Add Grafana Alloy configuration files and update examples

- Introduced detailed configuration guidelines in alloy.instructions.md
- Added general instructions for project structure in general.instructions.md
- Created config.yaml for NAMU-PC with target hostnames
- Implemented example.alloy and openwrt.alloy for service discovery and scraping
- Added alloy_seed.json for initial configuration state
- Developed demo.alloy for comprehensive monitoring setup
- Established std.alloy for repository path formatting and host configuration loading
- Updated test.alloy to utilize new host configuration loading
This commit is contained in:
2025-08-01 16:25:31 +03:00
parent ad77d5808a
commit fa57353a6e
9 changed files with 621 additions and 0 deletions

View File

@@ -0,0 +1,114 @@
---
applyTo: '**/*.alloy'
---
# Grafana Alloy Configuration Guidelines
## Component Naming Conventions
### Discovery Components
- HTTP discovery: `{service}_exporter_dynamic`
- Relabel discovery: `{service}_exporter_with_cluster`
### Scrape Jobs
- Component name: `metrics_integrations_integrations_{service}`
- Job name: `integrations/{service}`
### Remote Write
- Component name: `metrics_service`
- Always forward to Grafana Cloud endpoint
## Configuration Pipeline Pattern
Every monitoring target must follow this 3-stage pipeline:
```alloy
// 1. Discovery Stage
discovery.http "{service}_exporter_dynamic" {
url = "http://{service}-{env}.{domain}:8765/sd/prometheus/sd-config?service={service}-exporter"
}
// 2. Labeling Stage
discovery.relabel "{service}_exporter_with_cluster" {
targets = discovery.http.{service}_exporter_dynamic.targets
rule {
target_label = "{service}_cluster" // or appropriate cluster label
replacement = "{environment_id}" // hardcoded environment identifier
}
}
// 3. Scraping Stage
prometheus.scrape "metrics_integrations_integrations_{service}" {
targets = discovery.relabel.{service}_exporter_with_cluster.output
forward_to = [prometheus.remote_write.metrics_service.receiver]
job_name = "integrations/{service}"
}
```
## Environment Configuration
### Service Discovery URLs
- Pattern: `http://{service}-{env}.{domain}:8765/sd/prometheus/sd-config?service={service}-exporter`
- Port 8765 is standard for HTTP SD endpoints
- Always use query parameter `service={service}-exporter`
### Authentication & Secrets
- Use `sys.env("VARIABLE_NAME")` for sensitive data
- Standard variables:
- `GCLOUD_RW_API_KEY` for Grafana Cloud API key
- Never hardcode passwords or API keys
### Cluster Labeling
- Always add cluster/environment labels via `discovery.relabel`
- Use descriptive cluster names (e.g., "gr7", "prod", "staging")
- Cluster labels help with multi-environment visibility
## Remote Write Configuration
Standard remote write configuration:
```alloy
prometheus.remote_write "metrics_service" {
endpoint {
url = "https://prometheus-prod-24-prod-eu-west-2.grafana.net/api/prom/push"
basic_auth {
username = "1257735" // Grafana instance ID
password = sys.env("GCLOUD_RW_API_KEY")
}
}
}
```
## Code Style Guidelines
### Comments
- Add descriptive comments above each component
- Explain the purpose, not the syntax
- Use format: `// {Action description}`
### Formatting
- Use tabs for indentation
- One empty line between components
- Align parameters vertically when reasonable
### Component References
- Always reference by full component path: `discovery.http.component_name.targets`
- Use descriptive variable names in targets/forward_to chains
## Error Prevention
### Common Mistakes to Avoid
- Don't hardcode service discovery URLs without environment variables
- Don't skip the relabel stage - always add cluster labels
- Don't use generic job names - follow `integrations/{service}` pattern
- Don't forget to forward metrics to remote write endpoint
### Validation Checklist
- [ ] Service discovery URL uses correct pattern
- [ ] Relabel adds appropriate cluster/environment labels
- [ ] Scrape job follows naming convention
- [ ] Metrics are forwarded to remote write
- [ ] No hardcoded secrets
- [ ] Comments explain component purpose

View File

@@ -0,0 +1,126 @@
---
applyTo: '**'
---
# Grafana Alloy Configuration Project
## Project Overview
This project contains Grafana Alloy configurations for monitoring infrastructure across multiple environments. The architecture supports dynamic service discovery with environment-specific labeling and centralized metrics collection.
## Directory Structure
### Environment Organization
```
/
├── README.md
├── .github/
│ └── instructions/
├── {Environment}/
│ └── {environment}.alloy
```
### Environment Naming
- Use descriptive directory names (e.g., `OpenWRT/`, `Production/`, `Staging/`)
- One `.alloy` file per environment/deployment target
- File names should match environment purpose (e.g., `openwrt.alloy`, `production.alloy`)
## Monitoring Domains
### Current Implementations
- **Storage Monitoring**: Ceph cluster monitoring with dynamic discovery
- **Network Infrastructure**: OpenWRT-based network monitoring
### Adding New Domains
When expanding to new monitoring domains:
1. Create environment-specific directory if needed
2. Follow the established discovery → relabel → scrape pipeline
3. Ensure proper integration with existing remote write configuration
4. Add appropriate documentation
## Environment Configuration Strategy
### Multi-Environment Support
- Each environment has isolated configuration files
- Environment-specific service discovery endpoints
- Consistent labeling strategy across environments
- Centralized metrics collection in Grafana Cloud
### Service Discovery Integration
- HTTP-based service discovery for dynamic target discovery
- Standardized SD endpoint patterns across environments
- Port 8765 as standard for HTTP SD services
## Development Workflow
### Making Changes
1. **Identify Target Environment**: Determine which environment(s) need updates
2. **Follow Patterns**: Use existing configurations as templates
3. **Test Locally**: Validate Alloy syntax before deployment
4. **Document Changes**: Update README or comments as needed
### Adding New Services
1. **Service Discovery Setup**: Ensure HTTP SD endpoint exists
2. **Configuration Creation**: Follow 3-stage pipeline pattern
3. **Environment Labeling**: Add appropriate cluster/environment labels
4. **Integration Testing**: Verify metrics flow to Grafana Cloud
### Code Review Guidelines
- Verify naming conventions are followed
- Check for hardcoded secrets (should use environment variables)
- Ensure proper service discovery patterns
- Validate remote write configuration
## Security Considerations
### Secrets Management
- Never commit API keys or passwords to repository
- Use environment variables for all sensitive data
- Follow principle of least privilege for API access
### Network Security
- Service discovery endpoints should be on trusted networks
- Consider firewall rules for Alloy agents
- Use HTTPS where possible for external endpoints
## Integration Points
### Grafana Cloud
- **Metrics Storage**: Prometheus-compatible remote write
- **Authentication**: Instance ID + API key
- **Endpoint**: Fixed Grafana Cloud Prometheus URL
### Service Discovery
- **Protocol**: HTTP-based service discovery
- **Format**: Prometheus SD compatible JSON
- **Endpoints**: Environment-specific discovery services
### Monitoring Targets
- **Exporters**: Various Prometheus exporters (Ceph, Node, etc.)
- **Discovery**: Dynamic target discovery via HTTP SD
- **Labeling**: Environment and cluster-specific labels
## Documentation Standards
### File Documentation
- Each `.alloy` file should have header comments explaining purpose
- Complex configurations need inline comments
- Environment-specific notes in README sections
### Change Documentation
- Update README when adding new environments
- Document new service integrations
- Note any breaking changes or migration requirements
## Troubleshooting
### Common Issues
- **Service Discovery Failures**: Check HTTP SD endpoint availability
- **Authentication Errors**: Verify environment variables are set
- **Missing Metrics**: Confirm scrape job configuration and forwarding
### Debug Strategies
- Use Alloy's built-in debugging and logging
- Verify service discovery target resolution
- Check Grafana Cloud metrics ingestion
- Validate network connectivity to all endpoints

5
OpenWRT/config.yaml Normal file
View File

@@ -0,0 +1,5 @@
NAMU-PC:
targets:
- hostname: r1.kv40.kkarolis.lt
- hostname: r2.kv40.kkarolis.lt

19
OpenWRT/example.alloy Normal file
View File

@@ -0,0 +1,19 @@
import.file "openwrt" {
filename = "./openwrt.alloy"
}
openwrt.openwrt {
forward_to = [prometheus.remote_write.metrics_service.receiver]
}
prometheus.remote_write "metrics_service" {
endpoint {
url = "https://prometheus-prod-24-prod-eu-west-2.grafana.net/api/prom/push"
basic_auth {
username = "1257735"
password = sys.env("GCLOUD_RW_API_KEY")
}
}
}

7
OpenWRT/openwrt.alloy Normal file
View File

@@ -0,0 +1,7 @@
declare "openwrt" {
argument "forward_to" {
optinal = false
comment = "Where to forward the scraped metrics"
}
}

View File

@@ -0,0 +1 @@
{"UID":"960d41f5-980d-4a15-9eed-fa371d06f79d","created_at":"2025-08-01T16:05:56.172604+03:00","version":"v1.10.0"}

272
demo.alloy Normal file
View File

@@ -0,0 +1,272 @@
declare "ceph_linux" {
// Fetch targets dynamically from the HTTP SD endpoint
discovery.http "ceph_exporter_dynamic" {
url = "http://ceph-a.gr7.kkarolis.lt:8765/sd/prometheus/sd-config?service=ceph-exporter"
}
// Add ceph_cluster label to all discovered targets
discovery.relabel "ceph_exporter_with_cluster" {
targets = discovery.http.ceph_exporter_dynamic.targets
rule {
target_label = "ceph_cluster"
replacement = "gr7"
}
}
// Scrape all ceph-exporters (with ceph_cluster label)
prometheus.scrape "metrics_integrations_integrations_ceph" {
targets = discovery.relabel.ceph_exporter_with_cluster.output
forward_to = [prometheus.remote_write.metrics_service.receiver]
job_name = "integrations/ceph"
}
prometheus.remote_write "metrics_service" {
endpoint {
url = "https://prometheus-prod-24-prod-eu-west-2.grafana.net/api/prom/push"
basic_auth {
username = "1257735"
password = sys.env("GCLOUD_RW_API_KEY")
}
}
}
}
ceph_linux "default" { }
declare "linux_node_linux" {
discovery.relabel "integrations_node_exporter" {
targets = prometheus.exporter.unix.integrations_node_exporter.targets
rule {
target_label = "instance"
replacement = constants.hostname
}
rule {
target_label = "job"
replacement = "integrations/node_exporter"
}
}
prometheus.exporter.unix "integrations_node_exporter" {
disable_collectors = ["ipvs", "btrfs", "infiniband", "xfs", "zfs"]
filesystem {
fs_types_exclude = "^(autofs|binfmt_misc|bpf|cgroup2?|configfs|debugfs|devpts|devtmpfs|tmpfs|fusectl|hugetlbfs|iso9660|mqueue|nsfs|overlay|proc|procfs|pstore|rpc_pipefs|securityfs|selinuxfs|squashfs|sysfs|tracefs)$"
mount_points_exclude = "^/(dev|proc|run/credentials/.+|sys|var/lib/docker/.+)($|/)"
mount_timeout = "5s"
}
netclass {
ignored_devices = "^(veth.*|cali.*|[a-f0-9]{15})$"
}
netdev {
device_exclude = "^(veth.*|cali.*|[a-f0-9]{15})$"
}
}
prometheus.scrape "integrations_node_exporter" {
targets = discovery.relabel.integrations_node_exporter.output
forward_to = [prometheus.relabel.integrations_node_exporter.receiver]
}
prometheus.relabel "integrations_node_exporter" {
forward_to = [prometheus.remote_write.metrics_service.receiver]
rule {
source_labels = ["__name__"]
regex = "up|node_arp_entries|node_boot_time_seconds|node_context_switches_total|node_cpu_seconds_total|node_disk_io_time_seconds_total|node_disk_io_time_weighted_seconds_total|node_disk_read_bytes_total|node_disk_read_time_seconds_total|node_disk_reads_completed_total|node_disk_write_time_seconds_total|node_disk_writes_completed_total|node_disk_written_bytes_total|node_filefd_allocated|node_filefd_maximum|node_filesystem_avail_bytes|node_filesystem_device_error|node_filesystem_files|node_filesystem_files_free|node_filesystem_readonly|node_filesystem_size_bytes|node_intr_total|node_load1|node_load15|node_load5|node_md_disks|node_md_disks_required|node_memory_Active_anon_bytes|node_memory_Active_bytes|node_memory_Active_file_bytes|node_memory_AnonHugePages_bytes|node_memory_AnonPages_bytes|node_memory_Bounce_bytes|node