Skip to content

Commit

Permalink
Use probelab prometheus server
Browse files Browse the repository at this point in the history
  • Loading branch information
iand committed Nov 9, 2023
1 parent fbf82e0 commit ed0971f
Show file tree
Hide file tree
Showing 12 changed files with 42 additions and 32 deletions.
2 changes: 1 addition & 1 deletion cmd/thunderdome/infra/base.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ type BaseInfra struct {
EcsExecutionRoleArn string
EfsFileSystemID string
ExperimentsTableName string
GrafanaPushSecretArn string
PrometheusSecretArn string
IronbarAddr string
LogGroupName string
RequestSNSTopicArn string
Expand Down
12 changes: 8 additions & 4 deletions cmd/thunderdome/infra/dealgood.go
Original file line number Diff line number Diff line change
Expand Up @@ -334,12 +334,16 @@ func (d *Dealgood) createTaskDefinition() Task {
},
Secrets: []*ecs.Secret{
{
Name: aws.String("GRAFANA_USER"),
ValueFrom: aws.String(d.base.GrafanaPushSecretArn + ":username::"),
Name: aws.String("PROMETHEUS_URL"),
ValueFrom: aws.String(d.base.PrometheusSecretArn + ":url::"),
},
{
Name: aws.String("GRAFANA_PASS"),
ValueFrom: aws.String(d.base.GrafanaPushSecretArn + ":password::"),
Name: aws.String("PROMETHEUS_USER"),
ValueFrom: aws.String(d.base.PrometheusSecretArn + ":username::"),
},
{
Name: aws.String("PROMETHEUS_PASS"),
ValueFrom: aws.String(d.base.PrometheusSecretArn + ":password::"),
},
},
},
Expand Down
12 changes: 8 additions & 4 deletions cmd/thunderdome/infra/target.go
Original file line number Diff line number Diff line change
Expand Up @@ -313,12 +313,16 @@ func (t *Target) createTaskDefinition() Task {
},
Secrets: []*ecs.Secret{
{
Name: aws.String("GRAFANA_USER"),
ValueFrom: aws.String(t.base.GrafanaPushSecretArn + ":username::"),
Name: aws.String("PROMETHEUS_URL"),
ValueFrom: aws.String(t.base.PrometheusSecretArn + ":url::"),
},
{
Name: aws.String("GRAFANA_PASS"),
ValueFrom: aws.String(t.base.GrafanaPushSecretArn + ":password::"),
Name: aws.String("PROMETHEUS_USER"),
ValueFrom: aws.String(t.base.PrometheusSecretArn + ":username::"),
},
{
Name: aws.String("PROMETHEUS_PASS"),
ValueFrom: aws.String(t.base.PrometheusSecretArn + ":password::"),
},
},
},
Expand Down
8 changes: 4 additions & 4 deletions tf/files/grafana-agent-config/dealgood.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@ metrics:
scrape_interval: 30s
scrape_timeout: 30s
remote_write:
- url: https://prometheus-us-central1.grafana.net/api/prom/push
- url: ${PROMETHEUS_URL}
basic_auth:
username: ${GRAFANA_USER}
password: ${GRAFANA_PASS}
username: ${PROMETHEUS_USER}
password: ${PROMETHEUS_PASS}
configs:
- name: thunderdome
host_filter: false
Expand Down Expand Up @@ -41,5 +41,5 @@ traces:
- endpoint: tempo-eu-west-0.grafana.net:443
basic_auth:
username: 263936
password: ${GRAFANA_PASS}
password: ${PROMETHEUS_PASS}

6 changes: 3 additions & 3 deletions tf/files/grafana-agent-config/ironbar.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@ metrics:
scrape_interval: 30s
scrape_timeout: 30s
remote_write:
- url: https://prometheus-us-central1.grafana.net/api/prom/push
- url: ${PROMETHEUS_URL}
basic_auth:
username: ${GRAFANA_USER}
password: ${GRAFANA_PASS}
username: ${PROMETHEUS_USER}
password: ${PROMETHEUS_PASS}
configs:
- name: thunderdome
host_filter: false
Expand Down
8 changes: 4 additions & 4 deletions tf/files/grafana-agent-config/skyfish.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@ metrics:
scrape_interval: 30s
scrape_timeout: 30s
remote_write:
- url: https://prometheus-us-central1.grafana.net/api/prom/push
- url: ${PROMETHEUS_URL}
basic_auth:
username: ${GRAFANA_USER}
password: ${GRAFANA_PASS}
username: ${PROMETHEUS_USER}
password: ${PROMETHEUS_PASS}
configs:
- name: thunderdome
host_filter: false
Expand Down Expand Up @@ -39,5 +39,5 @@ traces:
- endpoint: tempo-eu-west-0.grafana.net:443
basic_auth:
username: 263936
password: ${GRAFANA_PASS}
password: ${PROMETHEUS_PASS}

