apiVersion: apps/v1 kind: Deployment metadata: name: prometheus namespace: monitoring labels: app: prometheus spec: replicas: 1 selector: matchLabels: app: prometheus template: metadata: labels: app: prometheus spec: serviceAccountName: prometheus containers: - name: prometheus image: prom/prometheus:latest args: - "--config.file=/etc/prometheus/prometheus.yml" - "--storage.tsdb.path=/prometheus" - "--storage.tsdb.retention.time=1d" - "--web.enable-lifecycle" ports: - containerPort: 9090 name: web volumeMounts: - name: prometheus-config-volume mountPath: /etc/prometheus - name: prometheus-storage mountPath: /prometheus resources: requests: memory: "500Mi" cpu: "200m" limits: memory: "1Gi" cpu: "500m" volumes: - name: prometheus-config-volume persistentVolumeClaim: claimName: prometheus-pvc - name: prometheus-storage emptyDir: medium: Memory sizeLimit: 256Mi --- apiVersion: v1 kind: PersistentVolumeClaim metadata: name: prometheus-pvc namespace: monitoring annotations: nfs.io/storage-path: "prometheus-config" spec: storageClassName: "nfs-client" accessModes: - ReadWriteOnce resources: requests: storage: 1Gi --- # Service URL - http://prometheus.monitoring.svc.cluster.local:9090 apiVersion: v1 kind: Service metadata: name: prometheus namespace: monitoring labels: app: prometheus spec: ports: - name: web port: 9090 targetPort: web selector: app: prometheus type: ClusterIP --- apiVersion: v1 kind: ServiceAccount metadata: name: prometheus namespace: monitoring labels: app: prometheus --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: prometheus namespace: monitoring labels: app: prometheus rules: - apiGroups: [""] resources: - nodes - nodes/proxy - services - endpoints - pods verbs: ["get", "list", "watch"] - apiGroups: ["extensions"] resources: - ingresses verbs: ["get", "list", "watch"] - apiGroups: ["networking.k8s.io"] resources: - ingresses verbs: ["get", "list", "watch"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: prometheus namespace: monitoring labels: app: prometheus roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: prometheus subjects: - kind: ServiceAccount name: prometheus namespace: monitoring