tencent cloud

TencentCloud Managed Service for Prometheus

Product Introduction
Overview
Strengths
Use Cases
Concepts
Use Limits
Features
Service Regions
Purchase Guide
Billing Overview
Pay-as-You-Go (Postpaid)
Free Trial Introduction
Managed Collector Billing Introduction
Archive Storage Billing Introduction
Purchase Methods
Payment Overdue
Getting Started
Integration Guide
Scrape Configuration Description
Custom Monitoring
EMR Integration
Java Application Integration
Go Application Integration
Exporter Integration
Nacos Integration
Common Exporter
Health Check
Instructions for Installing Components in the TKE Cluster
Cloud Monitoring
Non-Tencent Cloud Host Monitoring
Read Cloud-Hosted Prometheus Instance Data via Remote Read
Agent Self-Service Access
Pushgateway Integration
Security Group Open Description
Operation Guide
Instance
TKE
Integration Center
Data Multi-Write
Recording Rule
Instance Diagnosis
Archive Storage
Alerting Rule
Tag
Access Control
Grafana
API Guide
TKE Metrics
Resource Usage and Billing Overview
Practical Tutorial
Migration from Self-Built Prometheus
Custom Integration with CVM
TKE Monitoring
Enabling Public Network Access for TKE Serverless Cluster
Connecting TMP to Local Grafana
Enabling Public Network Access for Prometheus Instances
Configuring a Public Network Address for a Prometheus Instance
Terraform
Terraform Overview
Managing Prometheus Instances Using Terraform
Managing the Integration Center of Prometheus Instances Using Terraform
Collecting Container Monitoring Data Using Terraform
Configuring Alarm Policies Using Terraform
FAQs
Basic Questions
Integration with TKE Cluster
Product Consulting
Use and Technology
Cloud Monitor FAQs
Service Level Agreement
TMP Policy
Privacy Policy
Data Processing And Security Agreement

Integration with TKE Cluster

PDF
Focus Mode
Font Size
Last updated: 2024-01-29 15:55:08

What should I do if I can't access the TKE cluster over the private network?

When installing an agent, you need to access TKE over the private network. If private network access is not enabled for the corresponding TKE cluster, the installation will fail. You can solve this problem by following the steps below:
1. Log in to the TKE console and select a container cluster in the corresponding region.
2. Enable Private Network Access under Basic Information > Cluster APIServer Information.

What should I do if the status of all kube-proxy collection targets is "Down"?

In TKE, the launch parameter --metrics-bind-address is not specified for kube-proxy, and the default listening address of the metrics service is 127.0.0.1; therefore, the agent cannot pull metrics by Pod IP. You can solve this problem by following the steps below:
1. Log in to the TKE console and select a container cluster in the corresponding region.
2. Go to Basic Information > Cluster APIServer Information > Connecting to Kubernetes cluster through Kubectl to configure Kubectl as instructed.
3. Run kubectl edit ds kube-proxy -n kube-system and add the launch parameter --metrics-bind-address=0.0.0.0 in spec.template.spec.containers.args.

What should I do if the status of all component collection targets on the master node in a dedicated TKE cluster is "Down"?

The inbound rule of the default security group of the master node in a dedicated TKE cluster does not allow access to the metrics ports of some components. You can solve this problem by following the steps below:
1. Log in to the Security Group console and select the corresponding region.
2. Enter tke-master-security-for-<tke cluster id> in the security group search box. For example, if the cluster ID is cls-xxx, then enter tke-master-security-for-cls-xxx.
3. Click the returned security group ID to enter the Edit Inbound Rule window.
4. The protocol port column of the rule to be edited should include TCP:60001,60002. Select the rules one by one and add ports 10249, 10252, 10251, 9100, and 9153 for the following purposes respectively:
10249: kube-proxy metrics port
10252: kube-controller-manager metrics port
10251: kube-scheduler metrics port
9100: node-exporter metrics port
9153: core-dns metrics port

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback