Provide metrics on root URL
This commit is contained in:
@@ -1,82 +1,99 @@
|
||||
# This file is responsible for configuring your application
|
||||
# and its dependencies with the aid of the Config module.
|
||||
#
|
||||
# This configuration file is loaded before any dependency and
|
||||
# is restricted to this project.
|
||||
|
||||
# General application configuration
|
||||
import Config
|
||||
|
||||
# Configures the endpoint
|
||||
config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint,
|
||||
url: [host: "localhost"],
|
||||
render_errors: [view: KafkaexLagExporterWeb.ErrorView, accepts: ~w(json), layout: false],
|
||||
pubsub_server: KafkaexLagExporter.PubSub,
|
||||
live_view: [signing_salt: "sSgJfjNf"]
|
||||
|
||||
# Configures Elixir's Logger
|
||||
config :logger, :console,
|
||||
format: "$time $metadata[$level] $message\n",
|
||||
level: :info,
|
||||
metadata: [:request_id]
|
||||
|
||||
# Use Jason for JSON parsing in Phoenix
|
||||
config :phoenix, :json_library, Jason
|
||||
|
||||
config :kafka_ex,
|
||||
# A list of brokers to connect to. This can be in either of the following formats
|
||||
#
|
||||
# * [{"HOST", port}...]
|
||||
# * CSV - `"HOST:PORT,HOST:PORT[,...]"`
|
||||
# * {mod, fun, args}
|
||||
# * &arity_zero_fun/0
|
||||
# * fn -> ... end
|
||||
#
|
||||
# If you receive :leader_not_available
|
||||
# errors when producing messages, it may be necessary to modify "advertised.host.name" in the
|
||||
# server.properties file.
|
||||
# In the case below you would set "advertised.host.name=localhost"
|
||||
# brokers: [
|
||||
# {"kafka1", 9092},
|
||||
# {"kafka2", 9092},
|
||||
# {"kafka3", 9092}
|
||||
# ],
|
||||
brokers: "localhost:9093,localhost:9094,localhost:9095",
|
||||
#
|
||||
# OR:
|
||||
# brokers: "localhost:9092,localhost:9093,localhost:9094"
|
||||
#
|
||||
# It may be useful to configure your brokers at runtime, for example if you use
|
||||
# service discovery instead of storing your broker hostnames in a config file.
|
||||
# To do this, you can use `{mod, fun, args}` or a zero-arity function, and `KafkaEx`
|
||||
# will invoke your callback when fetching the `:brokers` configuration.
|
||||
# Note that when using this approach you must return a list of host/port pairs.
|
||||
#
|
||||
# the default consumer group for worker processes, must be a binary (string)
|
||||
# NOTE if you are on Kafka < 0.8.2 or if you want to disable the use of
|
||||
# consumer groups, set this to :no_consumer_group (this is the
|
||||
# only exception to the requirement that this value be a binary)
|
||||
consumer_group: "kafka_ex",
|
||||
# The client_id is the logical grouping of a set of kafka clients.
|
||||
client_id: "kafka_ex",
|
||||
# Set this value to true if you do not want the default
|
||||
# `KafkaEx.Server` worker to start during application start-up -
|
||||
# i.e., if you want to start your own set of named workers
|
||||
disable_default_worker: false,
|
||||
# Timeout value, in msec, for synchronous operations (e.g., network calls).
|
||||
# If this value is greater than GenServer's default timeout of 5000, it will also
|
||||
# be used as the timeout for work dispatched via KafkaEx.Server.call (e.g., KafkaEx.metadata).
|
||||
# In those cases, it should be considered a 'total timeout', encompassing both network calls and
|
||||
# wait time for the genservers.
|
||||
sync_timeout: 3000,
|
||||
# Supervision max_restarts - the maximum amount of restarts allowed in a time frame
|
||||
max_restarts: 10,
|
||||
# Supervision max_seconds - the time frame in which :max_restarts applies
|
||||
max_seconds: 60,
|
||||
# Interval in milliseconds that GenConsumer waits to commit offsets.
|
||||
commit_interval: 5_000,
|
||||
# Threshold number of messages consumed for GenConsumer to commit offsets
|
||||
# to the broker.
|
||||
commit_threshold: 100,
|
||||
# Interval in milliseconds to wait before reconnect to kafka
|
||||
sleep_for_reconnect: 400,
|
||||
# This is the flag that enables use of ssl
|
||||
use_ssl: false,
|
||||
# see SSL OPTION DESCRIPTIONS - CLIENT SIDE at http://erlang.org/doc/man/ssl.html
|
||||
# for supported options
|
||||
ssl_options: [
|
||||
# cacertfile: File.cwd!() <> "/ssl/ca-cert",
|
||||
# certfile: File.cwd!() <> "/ssl/cert.pem",
|
||||
# keyfile: File.cwd!() <> "/ssl/key.pem"
|
||||
],
|
||||
# set this to the version of the kafka broker that you are using
|
||||
# include only major.minor.patch versions. must be at least 0.8.0
|
||||
# use "kayrock" for the new client
|
||||
kafka_version: "3.1.0"
|
||||
# A list of brokers to connect to. This can be in either of the following formats
|
||||
#
|
||||
# * [{"HOST", port}...]
|
||||
# * CSV - `"HOST:PORT,HOST:PORT[,...]"`
|
||||
# * {mod, fun, args}
|
||||
# * &arity_zero_fun/0
|
||||
# * fn -> ... end
|
||||
#
|
||||
# If you receive :leader_not_available
|
||||
# errors when producing messages, it may be necessary to modify "advertised.host.name" in the
|
||||
# server.properties file.
|
||||
# In the case below you would set "advertised.host.name=localhost"
|
||||
# brokers: [
|
||||
# {"kafka1", 9092},
|
||||
# {"kafka2", 9092},
|
||||
# {"kafka3", 9092}
|
||||
# ],
|
||||
brokers: "localhost:9093,localhost:9094,localhost:9095",
|
||||
#
|
||||
# OR:
|
||||
# brokers: "localhost:9092,localhost:9093,localhost:9094"
|
||||
#
|
||||
# It may be useful to configure your brokers at runtime, for example if you use
|
||||
# service discovery instead of storing your broker hostnames in a config file.
|
||||
# To do this, you can use `{mod, fun, args}` or a zero-arity function, and `KafkaEx`
|
||||
# will invoke your callback when fetching the `:brokers` configuration.
|
||||
# Note that when using this approach you must return a list of host/port pairs.
|
||||
#
|
||||
# the default consumer group for worker processes, must be a binary (string)
|
||||
# NOTE if you are on Kafka < 0.8.2 or if you want to disable the use of
|
||||
# consumer groups, set this to :no_consumer_group (this is the
|
||||
# only exception to the requirement that this value be a binary)
|
||||
consumer_group: "kafka_ex",
|
||||
# The client_id is the logical grouping of a set of kafka clients.
|
||||
client_id: "kafka_ex",
|
||||
# Set this value to true if you do not want the default
|
||||
# `KafkaEx.Server` worker to start during application start-up -
|
||||
# i.e., if you want to start your own set of named workers
|
||||
disable_default_worker: false,
|
||||
# Timeout value, in msec, for synchronous operations (e.g., network calls).
|
||||
# If this value is greater than GenServer's default timeout of 5000, it will also
|
||||
# be used as the timeout for work dispatched via KafkaEx.Server.call (e.g., KafkaEx.metadata).
|
||||
# In those cases, it should be considered a 'total timeout', encompassing both network calls and
|
||||
# wait time for the genservers.
|
||||
sync_timeout: 3000,
|
||||
# Supervision max_restarts - the maximum amount of restarts allowed in a time frame
|
||||
max_restarts: 10,
|
||||
# Supervision max_seconds - the time frame in which :max_restarts applies
|
||||
max_seconds: 60,
|
||||
# Interval in milliseconds that GenConsumer waits to commit offsets.
|
||||
commit_interval: 5_000,
|
||||
# Threshold number of messages consumed for GenConsumer to commit offsets
|
||||
# to the broker.
|
||||
commit_threshold: 100,
|
||||
# Interval in milliseconds to wait before reconnect to kafka
|
||||
sleep_for_reconnect: 400,
|
||||
# This is the flag that enables use of ssl
|
||||
use_ssl: false,
|
||||
# see SSL OPTION DESCRIPTIONS - CLIENT SIDE at http://erlang.org/doc/man/ssl.html
|
||||
# for supported options
|
||||
ssl_options: [
|
||||
# cacertfile: File.cwd!() <> "/ssl/ca-cert",
|
||||
# certfile: File.cwd!() <> "/ssl/cert.pem",
|
||||
# keyfile: File.cwd!() <> "/ssl/key.pem"
|
||||
],
|
||||
# set this to the version of the kafka broker that you are using
|
||||
# include only major.minor.patch versions. must be at least 0.8.0
|
||||
# use "kayrock" for the new client
|
||||
kafka_version: "3.1.0"
|
||||
|
||||
config :logger,
|
||||
level: :info,
|
||||
truncate: 4096
|
||||
|
||||
env_config = Path.expand("#{Mix.env()}.exs", __DIR__)
|
||||
|
||||
if File.exists?(env_config) do
|
||||
import_config(env_config)
|
||||
end
|
||||
# Import environment specific config. This must remain at the bottom
|
||||
# of this file so it overrides the configuration defined above.
|
||||
import_config "#{config_env()}.exs"
|
||||
|
||||
51
config/dev.exs
Normal file
51
config/dev.exs
Normal file
@@ -0,0 +1,51 @@
|
||||
import Config
|
||||
|
||||
# For development, we disable any cache and enable
|
||||
# debugging and code reloading.
|
||||
#
|
||||
# The watchers configuration can be used to run external
|
||||
# watchers to your application. For example, we use it
|
||||
# with esbuild to bundle .js and .css sources.
|
||||
config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint,
|
||||
# Binding to loopback ipv4 address prevents access from other machines.
|
||||
# Change to `ip: {0, 0, 0, 0}` to allow access from other machines.
|
||||
http: [ip: {127, 0, 0, 1}, port: 4000],
|
||||
check_origin: false,
|
||||
code_reloader: true,
|
||||
debug_errors: true,
|
||||
secret_key_base: "lttLR5uTgFy2WzfJLo+uXLWnogim+X/ZoJ9aqOWlJew3TsFm8dYXvsk1OpYUy2F8",
|
||||
watchers: []
|
||||
|
||||
# ## SSL Support
|
||||
#
|
||||
# In order to use HTTPS in development, a self-signed
|
||||
# certificate can be generated by running the following
|
||||
# Mix task:
|
||||
#
|
||||
# mix phx.gen.cert
|
||||
#
|
||||
# Note that this task requires Erlang/OTP 20 or later.
|
||||
# Run `mix help phx.gen.cert` for more information.
|
||||
#
|
||||
# The `http:` config above can be replaced with:
|
||||
#
|
||||
# https: [
|
||||
# port: 4001,
|
||||
# cipher_suite: :strong,
|
||||
# keyfile: "priv/cert/selfsigned_key.pem",
|
||||
# certfile: "priv/cert/selfsigned.pem"
|
||||
# ],
|
||||
#
|
||||
# If desired, both `http:` and `https:` keys can be
|
||||
# configured to run both http and https servers on
|
||||
# different ports.
|
||||
|
||||
# Do not include metadata nor timestamps in development logs
|
||||
config :logger, :console, format: "[$level] $message\n"
