FluentD, Prometheus and Grafana
To configure Prometheus and Grafana to gather metrics from Artifactory through the use of FluentD, refer to the log analytics repository. The repository contains a file artifactory-values.yaml
that can be used to deploy Prometheus, Service Monitor, and Grafana with this chart.
Configuring the NetworkPolicy
The NetworkPolicy specifies which Ingress and Egress are allowed in this namespace. It is encouraged to be more specific whenever possible to increase system security.
In the networkpolicy
section of the values.yaml
file you can specify a list of NetworkPolicy objects.
For podSelector, Ingress and Egress, if nothing is provided then a default
- {}
is applied, which is to allow everything.A full (but very wide open) example that results in 2 NetworkPolicy objects being created:
networkpolicy: # Allows all Ingress and Egress to/from Artifactory. - name: artifactory podSelector: matchLabels: app: artifactory egress: - {} ingress: - {} # Allows connectivity from artifactory pods to postgresql pods, but no traffic leaving postgresql pod. - name: postgres podSelector: matchLabels: app: postgresql ingress: - from: - podSelector: matchLabels: app: artifactory