-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement 'endpoint role' for service discovery #30
Comments
@ilyam8 please plan this. |
This is not WIP, because, i believe, i wasn't able to explain difference between Let me clarify the difference and explain why i did only Difference from a user prospective:
Prometheus discovery (and our) result are targets, they are used to create scrape configs.
Find endpoints, create a target per address per port. 0 ~ $ kubectl get endpoints -n infra
NAME ENDPOINTS AGE
corp-homepage 10.1.2.12:80 167d
corp-traefik 10.1.0.14:8000,10.1.2.13:8000,10.1.0.14:8443 + 1 more... 197d
crdb-cockroachdb 10.1.0.24:26257,10.1.2.25:26257,10.1.3.25:26257 + 3 more... 189d
... In most of the cases those endpoints point to pods. Not common case example: an external to k8s db you want to access from the cluster.
Find pods, create a target per pod per container per port. What we need is to get IP:PORT and additional info (pod name, namespace, container name, image name, etc) which we can use to identify the application (prometheus don't need any identification) - both roles end result is ~ same.
|
I have bery brief expirience with k8s, but from what i understand |
https://netdata-cloud.slack.com/archives/CSD2D3NTG/p1605874967006100
The text was updated successfully, but these errors were encountered: