-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Amazon Managed Prometheus scraper support #2865
Comments
after looking into this a bit more, I don't know how beneficial it will be to add to this module (this module is already quite large). There isn't a tight integration between this resource and the EKS module, and there is this one caveat listed on the provider docs
I'm not saying we won't add this - but for right now, we're going to wait and evaluate. Cluster access management was recently launched and support is being added in #2858, but we'll see how the AMP team wants to handle this scraper authentication (i.e. - manually by users specifying something, or through an SLR like EMR and Batch do, etc.) |
The trouble I am running into is there doesn't appear to be a pure TF way of using AMP's scraper. AWS's wants users to use Without being able to do this in TF only, the AMP scraper is basically unusable, and since it only works with EKS, I dont know what other module would be suitable to add it to. What I would like to see is a simple argument like |
yes, I totally agree and I can elaborate a bit more on whats required and what I am looking for from service support before adding it natively here To start, module "eks" {
source = "terraform-aws-modules/eks/aws"
version = "~> 19.0"
... Truncated for brevity
# aws-auth configmap
manage_aws_auth_configmap = true
aws_auth_roles = [
{
rolearn = "<ROLE-ARN>"
username = "aps-collector-user"
groups = ["system:masters"] # I don't know which groups the collector needs to use, the docs seem to be lacking this info
},
]
} With the recent features launches for pod identity and cluster access management, I suspect addons like this will have an improved user experience. With cluster access management, it should be possible for the addons to create all of this in the background to where the user experience is simply deploying the addon and users provide the IAM role the addon will utilize. When that happens, adding the collector should be a matter of simply adding the collector Terraform resource and the ability to create the appropriate IAM role and policy used by the collector and map that to the cluster. But for now, we are removing all resources that interact with the Kubernetes API from this module due to the numerous issues with that approach (i.e. - replacing |
Thanks for the reply! What I meant by the Overall it seems this service on AWS's side isn't quite ready for primetime... |
This issue has been automatically marked as stale because it has been open 30 days |
This issue was automatically closed because of stale in 10 days |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Is your request related to a new offering from AWS?
Is this functionality available in the AWS provider for Terraform? See CHANGELOG.md, too.
5.32.0
Is your request related to a problem? Please describe.
N/A.
Describe the solution you'd like.
Implement support for creating and using AMP scrapers.
Describe alternatives you've considered.
N/A
Additional context
Amazon Managed Service for Prometheus launches an agentless collector for Prometheus metrics from Amazon EKS
Resource: aws_prometheus_scraper
The text was updated successfully, but these errors were encountered: