Coder Social home page Coder Social logo

onzack / grafana-dashboards Goto Github PK

View Code? Open in Web Editor NEW
91.0 4.0 13.0 3.66 MB

Grafana Dashboards for Kubernetes, OpenShift and other systems

License: Apache License 2.0

grafana monitoring grafana-dashboard prometheus kubernetes falco longhorn openshift observability opnsense velero

grafana-dashboards's Introduction

Grafana Dashboards

ONZACK Grafana Dashboards for Kubernetes, OpenShift and other systems.

Kubernetes / OpenShift Base Monitoring

ONZACK worked with LGT Bank in Liechtenstein to create two Grafana dashboards for Kubernetes and OpenShift. LGT Bank and ONZACK have agreed to make the dashboards available to the Kubernetes and OpenShift community so that everyone can benefit from the dashboards. ONZACK will continue to maintain and develop the dashboards in the future.

Cluster Monitoring

ONZACK Cluster Monitoring

  • Download ONZACK Cluster Monitoring Dashboard without recording rules
  • Download ONZACK Cluster Monitoring Dashboard with recording rules
  • Download Prometheus Recording Rules for ONZACK Cluster Monitoring Dashboard

Troubleshooting

  • When using our dashboard with kube-prometheus-stack installed with helm and the custom rules are installed as yaml files, set ruleSelectorNilUsesHelmValues: false in the values.yaml for prometheus to load them.
  • Make sure your nodes are labeled correctly:
kubectl label node <YOUR-WORKERNODE> node-role.kubernetes.io/worker=worker
kubectl label node <YOUR-CONTROLPLANENODE> node-role.kubernetes.io/control-plane=control-plane

Namespace Monitoring

ONZACK Namespace Monitoring

  • Download ONZACK Namespace Monitoring Dashboard without recording rules
  • Download ONZACK Namespace Monitoring Dashboard with recording rules
  • Download Prometheus Recording Rules for ONZACK Namespace Monitoring Dashboard

Falco Monitoring

ONZACK Falco Monitoring

Falco, the cloud-native runtime security project, is the de facto Kubernetes threat detection engine. This dashboard gives a good overview of the events generated by Falco.

Prerequisites

Longhorn Monitoring

ONZACK Longhorn Monitoring

Longhorn is a distributed block storage system for Kubernetes. This dashboard has been built to serve as an example for monitoring the Longhorn storage system.

Prerequisites

OPNsense & IDS/IPS Monitoring

ONZACK OPNsense Monitoring

Dashboards to monitor Firewall Rules & IDS/IPS potential Attacks.

Prerequisites

  • Loadbalancer to create virtual IP and to publish syslog ports (for example MetalLB)
  • Promtail or Grafana Agent to listen on these ports and ship the logs to Loki
  • Loki to index the logs
  • Grafana to visualize the logs (datasource Loki configured)
  • OPNsense syslog target configured

The Grafana Dashboard only works when your OPNsense IDS/IPS logs has a label job: syslog-ids and all other Firewall logs has a label job: syslog.

Promtail Helm chart example values:

config:
  lokiAddress: "http://loki-gateway/loki/api/v1/push"
  snippets:
    extraScrapeConfigs: |
      # Add an additional scrape config for syslog
      - job_name: syslog
        syslog:
          listen_address: 0.0.0.0:514
          idle_timeout: 60s
          label_structured_data: yes
          labels:
            job: "syslog"
        relabel_configs:
          - source_labels: ['__syslog_message_hostname']
            target_label: 'host'
      # Add an additional scrape config for OPNsense IDS alerts shipped over syslog
      - job_name: syslog-ids
        syslog:
          listen_address: 0.0.0.0:1514
          idle_timeout: 60s
          label_structured_data: yes
          labels:
            job: "syslog-ids"
        relabel_configs:
          - source_labels: ['__syslog_message_hostname']
            target_label: 'host'

extraPorts:
  # Add an additional port for syslog
  # serviceType "LoadBalancer" only works if you have deployed an Loadbalancer for example MetalLB
  syslog:
    name: tcp-syslog
    containerPort: 514
    protocol: TCP
    service:
      type: LoadBalancer
      #clusterIP: null
      port: 514
      #externalIPs: []
      #nodePort: 32682
      #annotations: {}
      #labels: {}
      #loadBalancerIP: null
      #loadBalancerSourceRanges: []
      #externalTrafficPolicy: null
  # Add an additional port for OPNsense IDS alerts shipped over syslog
  # serviceType "LoadBalancer" only works if you have deployed an Loadbalancer for example MetalLB
  syslog-ids:
    name: tcp-syslog-ids
    containerPort: 1514
    protocol: TCP
    service:
      type: LoadBalancer
      #clusterIP: null
      port: 1514
      #externalIPs: []
      #nodePort: 32682
      #annotations: {}
      #labels: {}
      #loadBalancerIP: null
      #loadBalancerSourceRanges: []
      #externalTrafficPolicy: null

Velero Monitoring

ONZACK Velero Monitoring

Velero is an open source tool to safely backup and restore, perform disaster recovery, and migrate Kubernetes cluster resources and persistent volumes. This dashboard gives a good overview of the events and performance of Velero.

Prerequisites

Systemd Monitoring

ONZACK Systemd Monitoring

Monitor state of systemd services running on the node.

Prerequisites

  • Node Exporter with Systemd collector enabled (Note: in order to collect metrics you need to mount /var/run/dbus/system_bus_socket into node-exporter and allow read access in Apparmor, if enabled)

Licence

Copyright 2023 ONZACK AG

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

grafana-dashboards's People

Contributors

dmlabs avatar i5okie avatar lucatr avatar meissullo avatar r-studio avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar

grafana-dashboards's Issues

Synchronize Grafana Marketplace with this Github

Hello,

Could you please synchronize the two dashboards on Grafana Marketplace with the current versions published here?

Likewise, publishing the two versions that don't require Prometheus Rules would be nice :-)

Best
-xmj

Falco Overview dashboard uid conflict

Hello,

I guessed, but I'm not sure, that you are the authors of the Falco Overview Grafana dashboard, which is accessible from Grafana Dashboards catalog: https://grafana.com/grafana/dashboards/17319-falco/

I use Grafana and Falco so I wanted to import your dashboard and the one from Falco Exporter.

I import those dashboards from Grafana's Helm chart, by using IDs for each dashboard (17319 for your's and 11914 for Falco exporter) without having to copy/paster JSON (for future updates, it will be easier).

But your dashboard and the one from Falco Exporter have the same uid (FvUFlfuZz) so it prevents me from importing both with the Grafana Helm chart.

I don't know how uids work but may it be possible to update your dashboard's uid so it does not conflict with Falco Exporter's one?

Thanks in advance for any help you cna give me.

Error in prometheus metrics

The queries are not correct? The original queries do not display the information, but if you correct them, the data starts to be displayed

From:

container_memory_working_set_bytes:sum{namespace=~"$namespace"}

To:

sum(container_memory_working_set_bytes{namespace="$namespace"})

Or do additional settings need to be made?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.