forked from aerospike/aerospike-prometheus-exporter
-
Notifications
You must be signed in to change notification settings - Fork 2
/
ape.toml
184 lines (138 loc) · 8.5 KB
/
ape.toml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
[Agent]
# Metrics Serving modes
enable_prometheus = true
enable_open_telemetry = false
# labels to add to the prometheus metrics for e.g. labels={zone="asia-south1-a", platform="google compute engine"}
labels = {latitude="0",longitude="0"}
# mention cloud provider (supported: aws, gcp, azure ) so exporter collects few details like region, zone etc.,
cloud_provider = ""
# metrics server timeout in seconds
timeout = 10
# support system statistics also
refresh_system_stats = false
# Exporter logging configuration
# Log file path (optional, logs to console by default)
# Level can be info|warning,warn|error,err|debug|trace ('info' by default)
log_file = ""
log_level = ""
# Exporter HTTPS (TLS) configuration
# HTTPS between Prometheus and Exporter
# TLS certificates.
# Supports below formats,
# 1. Certificate file path - "file:<file-path>"
# 2. Environment variable containing base64 encoded certificate - "env-b64:<environment-variable-that-contains-base64-encoded-certificate>"
# 3. Base64 encoded certificate - "b64:<base64-encoded-certificate>"
# Applicable to 'root_ca', 'cert_file' and 'key_file' configurations.
# Server certificate
cert_file = ""
# Private key associated with server certificate
key_file = ""
# Root CA to validate client certificates (for mutual TLS)
root_ca = ""
# a comma separated TLS Cipher suites to use, example: TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384
# Golang - refer documentation https://pkg.go.dev/crypto/tls#pkg-constants of golang CipherSuites for TLS >=1.2 (both supported and Insecure)
# NOTE: Cipher configuration is support only till TLS1.2 verison and not possible in TLS1.3
tls_cipher_suites = ""
# Passphrase for encrypted key_file. Supports below formats,
# 1. Passphrase directly - "<passphrase>"
# 2. Passphrase via file - "file:<file-that-contains-passphrase>"
# 3. Passphrase via environment variable - "env:<environment-variable-that-holds-passphrase>"
# 4. Passphrase via environment variable containing base64 encoded passphrase - "env-b64:<environment-variable-that-contains-base64-encoded-passphrase>"
# 5. Passphrase in base64 encoded form - "b64:<base64-encoded-passphrase>"
key_file_passphrase = ""
# prometheus binding port
bind = ":9145"
# Basic HTTP authentication for '/metrics'.
# Supports below formats,
# 1. Credential directly - "<credential>"
# 2. Credential via file - "file:<file-that-contains-credential>"
# 3. Credential via environment variable - "env:<environment-variable-that-contains-credential>"
# 4. Credential via environment variable containing base64 encoded credential - "env-b64:<environment-variable-that-contains-base64-encoded-credential>"
# 5. Credential in base64 encoded form - "b64:<base64-encoded-credential>"
basic_auth_username = ""
basic_auth_password = ""
[Agent.OpenTelemetry]
# NOTE: currently supports only gRPC endpoints
# OTel service-name
service_name = "aerospike-server-metrics-service"
# OTel Endpoint
endpoint = ""
# OTel SSL/TLS, for HTTPS endpoints
endpoint_tls_enabled = true
# OTel headers
headers = {}
# OTel server-stat fetch interval (default 15, not recommended to to reduce this)
server_stat_fetch_interval = 15
# OTel metric push interval (default 60, not recommended to to reduce this)
push_interval = 60
[Aerospike]
db_host = "localhost"
db_port = 3000
# TLS certificates.
# Supports below formats,
# 1. Certificate file path - "file:<file-path>"
# 2. Environment variable containing base64 encoded certificate - "env-b64:<environment-variable-that-contains-base64-encoded-certificate>"
# 3. Base64 encoded certificate - "b64:<base64-encoded-certificate>"
# Applicable to 'root_ca', 'cert_file' and 'key_file' configurations.
# root certificate file
root_ca = ""
# certificate file
cert_file = ""
# key file
key_file = ""
# Passphrase for encrypted key_file. Supports below formats,
# 1. Passphrase directly - "<passphrase>"
# 2. Passphrase via file - "file:<file-that-contains-passphrase>"
# 3. Passphrase via environment variable - "env:<environment-variable-that-holds-passphrase>"
# 4. Passphrase via environment variable containing base64 encoded passphrase - "env-b64:<environment-variable-that-contains-base64-encoded-passphrase>"
# 5. Passphrase in base64 encoded form - "b64:<base64-encoded-passphrase>"
key_file_passphrase = ""
# node TLS name for authentication
node_tls_name = ""
# Aerospike cluster security credentials.
# Supports below formats,
# 1. Credential directly - "<credential>"
# 2. Credential via file - "file:<file-that-contains-credential>"
# 3. Credential via environment variable - "env:<environment-variable-that-contains-credential>"
# 4. Credential via environment variable containing base64 encoded credential - "env-b64:<environment-variable-that-contains-base64-encoded-credential>"
# 5. Credential in base64 encoded form - "b64:<base64-encoded-credential>"
# Applicable to 'user' and 'password' configurations.
# database user
user = ""
# database password
password = ""
# authentication mode: internal (server authentication) [default], external (e.g., LDAP), pki.
auth_mode = ""
# timeout for sending commands to the server node in seconds
timeout = 5
# Number of histogram buckets to export for latency metrics. Bucket thresholds range from 2^0 to 2^16 (17 buckets).
# e.g. latency_buckets_count=5 will export first five buckets i.e. <=1ms, <=2ms, <=4ms, <=8ms and <=16ms.
# Default: 0 (export all threshold buckets).
latency_buckets_count = 0
# Order of context - namespace, set, latencies, node-stats, xdr, user, jobs, sindex
# Metrics Allowlist - If specified, only these metrics will be scraped. An empty list will exclude all metrics.
# Commenting out the below allowlist configs will disable metrics filtering (i.e. all metrics will be scraped).
# Metrics Blocklist - If specified, these metrics will be NOT be scraped. An empty list will include all metrics.
# Commenting out the below blocklist configs will disable metrics filtering (i.e. no metrics will be blocked/filtered).
# globbing pattern (wildcard) are allowd for allowlist and blocklist
# for example "batch_index_*_buffers"
# Namespace metrics allowlist, to control which Namespace metrics should be collected.
# namespace_metrics_allowlist = []
# namespace_metrics_blocklist = []
# set_metrics_allowlist = []
# set_metrics_blocklist = []
# Latencies histogram allowlist, to control which Histogram-name metrics should be collected.
# Note: globbing patterns (wildcard) are not supported for this latency metric configuration.
# latencies_metrics_allowlist = []
# latencies_metrics_blocklist = []
# node_metrics_allowlist = []
# node_metrics_blocklist = []
# Support only from Aerospike versions 5.0 and above
# xdr_metrics_allowlist = []
# xdr_metrics_blocklist = []
# User statistics are available in Aerospike 5.6+
# Note globbing patterns (wildcard) are not supported for this User configuration.
# user_metrics_users_allowlist = []
# user_metrics_users_blocklist = []
# sindex_metrics_allowlist = []
# sindex_metrics_blocklist = []