This repository has been archived by the owner on Jul 13, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path02-otelcol-config.yaml
69 lines (69 loc) · 1.9 KB
/
02-otelcol-config.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
---
apiVersion: v1
kind: ConfigMap
metadata:
name: otelcol
labels:
otel: collect
data:
otelconfig.yaml: |
extensions:
bearertokenauth:
filename: /conf/edge-token/edge-token
receivers:
otlp:
protocols:
http:
grpc:
prometheus:
config:
scrape_configs:
- job_name: 'otel-collector'
scrape_interval: 5s
static_configs:
- targets: ['10.42.0.118:9102'] # application metrics endpoint
processors:
memory_limiter:
check_interval: 1s
limit_mib: 2000
spike_limit_mib: 400
batch:
exporters:
otlphttp:
# endpoint: https://OCP_ROUTE_OTELCOL
endpoint: https://otelcol-thanos.apps.ci-ln-w3ydddb-76ef8.origin-ci-int-aws.dev.rhcloud.com # otel-collector service route from OCP, port 4318
auth:
authenticator: bearertokenauth
tls:
insecure: false
ca_file: /conf/ca/ca.crt
logging:
verbosity: detailed
prometheusremotewrite:
# endpoint: https://OCP_ROUTE_THANOS_RECEIVE/api/v1/receive
endpoint: https://thanos-receive-thanos.apps.ci-ln-w3ydddb-76ef8.origin-ci-int-aws.dev.rhcloud.com/api/v1/receive
auth:
authenticator: bearertokenauth
tls:
insecure: false
ca_file: /conf/ca/ca.crt
logging:
verbosity: detailed
jaeger:
endpoint: "localhost:14250" # Jaeger service port-forwarded from remote (local) machine
tls:
insecure: true
service:
telemetry:
metrics:
level: detailed
address: 0.0.0.0:9999
pipelines:
metrics:
receivers: [prometheus]
processors: [batch]
exporters: [prometheusremotewrite, logging]
traces:
receivers: [otlp]
processors: [batch]
exporters: [jaeger]