_memory_Buffers_bytes|node_memory_Cached_bytes|node_memory_CommitLimit_bytes|node_memory_Committed_AS_bytes|node_memory_DirectMap1G_bytes|node_memory_DirectMap2M_bytes|node_memory_DirectMap4k_bytes|node_memory_Dirty_bytes|node_memory_HugePages_Free|node_memory_HugePages_Rsvd|node_memory_HugePages_Surp|node_memory_HugePages_Total|node_memory_Hugepagesize_bytes|node_memory_Inactive_anon_bytes|node_memory_Inactive_bytes|node_memory_Inactive_file_bytes|node_memory_Mapped_bytes|node_memory_MemAvailable_bytes|node_memory_MemFree_bytes|node_memory_MemTotal_bytes|node_memory_SReclaimable_bytes|node_memory_SUnreclaim_bytes|node_memory_ShmemHugePages_bytes|node_memory_ShmemPmdMapped_bytes|node_memory_Shmem_bytes|node_memory_Slab_bytes|node_memory_SwapTotal_bytes|node_memory_VmallocChunk_bytes|node_memory_VmallocTotal_bytes|node_memory_VmallocUsed_bytes|node_memory_WritebackTmp_bytes|node_memory_Writeback_bytes|node_netstat_Icmp6_InErrors|node_netstat_Icmp6_InMsgs|node_netstat_Icmp6_OutMsgs|node_netstat_Icmp_InErrors|node_netstat_Icmp_InMsgs|node_netstat_Icmp_OutMsgs|node_netstat_IpExt_InOctets|node_netstat_IpExt_OutOctets|node_netstat_TcpExt_ListenDrops|node_netstat_TcpExt_ListenOverflows|node_netstat_TcpExt_TCPSynRetrans|node_netstat_Tcp_InErrs|node_netstat_Tcp_InSegs|node_netstat_Tcp_OutRsts|node_netstat_Tcp_OutSegs|node_netstat_Tcp_RetransSegs|node_netstat_Udp6_InDatagrams|node_netstat_Udp6_InErrors|node_netstat_Udp6_NoPorts|node_netstat_Udp6_OutDatagrams|node_netstat_Udp6_RcvbufErrors|node_netstat_Udp6_SndbufErrors|node_netstat_UdpLite_InErrors|node_netstat_Udp_InDatagrams|node_netstat_Udp_InErrors|node_netstat_Udp_NoPorts|node_netstat_Udp_OutDatagrams|node_netstat_Udp_RcvbufErrors|node_netstat_Udp_SndbufErrors|node_network_carrier|node_network_info|node_network_mtu_bytes|node_network_receive_bytes_total|node_network_receive_compressed_total|node_network_receive_drop_total|node_network_receive_errs_total|node_network_receive_fifo_total|node_network_receive_multicast_total|node_network_receive_packets_total|node_network_speed_bytes|node_network_transmit_bytes_total|node_network_transmit_compressed_total|node_network_transmit_drop_total|node_network_transmit_errs_total|node_network_transmit_fifo_total|node_network_transmit_multicast_total|node_network_transmit_packets_total|node_network_transmit_queue_length|node_network_up|node_nf_conntrack_entries|node_nf_conntrack_entries_limit|node_os_info|node_sockstat_FRAG6_inuse|node_sockstat_FRAG_inuse|node_sockstat_RAW6_inuse|node_sockstat_RAW_inuse|node_sockstat_TCP6_inuse|node_sockstat_TCP_alloc|node_sockstat_TCP_inuse|node_sockstat_TCP_mem|node_sockstat_TCP_mem_bytes|node_sockstat_TCP_orphan|node_sockstat_TCP_tw|node_sockstat_UDP6_inuse|node_sockstat_UDPLITE6_inuse|node_sockstat_UDPLITE_inuse|node_sockstat_UDP_inuse|node_sockstat_UDP_mem|node_sockstat_UDP_mem_bytes|node_sockstat_sockets_used|node_softnet_dropped_total|node_softnet_processed_total|node_softnet_times_squeezed_total|node_systemd_unit_state|node_textfile_scrape_error|node_time_zone_offset_seconds|node_timex_estimated_error_seconds|node_timex_maxerror_seconds|node_timex_offset_seconds|node_timex_sync_status|node_uname_info|node_vmstat_oom_kill|node_vmstat_pgfault|node_vmstat_pgmajfault|node_vmstat_pgpgin|node_vmstat_pgpgout|node_vmstat_pswpin|node_vmstat_pswpout|process_max_fds|process_open_fds"
action = "keep"
}
}
prometheus.remote_write "metrics_service" {
endpoint {
url = "https://prometheus-prod-24-prod-eu-west-2.grafana.net/api/prom/push"
basic_auth {
username = "1257735"
password = sys.env("GCLOUD_RW_API_KEY")
}
}
}
loki.source.journal "logs_integrations_integrations_node_exporter_journal_scrape" {
max_age = "24h0m0s"
relabel_rules = discovery.relabel.logs_integrations_integrations_node_exporter_journal_scrape.rules
forward_to = [loki.write.grafana_cloud_loki.receiver]
}
local.file_match "logs_integrations_integrations_node_exporter_direct_scrape" {
