ansible-collection-prometheus/roles/pushgateway
gardar c11ee10a50
Merge pull request #395 from gardar/update-platforms
fix: remove EOL platforms for current ones
2024-09-28 12:26:19 +00:00
..
defaults patch: 🎉 automated upstream release update 2024-09-20 14:32:34 +00:00
handlers feat: Add pushgateway role 2023-07-11 08:31:38 +02:00
meta Merge pull request #395 from gardar/update-platforms 2024-09-28 12:26:19 +00:00
molecule fix: cleanup unused playbooks now that prepare stages have been merged into one 2024-09-28 03:01:55 +00:00
tasks Setting one archive_path per role and setting default values 2024-02-29 10:55:40 -05:00
templates enhancement(pushgateway): allows using multiple web listen addresses 2023-11-28 13:07:31 +01:00
vars feat: Add pushgateway role 2023-07-11 08:31:38 +02:00
README.md feat: Add pushgateway role 2023-07-11 08:31:38 +02:00
test-requirements.txt feat: Add pushgateway role 2023-07-11 08:31:38 +02:00
TROUBLESHOOTING.md feat: Add pushgateway role 2023-07-11 08:31:38 +02:00

graph logo

Ansible Role: pushgateway

Description

Deploy prometheus pushgateway using ansible.

Requirements

  • Ansible >= 2.9 (It might work on previous versions, but we cannot guarantee it)
  • gnu-tar on Mac deployer host (brew install gnu-tar)
  • Passlib is required when using the basic authentication feature (pip install passlib[bcrypt])

Role Variables

All variables which can be overridden are stored in defaults/main.yml file as well as in meta/argument_specs.yml. Please refer to the collection docs for description and default values of the variables.

Example

Playbook

Use it in a playbook as follows:

- hosts: all
  roles:
    - prometheus.prometheus.pushgateway

TLS config

Before running pushgateway role, the user needs to provision their own certificate and key.

- hosts: all
  pre_tasks:
    - name: Create pushgateway cert dir
      file:
        path: "/etc/pushgateway"
        state: directory
        owner: root
        group: root

    - name: Create cert and key
      openssl_certificate:
        path: /etc/pushgateway/tls.cert
        csr_path: /etc/pushgateway/tls.csr
        privatekey_path: /etc/pushgateway/tls.key
        provider: selfsigned
  roles:
    - prometheus.prometheus.pushgateway
  vars:
    pushgateway_tls_server_config:
      cert_file: /etc/pushgateway/tls.cert
      key_file: /etc/pushgateway/tls.key
    pushgateway_basic_auth_users:
      randomuser: examplepassword

Demo site

We provide an example site that demonstrates a full monitoring solution based on prometheus and grafana. The repository with code and links to running instances is available on github and the site is hosted on DigitalOcean.

Local Testing

The preferred way of locally testing the role is to use Docker and molecule (v3.x). You will have to install Docker on your system. See "Get started" for a Docker package suitable for your system. Running your tests is as simple as executing molecule test.

Continuous Integration

Combining molecule and circle CI allows us to test how new PRs will behave when used with multiple ansible versions and multiple operating systems. This also allows use to create test scenarios for different role configurations. As a result we have quite a large test matrix which can take more time than local testing, so please be patient.

Contributing

See contributor guideline.

Troubleshooting

See troubleshooting.

License

This project is licensed under MIT License. See LICENSE for more details.