Merged in MON-248-monitors-for-nginx-ingress-contr (pull request #113)
MON-248-monitors-for-nginx-ingress-contr: add Nginx ingress controller 5xx monitor Approved-by: Alex Lemaresquier <alex+bitbucket@lemaresquier.org> Approved-by: Laurent Piroelle <laurent.piroelle@fr.clara.net> Approved-by: Quentin Manfroi <quentin.manfroi@yahoo.fr>
This commit is contained in:
commit
7a1b42b16a
@ -72,6 +72,9 @@ The `//` is very important, it's a terraform specific syntax used to separate gi
|
|||||||
|
|
||||||
### Monitors summary ###
|
### Monitors summary ###
|
||||||
|
|
||||||
|
- [caas](https://bitbucket.org/morea/terraform.feature.datadog/src/master/caas/)
|
||||||
|
- [kubernetes](https://bitbucket.org/morea/terraform.feature.datadog/src/master/caas/kubernetes/)
|
||||||
|
- [ingress](https://bitbucket.org/morea/terraform.feature.datadog/src/master/caas/kubernetes/ingress/)
|
||||||
- [cloud](https://bitbucket.org/morea/terraform.feature.datadog/src/master/cloud/)
|
- [cloud](https://bitbucket.org/morea/terraform.feature.datadog/src/master/cloud/)
|
||||||
- [aws](https://bitbucket.org/morea/terraform.feature.datadog/src/master/cloud/aws/)
|
- [aws](https://bitbucket.org/morea/terraform.feature.datadog/src/master/cloud/aws/)
|
||||||
- [alb](https://bitbucket.org/morea/terraform.feature.datadog/src/master/cloud/aws/alb/)
|
- [alb](https://bitbucket.org/morea/terraform.feature.datadog/src/master/cloud/aws/alb/)
|
||||||
|
|||||||
88
caas/kubernetes/ingress/README.md
Normal file
88
caas/kubernetes/ingress/README.md
Normal file
@ -0,0 +1,88 @@
|
|||||||
|
# CAAS KUBERNETES INGRESS DataDog monitors
|
||||||
|
|
||||||
|
## How to use this module
|
||||||
|
|
||||||
|
```
|
||||||
|
module "datadog-monitors-caas-kubernetes-ingress" {
|
||||||
|
source = "git::ssh://git@bitbucket.org/morea/terraform.feature.datadog.git//caas/kubernetes/ingress?ref={revision}"
|
||||||
|
|
||||||
|
environment = "${var.environment}"
|
||||||
|
message = "${module.datadog-message-alerting.alerting-message}"
|
||||||
|
}
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
## Purpose
|
||||||
|
|
||||||
|
Creates DataDog monitors with the following checks:
|
||||||
|
|
||||||
|
- Nginx Ingress 4xx errors
|
||||||
|
- Nginx Ingress 5xx errors
|
||||||
|
|
||||||
|
## Inputs
|
||||||
|
|
||||||
|
| Name | Description | Type | Default | Required |
|
||||||
|
|------|-------------|:----:|:-----:|:-----:|
|
||||||
|
| artificial_requests_count | Number of false requests used to mitigate false positive in case of low trafic | string | `5` | no |
|
||||||
|
| environment | Architecture Environment | string | - | yes |
|
||||||
|
| evaluation_delay | Delay in seconds for the metric evaluation | string | `15` | no |
|
||||||
|
| filter_tags_custom | Tags used for custom filtering when filter_tags_use_defaults is false | string | `*` | no |
|
||||||
|
| filter_tags_use_defaults | Use default filter tags convention | string | `true` | no |
|
||||||
|
| ingress_4xx_enabled | Flag to enable Ingress 4xx errors monitor | string | `true` | no |
|
||||||
|
| ingress_4xx_extra_tags | Extra tags for Ingress 4xx errors monitor | list | `<list>` | no |
|
||||||
|
| ingress_4xx_message | Message sent when an alert is triggered | string | `` | no |
|
||||||
|
| ingress_4xx_silenced | Groups to mute for Ingress 4xx errors monitor | map | `<map>` | no |
|
||||||
|
| ingress_4xx_threshold_critical | | string | `40` | no |
|
||||||
|
| ingress_4xx_threshold_warning | | string | `20` | no |
|
||||||
|
| ingress_4xx_timeframe | Monitor timeframe for Ingress 4xx errors [available values: `last_#m` (1, 5, 10, 15, or 30), `last_#h` (1, 2, or 4), or `last_1d`] | string | `last_5m` | no |
|
||||||
|
| ingress_5xx_enabled | Flag to enable Ingress 5xx errors monitor | string | `true` | no |
|
||||||
|
| ingress_5xx_extra_tags | Extra tags for Ingress 5xx errors monitor | list | `<list>` | no |
|
||||||
|
| ingress_5xx_message | Message sent when an alert is triggered | string | `` | no |
|
||||||
|