path_targets = [{
__address__ = "localhost",
__path__ = "/var/log/{syslog,messages,*.log}",
instance = constants.hostname,
job = "integrations/node_exporter",
}]
}
discovery.relabel "logs_integrations_integrations_node_exporter_journal_scrape" {
targets = []
rule {
source_labels = ["__journal__systemd_unit"]
target_label = "unit"
}
rule {
source_labels = ["__journal__boot_id"]
target_label = "boot_id"
}
rule {
source_labels = ["__journal__transport"]
target_label = "transport"
}
rule {
source_labels = ["__journal_priority_keyword"]
target_label = "level"
}
}
loki.source.file "logs_integrations_integrations_node_exporter_direct_scrape" {
targets = local.file_match.logs_integrations_integrations_node_exporter_direct_scrape.targets
forward_to = [loki.write.grafana_cloud_loki.receiver]
}
loki.write "grafana_cloud_loki" {
endpoint {
url = "https://logs-prod-012.grafana.net/loki/api/v1/push"
basic_auth {
username = "727913"
password = sys.env("GCLOUD_RW_API_KEY")
}
}
}
}
linux_node_linux "default" { }
declare "self_monitoring_logs_linux" {
// THIS IS A GENERATED REMOTE CONFIGURATION.
//
// * You can edit the contents and matchers for this configuration without them being overwritten.
// * If you delete ALL generated configurations, the latest default versions will be recreated.
// * This configuration requires the following environment variables to be set wherever alloy is running:
// * GCLOUD_RW_API_KEY: The Grafana Cloud API key with write access to Loki.
// * GCLOUD_FM_COLLECTOR_ID: A unique collector ID matching the remotecfg id argument value.
// Write logs to your Grafana Cloud Loki instance.
loki.write "grafana_cloud_loki" {
endpoint {
url = "https://logs-prod-012.grafana.net/loki/api/v1/push"
basic_auth {
username = "727913"
password = sys.env("GCLOUD_RW_API_KEY")
}
}
}
// Read Alloy logs when running as a systemd service with the following additional labels:
// * job: "integrations/alloy" is compatible with Grafana Cloud's Alloy Health Integrations.
// * collector_id: The unique collector ID matching the remotecfg id argument value.
// Used to match collector-specific metrics to power the 'Collector
// Health' section of the Fleet Management UI.
loki.source.journal "alloy_logs_unit" {
matches = "_SYSTEMD_UNIT=alloy.service"
forward_to = [loki.write.grafana_cloud_loki.receiver]
labels = {"job" = "integrations/alloy", "collector_id" = sys.env("GCLOUD_FM_COLLECTOR_ID")}
}
// Read Alloy logs from syslog with the following additional labels:
// * job: "integrations/alloy" is compatible with Grafana Cloud's Alloy Health Integrations.
// * collector_id: The unique collector ID matching the remotecfg id argument value.
// Used to match collector-specific metrics to power the 'Collector
// Health' section of the Fleet Management UI.
loki.source.journal "alloy_logs_tag" {
matches = "SYSLOG_IDENTIFIER=alloy"
forward_to = [loki.write.grafana_cloud_loki.receiver]
labels = {"job" = "integrations/alloy", "collector_id" = sys.env("GCLOUD_FM_COLLECTOR_ID")}
}
}
self_monitoring_logs_linux "default" { }
declare "self_monitoring_metrics" {
// THIS IS A GENERATED REMOTE CONFIGURATION.
//
// * You can edit the contents and matchers for this configuration without them being overwritten.
// * If you delete ALL generated configurations, the latest default versions will be recreated.
// * This configuration requires the following environment variables to be set wherever alloy is running:
// * GCLOUD_RW_API_KEY: The Grafana Cloud API key with write access to Loki.
// * GCLOUD_FM_COLLECTOR_ID: A unique collector ID matching the remotecfg id argument value.
// Export Alloy metrics in memory.
prometheus.exporter.self "integrations_alloy_health" { }
// Target Alloy metrics with the following additional labels:
// * job: "integrations/alloy" is compatible with Grafana Cloud's Alloy Health Integrations.
// * collector_id: The unique collector ID matching the remotecfg id argument value.
