For claiming metrics from Traefik we have to adjust some configuration files.
Update the docker-compose.yml file of the Pangolin stack to expose metrics port 8082 for the Prometheus connection:
service: gerbil: ports: - 8082:8082
Docker’s NAT-based port publishing feature automatically exposes all ports: defined in docker-compose file. This behavior can bypass your host firewall settings, potentially exposing services that you did not intend to make public.
Please see complete warning about exposing ports.
Update the /config/traefik/traefik_config.yml file to include the following:
For claiming metrics from Crowdsec we have to adjust the docker compose files.
Update the docker-compose.yml file of the Pangolin stack to expose metrics port 6060 for the Prometheus connection:
service: crowdsec: ports: - 6060:6060
Docker’s NAT-based port publishing feature automatically exposes all ports: defined in the docker-compose file on all network interfaces. This behavior can bypass your host firewall settings, potentially exposing services that you did not intend to make public.
Please see complete warning about exposing ports.
Restart the Crowdsec container to apply the changes:
Docker’s NAT-based port publishing feature automatically exposes all ports: defined in the docker-compose file on all network interfaces. This behavior can bypass your host firewall settings, potentially exposing services that you did not intend to make public.
Please see complete warning about exposing ports.
Create a prometheus.yml file in the /config/prometheus directory with the following content:
Docker’s NAT-based port publishing feature automatically exposes all ports: defined in the docker-compose file on all network interfaces. This behavior can bypass your host firewall settings, potentially exposing services that you did not intend to make public.
Please see complete warning about exposing ports.
Start the Grafana container:
sudo docker compose up -d
Default login credentials for Grafana admin user is admin:admin.