Skip to content

Assumptions (5/5/2022)💣

  • Running using BigBang branch https://repo1.dso.mil/platform-one/big-bang/bigbang/-/tree/loki-enterprise
  • Running using Loki branch https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/loki/-/tree/feature/adjustable-service-ports

Setup💣

Installation💣

GEL Configuration in Grafana💣

  • Navigate to https://grafana.bigbang.dev/plugins/grafana-enterprise-logs-app
  • Populate fields with:
  • Access token: Admin token from kubectl get secret/gel-admin-token -n logging -o json | jq -r '.data.token' | base64 --decode
  • Grafana Enterprise Logs URL: http://logging-loki-gel-gateway.logging.svc.cluster.local
  • Click “Enable”
  • Navigate to https://grafana.bigbang.dev/a/grafana-enterprise-logs-app?path=tenants
  • Click Create Tenant, and create a new Tenant

Create Policy/Token for Promtail💣

  • Navigate to https://grafana.bigbang.dev/a/grafana-enterprise-logs-app?path=access-policies and create an access policy with the logs:write scope, ensure you’ve selected the tenant you just created.
  • Now create a token for that access policy by clicking ‘Add Token’ on the policy name. Copy the token and save it for the next step.

Promtail Configuration💣

  • Uncomment the promtail section in the Values
  • Set basic_auth.password to the token created above and use the tenant name as the username.
  • Upgrade the BigBang Helm installation to enable promtail

For example:

promtail:
  enabled: true
  values:
    config:
      snippets:
        extraClientConfigs: |
          basic_auth:
            username: borg
            password: cHJvbXRhaWwtcHJvbXRhaWw6ODVzfiM6KkAvOjleMjNWNjNyODRZOFxf
          tenant_id: borg
          external_labels:
            environment: dev

Create Grafana Datasource💣

  • Navigate to https://grafana.bigbang.dev/a/grafana-enterprise-logs-app?path=access-policies and create an access policy, ensuring to tick the box that you intend to create a data source with this polcy. It should auto populate the required scopes.
  • Click ‘Add Token’, and then click ‘Create’, and then click ‘Create a datasource’ which will create a new datasource pre-configured to use the token.

Future Considerations💣

  • Grafana Enterprise plugin should be configured automatically, which is possible, but enterprise plugin properites are undocumented and the admin token is not known until a post-install job is run.
  • Promtail configuration to set auth and tenant info should be automatic, but this depends on the addition of a job to bootstrap a tenant and create a policy plus token.
  • Loki VirtualService for external cluster access.
  • Memberlist seems to be finicky in AWS with atypical internal subnets. See Here

Values💣

monitoring:
  enabled: true
  grafana:
    enterprise:
      enabled: true
      licenseContents: <GEX License>

loki:
  # -- Toggle deployment of Loki.
  enabled: true

  # -- Loki architecture.  Options are monolith and scalable
  strategy: scalable

  values:
    enterprise:
      enabled: true
      license:
        contents: <GEL LICENSE>
        # Must match cluster name in GEL license
        cluster_name: <LICENSE CLUSTER NAME>
    gateway:
      enabled: true
      service:
        port: 3101
    minio:
      tenants:
        buckets:
          - name: loki-logs
          - name: loki-admin

    read:
      replicas: 1
    write:
      replicas: 1

    loki:
      storage:
        endpoint: minio.logging.svc.cluster.local
        bucketnames:
          chunks: loki-logs
          admin: loki-amin
        access_key_id: minio
        secret_access_key: minio123

# promtail:
#   enabled: true
#   values:
#     config:
#       snippets:
#         extraClientConfigs: |
#           basic_auth:
#             username: <TENANT_NAME>
#             password: <TOKEN>
#           tenant_id: <TENANT_NAME>
#           external_labels:
#             environment: dev

addons:
  minioOperator:
    enabled: true

Last update: 2022-08-22 by Ryan Garcia