| ingress_5xx_silenced | Groups to mute for Ingress 5xx errors monitor | map | `<map>` | no |
|
||||||
|
| ingress_5xx_threshold_critical | | string | `20` | no |
|
||||||
|
| ingress_5xx_threshold_warning | | string | `10` | no |
|
||||||
|
| ingress_5xx_timeframe | Monitor timeframe for Ingress 5xx errors [available values: `last_#m` (1, 5, 10, 15, or 30), `last_#h` (1, 2, or 4), or `last_1d`] | string | `last_5m` | no |
|
||||||
|
| message | Message sent when an alert is triggered | string | - | yes |
|
||||||
|
| new_host_delay | Delay in seconds before monitor new resource | string | `300` | no |
|
||||||
|
|
||||||
|
## Outputs
|
||||||
|
|
||||||
|
| Name | Description |
|
||||||
|
|------|-------------|
|
||||||
|
| nginx_ingress_too_many_4xx_id | id for monitor nginx_ingress_too_many_4xx |
|
||||||
|
| nginx_ingress_too_many_5xx_id | id for monitor nginx_ingress_too_many_5xx |
|
||||||
|
|
||||||
|
Related documentation
|
||||||
|
---------------------
|
||||||
|
|
||||||
|
DataDog blog: https://www.datadoghq.com/blog/monitor-prometheus-metrics
|
||||||
|
https://github.com/kubernetes/ingress-nginx/pull/423/commits/1d38e3a38425f08de2f75fcae13896a3fec4d144
|
||||||
|
|
||||||
|
Nginx Ingress Controller setup
|
||||||
|
------------------------------
|
||||||
|
Enable the following flags in the Nginx Ingress Controller chart
|
||||||
|
controller.stats.enabled=true,controller.metrics.enabled=true
|
||||||
|
and the following Datadog agent configuration for each ingress controller:
|
||||||
|
```
|
||||||
|
datadog:
|
||||||
|
confd:
|
||||||
|
prometheus.yaml: |-
|
||||||
|
#nginx_upstream_responses_total{ingress_class,namespace,server,status_code:{1xx,2xx,3xx,4xx,5xx},upstream}
|
||||||
|
#nginx_upstream_requests_total{ingress_class,namespace,server,upstream}
|
||||||
|
init_config:
|
||||||
|
instances:
|
||||||
|
# The prometheus endpoint to query from
|
||||||
|
- prometheus_url: http://nginx-ingress-controller-metrics:9913/metrics
|
||||||
|
# This is NOT the ingress namespace, it is the prefix that will be used for the custom metrics
|
||||||
|
namespace: nginx-ingress
|
||||||
|
# Filter on the following metrics only
|
||||||
|
metrics:
|
||||||
|
- "nginx_upstream_requests_total"
|
||||||
|
- "nginx_upstream_responses_total"
|
||||||
|
# Adapt the tags to the current convention and verify that the monitor will match
|
||||||
|
tags:
|
||||||
|
- dd_monitoring:enabled
|
||||||
|
- dd_ingress:enabled
|
||||||
|
- dd_ingress_class:nginx
|
||||||
|
- env:prod
|
||||||
|
```
|
||||||
114
caas/kubernetes/ingress/inputs.tf
Normal file
114
caas/kubernetes/ingress/inputs.tf
Normal file
@ -0,0 +1,114 @@
|
|||||||
|
# Global Terraform
|
||||||
|
variable "environment" {
|
||||||
|
description = "Architecture Environment"
|
||||||
|
type = "string"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Global DataDog
|
||||||
|
variable "evaluation_delay" {
|
||||||
|
description = "Delay in seconds for the metric evaluation"
|
||||||
|
default = 15
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "new_host_delay" {
|
||||||
|
description = "Delay in seconds before monitor new resource"
|
||||||
|
default = 300
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "message" {
|
||||||
|
description = "Message sent when an alert is triggered"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "filter_tags_use_defaults" {
|
||||||
|
description = "Use default filter tags convention"
|
||||||
|
default = "true"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "filter_tags_custom" {
|
||||||
|
description = "Tags used for custom filtering when filter_tags_use_defaults is false"
|
||||||
|
default = "*"
|
||||||
|
}
|
||||||
|
|
||||||
|
#Ingress
|
||||||
|
variable "ingress_5xx_silenced" {
|
||||||
|
description = "Groups to mute for Ingress 5xx errors monitor"
|
||||||
|
type = "map"
|
||||||
|
default = {}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_5xx_enabled" {
|
||||||
|
description = "Flag to enable Ingress 5xx errors monitor"
|
||||||
