1. Configuration
Helmfile
Update the environments as required with their relevant file-paths of environment & secrets file and the namespace to be used.
In below config "demo" is the environment with default namespace being set & environment files being provided.
# config-as-code/helm/charts/monitoring/monitoring-helmfile.yaml
environments:
demo:
values:
- namespace: monitoring
- ../../../environments/egov-demo.yaml
- ../../../environments/egov-demo-secrets.yamlEnvironment Configuration
Grafana
GitHub OAuth App Creation
Follow the GitHub OAuth app
Homepage URL
https://<your_domain_name>Authorization callback URL
https://<your_domain_name>/monitoring/login/githubGenerate
Client ID&Client secret
Update
Client ID&Client secretin secrets config.# config-as-code/environments/egov-demo-secrets.yaml cluster-configs: secrets: grafana: clientID: <OAuth-key> clientSecret: <OAuth-token>Update environment config to allow GitHub organization & teams specific role-based access
# config-as-code/environments/egov-demo.yaml grafana: github: allowed_organizations: ["<organization>"] role_attribute_path: contains(groups[*], '@<organization>/<team>') && 'Viewer'
Loki Stack
Filesystem as a storage
AWS s3 as storage
Caution: Use the sub claim instead of aud when setting up Web Identity (OIDC) IAM roles to ensure correct identity matching.
Caution: Use the sub claim instead of aud when setting up Web Identity (OIDC) IAM roles to ensure correct identity matching.
Create AWS Web Identity (OIDC) IAM role with following policy.
Update s3 details & role ARN in below config.
Azure Blob Store as storage
Prometheus
Alerting
Slack Alerts
Email Alerts
Last updated
Was this helpful?