--- /dev/null
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: prometheus-server
+ labels:
+ app: strimzi
+rules:
+ - apiGroups: [""]
+ resources:
+ - nodes
+ - nodes/proxy
+ - services
+ - endpoints
+ - pods
+ verbs: ["get", "list", "watch"]
+ - apiGroups:
+ - extensions
+ resources:
+ - ingresses
+ verbs: ["get", "list", "watch"]
+ - nonResourceURLs: ["/metrics"]
+ verbs: ["get"]
+
+---
+apiVersion: v1
+kind: ServiceAccount
+metadata:
+ name: prometheus-server
+ labels:
+ app: strimzi
+
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: prometheus-server
+ labels:
+ app: strimzi
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: prometheus-server
+subjects:
+ - kind: ServiceAccount
+ name: prometheus-server
+ namespace: myproject
+
+---
+apiVersion: monitoring.coreos.com/v1
+kind: Prometheus
+metadata:
+ name: prometheus
+ labels:
+ app: strimzi
+spec:
+ replicas: 1
+ serviceAccountName: prometheus-server
+ podMonitorSelector:
+ matchLabels:
+ app: strimzi
+ serviceMonitorSelector: {}
+ resources:
+ requests:
+ memory: 400Mi
+ enableAdminAPI: false
+ ruleSelector:
+ matchLabels:
+ role: alert-rules
+ app: strimzi
+ alerting:
+ alertmanagers:
+ - namespace: myproject
+ name: alertmanager
+ port: alertmanager
+ additionalScrapeConfigs:
+ name: additional-scrape-configs
+ key: prometheus-additional.yaml