|
type = "string"
|
||||||
|
default = "true"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_5xx_extra_tags" {
|
||||||
|
description = "Extra tags for Ingress 5xx errors monitor"
|
||||||
|
type = "list"
|
||||||
|
default = []
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_5xx_message" {
|
||||||
|
description = "Message sent when an alert is triggered"
|
||||||
|
default = ""
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_5xx_timeframe" {
|
||||||
|
description = "Monitor timeframe for Ingress 5xx errors [available values: `last_#m` (1, 5, 10, 15, or 30), `last_#h` (1, 2, or 4), or `last_1d`]"
|
||||||
|
type = "string"
|
||||||
|
default = "last_5m"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_5xx_threshold_critical" {
|
||||||
|
type = "string"
|
||||||
|
default = "20"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_5xx_threshold_warning" {
|
||||||
|
type = "string"
|
||||||
|
default = "10"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_4xx_silenced" {
|
||||||
|
description = "Groups to mute for Ingress 4xx errors monitor"
|
||||||
|
type = "map"
|
||||||
|
default = {}
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_4xx_enabled" {
|
||||||
|
description = "Flag to enable Ingress 4xx errors monitor"
|
||||||
|
type = "string"
|
||||||
|
default = "true"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_4xx_extra_tags" {
|
||||||
|
description = "Extra tags for Ingress 4xx errors monitor"
|
||||||
|
type = "list"
|
||||||
|
default = []
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_4xx_message" {
|
||||||
|
description = "Message sent when an alert is triggered"
|
||||||
|
default = ""
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_4xx_timeframe" {
|
||||||
|
description = "Monitor timeframe for Ingress 4xx errors [available values: `last_#m` (1, 5, 10, 15, or 30), `last_#h` (1, 2, or 4), or `last_1d`]"
|
||||||
|
type = "string"
|
||||||
|
default = "last_5m"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_4xx_threshold_critical" {
|
||||||
|
type = "string"
|
||||||
|
default = "40"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "ingress_4xx_threshold_warning" {
|
||||||
|
type = "string"
|
||||||
|
default = "20"
|
||||||
|
}
|
||||||
|
|
||||||
|
variable "artificial_requests_count" {
|
||||||
|
default = 5
|
||||||
|
description = "Number of false requests used to mitigate false positive in case of low trafic"
|
||||||
|
}
|
||||||
29
caas/kubernetes/ingress/modules.tf
Normal file
29
caas/kubernetes/ingress/modules.tf
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
module "filter-tags" {
|
||||||
|
source = "../../../common/filter-tags"
|
||||||
|
|
||||||
|
environment = "${var.environment}"
|
||||||
|
resource = "ingress"
|
||||||
|
filter_tags_use_defaults = "${var.filter_tags_use_defaults}"
|
||||||
|
filter_tags_custom = "${var.filter_tags_custom}"
|
||||||
|
extra_tags = ["!upstream:upstream-default-backend"]
|
||||||
|
}
|
||||||
|
|
||||||
|
module "filter-tags-5xx" {
|
||||||
|
source = "../../../common/filter-tags"
|
||||||
|
|
||||||
|
environment = "${var.environment}"
|
||||||
|
resource = "ingress"
|
||||||
|
filter_tags_use_defaults = "${var.filter_tags_use_defaults}"
|
||||||
|
filter_tags_custom = "${var.filter_tags_custom}"
|
||||||
|
extra_tags = ["!upstream:upstream-default-backend,status_code:5xx"]
|
||||||
|
}
|
||||||
|
|
||||||
|
module "filter-tags-4xx" {
|
||||||
|
source = "../../../common/filter-tags"
|
||||||
|
|
||||||
|
environment = "${var.environment}"
|
||||||
|
resource = "ingress"
|
||||||
|
filter_tags_use_defaults = "${var.filter_tags_use_defaults}"
|
||||||
|
filter_tags_custom = "${var.filter_tags_custom}"
|
||||||
|
extra_tags = ["!upstream:upstream-default-backend,status_code:4xx"]
|
||||||
|
}
|
||||||
71
caas/kubernetes/ingress/monitors-ingress.tf
Normal file
71
caas/kubernetes/ingress/monitors-ingress.tf
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
resource "datadog_monitor" "nginx_ingress_too_many_5xx" {
