Netdata: Difference between revisions
add references section |
Expand Ansible section |
||
| (5 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
Netdata is one of the [https://discourse.equality-tech.com/t/dashboards-in-qualitybox/107 QualityBox dashboards]. | Netdata is one of the [https://discourse.equality-tech.com/t/dashboards-in-qualitybox/107 QualityBox dashboards]. | ||
<!-- These services/entry points are disabled in production | |||
See [{{SERVER}}:20000/ this website Live] | See [{{SERVER}}:20000/ this website Live] | ||
| Line 5: | Line 7: | ||
[{{SERVER}}:20000/netdata.conf Configuration] | [{{SERVER}}:20000/netdata.conf Configuration] | ||
netdata.conf --> | |||
== System Locations == | == System Locations == | ||
| Line 25: | Line 27: | ||
to install, you'll get all of netdata installed into <code>/opt/netdata</code> | to install, you'll get all of netdata installed into <code>/opt/netdata</code> | ||
== With Ansible == | |||
There is an [https://learn.netdata.cloud/docs/netdata-agent/installation/ansible Ansible Playbook for deploying Netdata Agent] across multiple nodes. At that page, they also describe how to disable the local dashboard by setting <code>web_mode</code> to none. The security configuration is described at https://learn.netdata.cloud/docs/netdata-agent/configuration/securing-agents/ | |||
== Host Modifications == | == Host Modifications == | ||
| Line 33: | Line 37: | ||
=== HAProxy === | === HAProxy === | ||
< | <syntaxhighlight lang="python"> | ||
frontend netdata | frontend netdata | ||
bind *:20000 ssl crt /etc/haproxy/certs/wiki.freephile.org.pem | bind *:20000 ssl crt /etc/haproxy/certs/wiki.freephile.org.pem | ||
| Line 41: | Line 45: | ||
backend netdata-back | backend netdata-back | ||
server nd1 127.0.0.1:19999 | server nd1 127.0.0.1:19999 | ||
</ | </syntaxhighlight> | ||
=== Kernel === | === Kernel === | ||
| Line 90: | Line 94: | ||
You'll probably receive alarms for 'tcp listen drops'. This is likely bot-related (sending INVALID packets) and NOT due to your application dropping legitimate packets. There is a good discussion on how to identify the source of the problem and how to mitigate or resolve it [https://github.com/firehol/netdata/issues/3234 Issue #3234][https://github.com/firehol/netdata/issues/3826 Issue #3826] TLDR; increase the threshold to 1 (<code>/etc/netdata/health.d/tcp_listen.conf</code>) so you don't get bogus alerts. | You'll probably receive alarms for 'tcp listen drops'. This is likely bot-related (sending INVALID packets) and NOT due to your application dropping legitimate packets. There is a good discussion on how to identify the source of the problem and how to mitigate or resolve it [https://github.com/firehol/netdata/issues/3234 Issue #3234][https://github.com/firehol/netdata/issues/3826 Issue #3826] TLDR; increase the threshold to 1 (<code>/etc/netdata/health.d/tcp_listen.conf</code>) so you don't get bogus alerts. | ||
Also, you should modify your firewall to drop invalid packets before they're either counted (by | Also, you should modify your firewall to drop invalid packets before they're either counted (by netdata) or dropped (by the kernel). | ||
< | <syntaxhighlight lang="bash"> | ||
iptables -A INPUT -m conntrack --ctstate INVALID -j DROP | iptables -A INPUT -m conntrack --ctstate INVALID -j DROP | ||
ip6tables -A INPUT -m conntrack --ctstate INVALID -j DROP | ip6tables -A INPUT -m conntrack --ctstate INVALID -j DROP | ||
iptables -A INPUT -m tcp -p tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -j DROP | iptables -A INPUT -m tcp -p tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -j DROP | ||
ip6tables -A INPUT -m tcp -p tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -j DROP | ip6tables -A INPUT -m tcp -p tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m conntrack --ctstate NEW -j DROP | ||
</ | </syntaxhighlight> | ||
Following the advice from NASA at https://wiki.earthdata.nasa.gov/display/HDD/SOMAXCONN, I increased my somaxconn kernel parameter to 1024 from 128 | Following the advice from NASA at https://wiki.earthdata.nasa.gov/display/HDD/SOMAXCONN, I increased my somaxconn kernel parameter to 1024 from 128 | ||
< | <syntaxhighlight lang="bash"> | ||
cat /proc/sys/net/core/somaxconn | cat /proc/sys/net/core/somaxconn | ||
128 | 128 | ||
sysctl -w net.core.somaxconn=1024 | sysctl -w net.core.somaxconn=1024 | ||
</ | </syntaxhighlight> | ||
[[File:Tcp state diagram fixed.svg|600px|TCP State diagram]] | [[File:Tcp state diagram fixed.svg|600px|TCP State diagram]] | ||