// Used to match collector-specific metrics to power the 'Collector
// Health' section of the Fleet Management UI.
// * instance: The hostname of the machine running Alloy.
discovery.relabel "integrations_alloy_health" {
targets = prometheus.exporter.self.integrations_alloy_health.targets
rule {
action = "replace"
target_label = "collector_id"
replacement = sys.env("GCLOUD_FM_COLLECTOR_ID")
}
rule {
target_label = "instance"
replacement = constants.hostname
}
rule {
target_label = "job"
replacement = "integrations/alloy"
}
}
// Scrape Alloy metrics and forward them to the remote write component.
prometheus.scrape "integrations_alloy_health" {
targets = array.concat(
discovery.relabel.integrations_alloy_health.output,
)
forward_to = [prometheus.relabel.integrations_alloy_health.receiver]
job_name = "integrations/alloy"
}
// Select only the metrics that are relevant to the Alloy Health Integrations.
prometheus.relabel "integrations_alloy_health" {
forward_to = [prometheus.remote_write.default.receiver]
rule {
source_labels = ["__name__"]
regex = "alloy_build_info|alloy_component_controller_running_components|alloy_component_dependencies_wait_seconds|alloy_component_dependencies_wait_seconds_bucket|alloy_component_evaluation_seconds|alloy_component_evaluation_seconds_bucket|alloy_component_evaluation_seconds_count|alloy_component_evaluation_seconds_sum|alloy_component_evaluation_slow_seconds|alloy_config_hash|alloy_resources_machine_rx_bytes_total|alloy_resources_machine_tx_bytes_total|alloy_resources_process_cpu_seconds_total|alloy_resources_process_resident_memory_bytes|cluster_node_gossip_health_score|cluster_node_gossip_proto_version|cluster_node_gossip_received_events_total|cluster_node_info|cluster_node_lamport_time|cluster_node_peers|cluster_node_update_observers|cluster_transport_rx_bytes_total|cluster_transport_rx_packet_queue_length|cluster_transport_rx_packets_failed_total|cluster_transport_rx_packets_total|cluster_transport_stream_rx_bytes_total|cluster_transport_stream_rx_packets_failed_total|cluster_transport_stream_rx_packets_total|cluster_transport_stream_tx_bytes_total|cluster_transport_stream_tx_packets_failed_total|cluster_transport_stream_tx_packets_total|cluster_transport_streams|cluster_transport_tx_bytes_total|cluster_transport_tx_packet_queue_length|cluster_transport_tx_packets_failed_total|cluster_transport_tx_packets_total|go_gc_duration_seconds_count|go_goroutines|go_memstats_heap_inuse_bytes|otelcol_exporter_send_failed_spans_total|otelcol_exporter_sent_spans_total|otelcol_processor_batch_batch_send_size_bucket|otelcol_processor_batch_metadata_cardinality|otelcol_processor_batch_timeout_trigger_send_total|otelcol_receiver_accepted_spans_total|otelcol_receiver_refused_spans_total|prometheus_remote_storage_bytes_total|prometheus_remote_storage_highest_timestamp_in_seconds|prometheus_remote_storage_metadata_bytes_total|prometheus_remote_storage_queue_highest_sent_timestamp_seconds|prometheus_remote_storage_samples_failed_total|prometheus_remote_storage_samples_retried_total|prometheus_remote_storage_samples_total|prometheus_remote_storage_sent_batch_duration_seconds_bucket|prometheus_remote_storage_sent_batch_duration_seconds_count|prometheus_remote_storage_sent_batch_duration_seconds_sum|prometheus_remote_storage_shards|prometheus_remote_storage_shards_max|prometheus_remote_storage_shards_min|prometheus_remote_write_wal_samples_appended_total|prometheus_remote_write_wal_storage_active_series|rpc_server_duration_milliseconds_bucket|scrape_duration_seconds|up"
action = "keep"
}
}
// Write metrics to your Grafana Cloud Prometheus instance.
prometheus.remote_write "default" {
endpoint {
url = "https://prometheus-prod-24-prod-eu-west-2.grafana.net/api/prom/push"
basic_auth {
username = "1257735"
password = sys.env("GCLOUD_RW_API_KEY")
}
}
}
}
self_monitoring_metrics "default" { }

63
lib/std.alloy Normal file
View File

@@ -0,0 +1,63 @@
declare "fmt_repository_path" {
argument "repository" {
optional = true
comment = "The repository to use for url"
default = "https://git.kkarolis.lt/karolis/Alloy/"
}
argument "type" {
optional = true
comment = "Type of access to the repository, e.g. 'raw' for raw files"
default = "raw"
}
argument "branch" {
optional = true
comment = "The branch to use for the repository"
default = "main"
}
argument "path" {
optional = false
comment = "The path to the file in the repository"
default = ""
}
export "url" {
value = string.format("%s%s/branch/%s/%s", argument.repository.value, argument.type.value, argument.branch.value, argument.path.value)
}
}
declare "load_host_config" {
argument "host" {
optional = true
comment = "The host to load the configuration for"
default = sys.env("GCLOUD_FM_COLLECTOR_ID")
}
argument "config_file" {
optional = false
comment = "The path to the configuration file"
}
argument "repository" {
optional = true
comment = "The repository to use for loading the configuration"
default = "https://git.kkarolis.lt/karolis/Alloy/"
}
fmt_repository_path "config_file_url" {
repository = argument.repository.value
type = "raw"
branch = "main"
path = argument.config_file.value
}
remote.http "config_file" {
url = fmt_repository_path.config_file_url.url
}
export "config" {
value = encoding.from_yaml(remote.http.config_file.content)[argument.host.value]
}
}

14
test.alloy Normal file
View File

@@ -0,0 +1,14 @@
livedebugging {
enabled = true
}
import.file "libstd" {
filename = "lib/std.alloy"
}
libstd.load_host_config "load_config" {
host = "NAMU-PC"
config_file = "OpenWRT/config.yaml"
}