- job_name: ‘blackbox_tcp’
scrape_interval: 20s
metrics_path: /probe
params:
module: [tcp_connect]
consul_sd_configs:- server: ‘xxxx:8500’
services:- blackbox_tcp
relabel_configs:
- blackbox_tcp
- source_labels: [address]
target_label: __param_target - source_labels: [__meta_consul_service_address]
target_label: instance - target_label: address
replacement: xxxx:9115
- server: ‘xxxx:8500’
id唯一标识,name和promethues.yml中services一致
curl -X PUT -H “Content-Type: application/x-www-form-urlencoded” -H “X-Consul-Token: 8dc1eb67-1f5f-4e10-ad9d-5e58b047647c” -d ‘{“id”: “‘xxxxtcp443’”,“name”: “blackbox_tcp”,“address”: “xxxx”,“port”: 443,“tags”: [“node”],“checks”: [{“http”: “http://xxxx:9115/”,“interval”: “5s”}] }’ http://xxxx:8500/v1/agent/service/register
本文介绍了如何通过Prometheus的黑盒TCP检查和Consul SD配置,在服务'blackbox_tcp'上设置定期探测,并使用CURL命令注册服务实例,包括指定地址、端口和标签。
2027

被折叠的 条评论
为什么被折叠?