8 changes: 4 additions & 4 deletions tf/files/grafana-agent-config/target.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@ metrics:
scrape_interval: 30s
scrape_timeout: 30s
remote_write:
- url: https://prometheus-us-central1.grafana.net/api/prom/push
- url: ${PROMETHEUS_URL}
basic_auth:
username: ${GRAFANA_USER}
password: ${GRAFANA_PASS}
username: ${PROMETHEUS_USER}
password: ${PROMETHEUS_PASS}
configs:
- name: thunderdome
host_filter: false
Expand Down Expand Up @@ -64,4 +64,4 @@ traces:
- endpoint: tempo-eu-west-0.grafana.net:443
basic_auth:
username: 263936
password: ${GRAFANA_PASS}
password: ${PROMETHEUS_PASS}
2 changes: 1 addition & 1 deletion tf/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ data "aws_iam_policy_document" "ecsTaskExecutionRole_secretsmanager" {
statement {
actions = ["kms:Decrypt", "secretsmanager:GetSecretValue"]
resources = [
data.aws_secretsmanager_secret.grafana-push-secret.arn,
data.aws_secretsmanager_secret.prometheus-secret.arn,
data.aws_secretsmanager_secret.dealgood-loki-secret.arn,
data.aws_kms_key.default_secretsmanager_key.arn,
]
Expand Down
5 changes: 3 additions & 2 deletions tf/ironbar.tf
Original file line number Diff line number Diff line change
Expand Up @@ -144,8 +144,9 @@ resource "aws_ecs_task_definition" "ironbar" {
]
portMappings = []
secrets = [
{ name = "GRAFANA_USER", valueFrom = "${data.aws_secretsmanager_secret.grafana-push-secret.arn}:username::" },
{ name = "GRAFANA_PASS", valueFrom = "${data.aws_secretsmanager_secret.grafana-push-secret.arn}:password::" }
{ name = "PROMETHEUS_URL", valueFrom = "${data.aws_secretsmanager_secret.prometheus-secret.arn}:url::" },
{ name = "PROMETHEUS_USER", valueFrom = "${data.aws_secretsmanager_secret.prometheus-secret.arn}:username::" },
{ name = "PROMETHEUS_PASS", valueFrom = "${data.aws_secretsmanager_secret.prometheus-secret.arn}:password::" }
]
volumesFrom = []
}
Expand Down
2 changes: 1 addition & 1 deletion tf/locals.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ locals {
EcsExecutionRoleArn = aws_iam_role.ecsTaskExecutionRole.arn
EfsFileSystemID = aws_efs_file_system.thunderdome.id
ExperimentsTableName = aws_dynamodb_table.experiments.name
GrafanaPushSecretArn = data.aws_secretsmanager_secret.grafana-push-secret.arn
PrometheusSecretArn = data.aws_secretsmanager_secret.prometheus-secret.arn
IronbarAddr = "${aws_eip.ecs[0].public_ip}:${local.ironbar_port_number}"
LogGroupName = aws_cloudwatch_log_group.logs.name
RequestSNSTopicArn = aws_sns_topic.gateway_requests.arn
Expand Down
4 changes: 2 additions & 2 deletions tf/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -24,8 +24,8 @@ data "aws_kms_key" "default_secretsmanager_key" {
key_id = "arn:aws:kms:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:key/d32eafb8-e9b3-44f2-9703-fd4663949020"
}

data "aws_secretsmanager_secret" "grafana-push-secret" {
arn = "arn:aws:secretsmanager:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:secret:grafana-push-MxjNiv"
data "aws_secretsmanager_secret" "prometheus-secret" {
arn = "arn:aws:secretsmanager:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:secret:prometheus_credentials-ujqWDl"
}

data "aws_secretsmanager_secret" "dealgood-loki-secret" {
Expand Down
5 changes: 3 additions & 2 deletions tf/skyfish.tf
Original file line number Diff line number Diff line change
Expand Up @@ -126,8 +126,9 @@ resource "aws_ecs_task_definition" "skyfish" {
]
portMappings = []
secrets = [
{ name = "GRAFANA_USER", valueFrom = "${data.aws_secretsmanager_secret.grafana-push-secret.arn}:username::" },
{ name = "GRAFANA_PASS", valueFrom = "${data.aws_secretsmanager_secret.grafana-push-secret.arn}:password::" }
{ name = "PROMETHEUS_URL", valueFrom = "${data.aws_secretsmanager_secret.prometheus-secret.arn}:url::" },
{ name = "PROMETHEUS_USER", valueFrom = "${data.aws_secretsmanager_secret.prometheus-secret.arn}:username::" },
{ name = "PROMETHEUS_PASS", valueFrom = "${data.aws_secretsmanager_secret.prometheus-secret.arn}:password::" }
]
volumesFrom = []
}
Expand Down

0 comments on commit ed0971f

Please sign in to comment.