Skip to the content.

Metrics collection

Operator provides metrics of its operations in a format supported by Prometheus.

The metrics are exposed through HTTPS on port 8528 under path /metrics.

For a full list of available metrics, see here.

Check out examples directory examples/metrics for Services and ServiceMonitors definitions you can use to integrate with Prometheus through the Prometheus-Operator by CoreOS.


Integration with standard Prometheus installation (no TLS)

After creating operator deployment, you must configure Prometheus using a configuration file that instructs it about which targets to scrape. To do so, add a new scrape job to your prometheus.yaml config:

  - job_name:       'arangodb-operator'

    scrape_interval: 10s # scrape every 10 seconds.

    scheme: 'https'
      insecure_skip_verify: true

      - targets:
          - "<operator-endpoint-ip>:8528"

Integration with standard Prometheus installation (TLS)

By default, the operator uses self-signed certificate for its server API. To use your own certificate, you need to create k8s secret containing certificate and provide secret name to operator.

Create k8s secret (in same namespace where the operator is running):

kubectl create secret tls my-own-certificate --cert ./cert.crt  --key ./cert.key

Then edit the operator deployment definition (kubectl edit deployments.apps) to use your secret for its server API:

  # ...
  # ...
    - --server.tls-secret-name=my-own-certificate
    # ...

Wait for operator pods to restart.

Now update Prometheus config to use your certificate for operator scrape job:

  # if you are using self-signed certificate, just specify CA certificate:
  ca_file: /etc/prometheus/rootCA.crt
  # otherwise, specify the generated client certificate and key:
  cert_file: /etc/prometheus/cert.crt
  key_file: /etc/prometheus/cert.key

Integration with Prometheus Operator

Assuming that you have Prometheus Operator installed in your cluster (monitoring namespace), and kube-arangodb installed in default namespace, you can easily configure the integration with ArangoDB operator.

The easiest way to do that is to create new a ServiceMonitor:

kind: ServiceMonitor
  name: arango-deployment-operator
  namespace: monitoring
    prometheus: kube-prometheus
    matchLabels: kube-arangodb
    - default
  - port: server
    scheme: https
      insecureSkipVerify: true

You also can see the example of Grafana dashboard at examples/metrics folder of this repo.

ArangoDB metrics

The operator can run sidecar containers for ArangoDB deployments of type Cluster which expose metrics in Prometheus format. Edit your ArangoDeployment resource, setting spec.metrics.enabled to true to enable ArangoDB metrics:

    enabled: true

The operator will run a sidecar container for every cluster component. In addition to the sidecar containers the operator will deploy a Service to access the exporter ports (from within the k8s cluster), and a resource of type ServiceMonitor, provided the corresponding custom resource definition is deployed in the k8s cluster. If you are running Prometheus in the same k8s cluster with the Prometheus operator, this will be the case. The ServiceMonitor will have the following labels set:

app: arangodb
arango_deployment: YOUR_DEPLOYMENT_NAME
context: metrics
metrics: prometheus

This makes it possible to configure your Prometheus deployment to automatically start monitoring on the available Prometheus feeds. To this end, you must configure the serviceMonitorSelector in the specs of your Prometheus deployment to match these labels. For example:

      metrics: prometheus

would automatically select all pods of all ArangoDB cluster deployments which have metrics enabled.

By default, the sidecar metrics exporters are using TLS for all connections. You can disable the TLS by specifying

    enabled: true
    tls: false

You can fine-tune the monitored metrics by specifying ArangoDeployment annotations. Example:

  annotations: 'true' '9101' '5s'

See the Metrics HTTP API documentation for the metrics exposed by ArangoDB deployments.