forked from Deuxfleurs/nixcfg
77 lines
2.4 KiB
YAML
77 lines
2.4 KiB
YAML
global:
|
|
scrape_interval: 15s # By default, scrape targets every 15 seconds.
|
|
|
|
scrape_configs:
|
|
- job_name: 'prometheus'
|
|
static_configs:
|
|
- targets: ['localhost:9090']
|
|
|
|
- job_name: 'node-exporter'
|
|
consul_sd_configs:
|
|
- server: 'https://localhost:8501'
|
|
services:
|
|
- 'node-exporter'
|
|
tls_config:
|
|
ca_file: /etc/prometheus/consul-ca.crt
|
|
cert_file: /etc/prometheus/consul-client.crt
|
|
key_file: /etc/prometheus/consul-client.key
|
|
|
|
- job_name: 'tricot'
|
|
consul_sd_configs:
|
|
- server: 'https://localhost:8501'
|
|
services:
|
|
- 'tricot-metrics'
|
|
tls_config:
|
|
ca_file: /etc/prometheus/consul-ca.crt
|
|
cert_file: /etc/prometheus/consul-client.crt
|
|
key_file: /etc/prometheus/consul-client.key
|
|
|
|
- job_name: 'garage'
|
|
authorization:
|
|
type: Bearer
|
|
credentials: {{ key "secrets/garage/metrics_token" }}
|
|
consul_sd_configs:
|
|
- server: 'https://localhost:8501'
|
|
services:
|
|
- 'garage-admin'
|
|
tls_config:
|
|
ca_file: /etc/prometheus/consul-ca.crt
|
|
cert_file: /etc/prometheus/consul-client.crt
|
|
key_file: /etc/prometheus/consul-client.key
|
|
|
|
- job_name: 'drone'
|
|
authorization:
|
|
type: Bearer
|
|
credentials: {{ key "secrets/drone-ci/metrics_token" }}
|
|
consul_sd_configs:
|
|
- server: 'https://localhost:8501'
|
|
services:
|
|
- 'drone'
|
|
tls_config:
|
|
ca_file: /etc/prometheus/consul-ca.crt
|
|
cert_file: /etc/prometheus/consul-client.crt
|
|
key_file: /etc/prometheus/consul-client.key
|
|
|
|
# see https://prometheus.io/docs/prometheus/latest/configuration/configuration/#static_config
|
|
# and https://www.nomadproject.io/api-docs/metrics
|
|
# and https://learn.hashicorp.com/tutorials/nomad/prometheus-metrics
|
|
# dashboard at https://grafana.com/grafana/dashboards/3800
|
|
- job_name: 'nomad'
|
|
scrape_interval: 10s
|
|
metrics_path: "/v1/metrics"
|
|
params:
|
|
format: ['prometheus']
|
|
scheme: 'https'
|
|
tls_config:
|
|
ca_file: /etc/prometheus/nomad-ca.crt
|
|
cert_file: /etc/prometheus/nomad-client.crt
|
|
key_file: /etc/prometheus/nomad-client.key
|
|
insecure_skip_verify: true
|
|
consul_sd_configs:
|
|
- server: 'https://localhost:8501'
|
|
services:
|
|
- 'nomad-client'
|
|
tls_config:
|
|
ca_file: /etc/prometheus/consul-ca.crt
|
|
cert_file: /etc/prometheus/consul-client.crt
|
|
key_file: /etc/prometheus/consul-client.key
|