|
||||||
|
count = "${var.ingress_5xx_enabled ? 1 : 0}"
|
||||||
|
name = "[${var.environment}] Nginx Ingress 5xx errors {{#is_alert}}{{{comparator}}} {{threshold}}% ({{value}}%){{/is_alert}}{{#is_warning}}{{{comparator}}} {{warn_threshold}}% ({{value}}%){{/is_warning}}"
|
||||||
|
message = "${coalesce(var.ingress_5xx_message, var.message)}"
|
||||||
|
|
||||||
|
query = <<EOF
|
||||||
|
sum(${var.ingress_5xx_timeframe}): (
|
||||||
|
default(
|
||||||
|
avg:nginx_ingress.nginx_upstream_responses_total${module.filter-tags-5xx.query_alert} by {upstream,ingress_class} /
|
||||||
|
(avg:nginx_ingress.nginx_upstream_requests_total${module.filter-tags.query_alert} by {upstream,ingress_class} + ${var.artificial_requests_count}),
|
||||||
|
0) * 100
|
||||||
|
) > ${var.ingress_5xx_threshold_critical}
|
||||||
|
EOF
|
||||||
|
|
||||||
|
type = "metric alert"
|
||||||
|
|
||||||
|
thresholds {
|
||||||
|
warning = "${var.ingress_5xx_threshold_warning}"
|
||||||
|
critical = "${var.ingress_5xx_threshold_critical}"
|
||||||
|
}
|
||||||
|
|
||||||
|
notify_no_data = false
|
||||||
|
evaluation_delay = "${var.evaluation_delay}"
|
||||||
|
new_host_delay = "${var.new_host_delay}"
|
||||||
|
renotify_interval = 0
|
||||||
|
notify_audit = false
|
||||||
|
timeout_h = 0
|
||||||
|
include_tags = true
|
||||||
|
locked = false
|
||||||
|
require_full_window = true
|
||||||
|
|
||||||
|
silenced = "${var.ingress_5xx_silenced}"
|
||||||
|
|
||||||
|
tags = ["env:${var.environment}", "type:caas", "provider:prometheus", "resource:nginx-ingress-controller", "team:claranet", "created-by:terraform", "${var.ingress_5xx_extra_tags}"]
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "datadog_monitor" "nginx_ingress_too_many_4xx" {
|
||||||
|
count = "${var.ingress_4xx_enabled ? 1 : 0}"
|
||||||
|
name = "[${var.environment}] Nginx Ingress 4xx errors {{#is_alert}}{{{comparator}}} {{threshold}}% ({{value}}%){{/is_alert}}{{#is_warning}}{{{comparator}}} {{warn_threshold}}% ({{value}}%){{/is_warning}}"
|
||||||
|
message = "${coalesce(var.ingress_4xx_message, var.message)}"
|
||||||
|
|
||||||
|
query = <<EOF
|
||||||
|
sum(${var.ingress_4xx_timeframe}): (
|
||||||
|
default(
|
||||||
|
avg:nginx_ingress.nginx_upstream_responses_total${module.filter-tags-4xx.query_alert} by {upstream,ingress_class} /
|
||||||
|
(avg:nginx_ingress.nginx_upstream_requests_total${module.filter-tags.query_alert} by {upstream,ingress_class} + ${var.artificial_requests_count}),
|
||||||
|
0) * 100
|
||||||
|
) > ${var.ingress_4xx_threshold_critical}
|
||||||
|
EOF
|
||||||
|
|
||||||
|
type = "metric alert"
|
||||||
|
|
||||||
|
thresholds {
|
||||||
|
warning = "${var.ingress_4xx_threshold_warning}"
|
||||||
|
critical = "${var.ingress_4xx_threshold_critical}"
|
||||||
|
}
|
||||||
|
|
||||||
|
notify_no_data = false
|
||||||
|
evaluation_delay = "${var.evaluation_delay}"
|
||||||
|
new_host_delay = "${var.new_host_delay}"
|
||||||
|
renotify_interval = 0
|
||||||
|
notify_audit = false
|
||||||
|
timeout_h = 0
|
||||||
|
include_tags = true
|
||||||
|
locked = false
|
||||||
|
require_full_window = true
|
||||||
|
|
||||||
|
silenced = "${var.ingress_4xx_silenced}"
|
||||||
|
|
||||||
|
tags = ["env:${var.environment}", "type:caas", "provider:prometheus", "resource:nginx-ingress-controller", "team:claranet", "created-by:terraform", "${var.ingress_4xx_extra_tags}"]
|
||||||
|
}
|
||||||
9
caas/kubernetes/ingress/outputs.tf
Normal file
9
caas/kubernetes/ingress/outputs.tf
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
output "nginx_ingress_too_many_5xx_id" {
|
||||||
|
description = "id for monitor nginx_ingress_too_many_5xx"
|
||||||
|
value = "${datadog_monitor.nginx_ingress_too_many_5xx.*.id}"
|
||||||
|
}
|
||||||
|
|
||||||
|
output "nginx_ingress_too_many_4xx_id" {
|
||||||
|
description = "id for monitor nginx_ingress_too_many_4xx"
|
||||||
|
value = "${datadog_monitor.nginx_ingress_too_many_4xx.*.id}"
|
||||||
|
}
|
||||||
Loading…
x
Reference in New Issue
Block a user