixed with prometheus-
.
https://packages.debian.org/search?keywords=prometheus&searchon=names&suite=stable§ion=all
```bash
user@host:~$ for A in $(apt-cache search prometheus- | awk '{ print $1 }' | xargs); do apt-file show $A 2>&1 | grep -E '(systemd/system)'; done
prometheus-alertmanager: /lib/systemd/system/prometheus-alertmanager.service
prometheus-apache-exporter: /lib/systemd/system/prometheus-apache-exporter.service
prometheus-bind-exporter: /lib/systemd/system/prometheus-bind-exporter.service
prometheus-bird-exporter: /lib/systemd/system/prometheus-bird-exporter.service
prometheus-blackbox-exporter: /lib/systemd/system/prometheus-blackbox-exporter.service
prometheus-haproxy-exporter: /lib/systemd/system/prometheus-haproxy-exporter.service
prometheus-mongodb-exporter: /lib/systemd/system/prometheus-mongodb-exporter.service
prometheus-mysqld-exporter: /lib/systemd/system/prometheus-mysqld-exporter.service
prometheus-nginx-exporter: /lib/systemd/system/prometheus-nginx-exporter.service
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter-apt.service
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter-apt.timer
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter-ipmitool-sensor.service
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter-ipmitool-sensor.timer
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter-mellanox-hca-temp.service
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter-mellanox-hca-temp.timer
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter-smartmon.service
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter-smartmon.timer
prometheus-node-exporter: /lib/systemd/system/prometheus-node-exporter.service
prometheus-pgbouncer-exporter: /lib/systemd/system/prometheus-pgbouncer-exporter.service
prometheus-postgres-exporter: /lib/systemd/system/prometheus-postgres-exporter.service
prometheus-process-exporter: /lib/systemd/system/prometheus-process-exporter.service
prometheus-pushgateway: /lib/systemd/system/prometheus-pushgateway.service
prometheus-snmp-exporter: /lib/systemd/system/prometheus-snmp-exporter.service
prometheus-sql-exporter: /lib/systemd/system/prometheus-sql-exporter.service
prometheus-squid-exporter: /lib/systemd/system/prometheus-squid-exporter.service
prometheus-varnish-exporter: /lib/systemd/system/prometheus-varnish-exporter.service
prometheus-xmpp-alerts: /lib/systemd/system/prometheus-xmpp-alerts.service
```
<!--
Thank you for contributing to this project!
-->
<!--
Replace this comment with a description of your pull request.
-->
<!--
Replace this comment with the list of issues or n/a.
Use format:
Fixes #123
Fixes #124
-->
Make sure alertmanager group can reach the config on ubuntu.
<!--
Thank you for contributing to this project!
-->
<!--
Replace this comment with a description of your pull request.
-->
<!--
Replace this comment with the list of issues or n/a.
Use format:
Fixes #123
Fixes #124
-->
<!--
Thank you for contributing to this project!
-->
Add envvars and envfile_path variable
This allows Username and password to be passed through the ESUSERNAME and ESPASSWORD environment variables.
Ref: https://github.com/prometheus-community/elasticsearch_exporter/commit/80e25faf48ff6283cfcb9e560e44b0f7b20976ab
Changes the default scrape port for the rabbitmqexporter to avoid the issue mentioned in the maintainers readme https://github.com/kbudde/rabbitmqexporter/tree/v0.29.0#breaking-change---100
Hello, this PR changes the way cnfscrapeuri is being escaped in manifests/haproxy_exporter.pp to avoid malformed string like the one being described in Issue #600.
Fixes #600
…orter
<!--
Thank you for contributing to this project!
-->
<!--
Replace this comment with a description of your pull request.
-->
<!--
Replace this comment with the list of issues or n/a.
Use format:
Fixes #123
Fixes #124
-->
With larger WAL segments, prometheus fails to write
a new checkpoint in TimeoutStopSec
time:
Oct 03 15:13:37 prometheus prometheus[2452]: level=info ts=2020-10-03T15:13:37.751Z caller=checkpoint.go:96 component=tsdb msg="Creating checkpoint" from_segment=85417 to_segment=85677 mint
Oct 03 15:15:06 prometheus systemd[1]: prometheus.service: State 'stop-sigterm' timed out. Killing.
Oct 03 15:15:06 prometheus systemd[1]: prometheus.service: Killing process 2452 (prometheus) with signal SIGKILL.
Oct 03 15:15:06 prometheus systemd[1]: prometheus.service: Main process exited, code=killed, status=9/KILL
Oct 03 15:15:06 prometheus systemd[1]: prometheus.service: Failed with result 'timeout'.
Oct 03 15:15:06 prometheus systemd[1]: Stopped Prometheus Monitoring framework.
This change adds a new parameter to define TimeoutStopSec
for prometheus.service
.
No issue previously created.
The required systemd unitfile overwrite could have been made locally as well - but as I suppose that others could also face similar issues, I decided to implement the parameter directly.
correct Download URL
<!--
Thank you for contributing to this project!
-->
<!--
Fix issue with download URL for rabbitmq_exporter
-->
<!--
Fixes #662
-->
Add Systemd_exporter
Simply add the possbility to install the systemd_exporter hosted here :
https://github.com/prometheus-community/systemd_exporter
Pull request have been tested.
e.g. azure database for mysql
<!--
Thank you for contributing to this project!
-->
Added the possibility to provide ssl ca, cert and key paths for ssl connection to the database.
Due to the fact that mysqld_exporter determines this on the ssl-ca variable in exporter my cnf file, this variable is needed at least.
Fixes #604
<!--
Thank you for contributing to this project!
-->
<!--
Replace this comment with a description of your pull request.
-->
The following commit sets external_labels
to an empty hash by default. The previous value prevent the use of deep-merge strategy for the key prometheus::global_config
when using hiera.
⚠️ This might be a breaking change for some users
<!--
Replace this comment with the list of issues or n/a.
Use format:
Fixes #123
Fixes #124
-->
None
Move the URL releases to their own directory under /opt to create the possibility for Puppet to remove old releases that are no longer used.
<!--
Thank you for contributing to this project!
-->
In order to achieve that Puppet can clean up the directory in which Prometheus and the exporters are located, I have created a subdirectory under /opt
. This allows Puppet to purge the directory which would lead to unwanted behavior with /opt
.
However, this would reinstall all exporters once, which would require one-time manual clean-up. Then you can have that automatically.
So that the change is minimally invasive, I have the whole thing activated via a variable that is deactivated by default.
Please let me know if anything is missing or if my approach does not fit.
Fixes #625
Hello, this PR aims to set the mode to the folder containing the scrape files that are themselves already set to this parameter.
The goal is to ensure that the folder has the correct permissions.
Signed-off-by: Arnaud SINAYS sinaysarnaud@gmail.com
<!--
Thank you for contributing to this project!
-->
Prometheus v2 toyaml missing linewidth option breaks puppetdb queries by adding new lines.
E.g. using:
```
...
$puppetdbqueries = {
'someapp' => "inventory { resources { type = 'Package' and title = 'someapp' } and ( ${environmentquery} ) }",
'node' => "inventory { resources { type = 'Package' and title = 'nodeexporter' } and ( ${environment_query} ) }",
}
class { 'prometheus::server':
...
scrapeconfigs => [
{
'jobname' => 'someapp',
'puppetdbsdconfigs' => [
{
'includeparameters' => false,
'port' => 8161,
'query' => $puppetdbqueries['some_app'],
```
Without line_width -1, line breaks are added breaking the puppetdb queries.
n/a
This implements support for installing and configuring the prometheus JMX exporter.
Fixes #635
Allow specifying other services that should be started prior to the exporter daemon starting up in systemd. This is to handle situations where you want the service being monitored to be started before the exporter.
N/A (new feature)
The architecture of macOS arm machines, reported by facter
, is arm64
. That was not yet reflected in init.pp
.
I added some default settings in Data to be working on FreeBSD 13
<!--
Thank you for contributing to this project!
-->
<!--
Replace this comment with a description of your pull request.
-->
<!--
Replace this comment with the list of issues or n/a.
Use format:
Fixes #123
Fixes #124
-->
<!--
Thank you for contributing to this project!
-->
Currently most exporters have weird permissions after being installed (e.g. 3434:3434 ownership). For the exporters installed via daemon, there is already a patch applied, which sets the owner and group to root:0 for the executables, which still leaves files like "LICENSE" etc. with the wrong ownerships. I am adding a patch for all files, replacing the old patch.
Fixes #111
none
<!--
Thank you for contributing to this project!
-->
<!--
Replace this comment with a description of your pull request.
-->
<!--
Replace this comment with the list of issues or n/a.
Use format:
Fixes #123
Fixes #124
-->