|
||||
|
||||
# Set a higher stacktrace during development. Avoid configuring such
|
||||
# in production as building large stacktraces may be expensive.
|
||||
config :phoenix, :stacktrace_depth, 20
|
||||
|
||||
# Initialize plugs at runtime for faster development compilation
|
||||
config :phoenix, :plug_init_mode, :runtime
|
||||
50
config/prod.exs
Normal file
50
config/prod.exs
Normal file
@@ -0,0 +1,50 @@
|
||||
import Config
|
||||
|
||||
# For production, don't forget to configure the url host
|
||||
# to something meaningful, Phoenix uses this information
|
||||
# when generating URLs.
|
||||
#
|
||||
# Note we also include the path to a cache manifest
|
||||
# containing the digested version of static files. This
|
||||
# manifest is generated by the `mix phx.digest` task,
|
||||
# which you should run after static files are built and
|
||||
# before starting your production server.
|
||||
config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint,
|
||||
cache_static_manifest: "priv/static/cache_manifest.json"
|
||||
|
||||
# Do not print debug messages in production
|
||||
config :logger, level: :info
|
||||
|
||||
# ## SSL Support
|
||||
#
|
||||
# To get SSL working, you will need to add the `https` key
|
||||
# to the previous section and set your `:url` port to 443:
|
||||
#
|
||||
# config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint,
|
||||
# ...,
|
||||
# url: [host: "example.com", port: 443],
|
||||
# https: [
|
||||
# ...,
|
||||
# port: 443,
|
||||
# cipher_suite: :strong,
|
||||
# keyfile: System.get_env("SOME_APP_SSL_KEY_PATH"),
|
||||
# certfile: System.get_env("SOME_APP_SSL_CERT_PATH")
|
||||
# ]
|
||||
#
|
||||
# The `cipher_suite` is set to `:strong` to support only the
|
||||
# latest and more secure SSL ciphers. This means old browsers
|
||||
# and clients may not be supported. You can set it to
|
||||
# `:compatible` for wider support.
|
||||
#
|
||||
# `:keyfile` and `:certfile` expect an absolute path to the key
|
||||
# and cert in disk or a relative path inside priv, for example
|
||||
# "priv/ssl/server.key". For all supported SSL configuration
|
||||
# options, see https://hexdocs.pm/plug/Plug.SSL.html#configure/1
|
||||
#
|
||||
# We also recommend setting `force_ssl` in your endpoint, ensuring
|
||||
# no data is ever sent via http, always redirecting to https:
|
||||
#
|
||||
# config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint,
|
||||
# force_ssl: [hsts: true]
|
||||
#
|
||||
# Check `Plug.SSL` for all available options in `force_ssl`.
|
||||
52
config/runtime.exs
Normal file
52
config/runtime.exs
Normal file
@@ -0,0 +1,52 @@
|
||||
import Config
|
||||
|
||||
# config/runtime.exs is executed for all environments, including
|
||||
# during releases. It is executed after compilation and before the
|
||||
# system starts, so it is typically used to load production configuration
|
||||
# and secrets from environment variables or elsewhere. Do not define
|
||||
# any compile-time configuration in here, as it won't be applied.
|
||||
# The block below contains prod specific runtime configuration.
|
||||
|
||||
# Start the phoenix server if environment is set and running in a release
|
||||
if System.get_env("PHX_SERVER") && System.get_env("RELEASE_NAME") do
|
||||
config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint, server: true
|
||||
end
|
||||
|
||||
if config_env() == :prod do
|
||||
# The secret key base is used to sign/encrypt cookies and other secrets.
|
||||
# A default value is used in config/dev.exs and config/test.exs but you
|
||||
# want to use a different value for prod and you most likely don't want
|
||||
# to check this value into version control, so we use an environment
|
||||
# variable instead.
|
||||
secret_key_base =
|
||||
System.get_env("SECRET_KEY_BASE") ||
|
||||
raise """
|
||||
environment variable SECRET_KEY_BASE is missing.
|
||||
You can generate one by calling: mix phx.gen.secret
|
||||
"""
|
||||
|
||||
host = System.get_env("PHX_HOST") || "example.com"
|
||||
port = String.to_integer(System.get_env("PORT") || "4000")
|
||||
|
||||
config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint,
|
||||
url: [host: host, port: 443],
|
||||
http: [
|
||||
# Enable IPv6 and bind on all interfaces.
|
||||
# Set it to {0, 0, 0, 0, 0, 0, 0, 1} for local network only access.
|
||||
# See the documentation on https://hexdocs.pm/plug_cowboy/Plug.Cowboy.html
|
||||
# for details about using IPv6 vs IPv4 and loopback vs public addresses.
|
||||
ip: {0, 0, 0, 0, 0, 0, 0, 0},
|
||||
port: port
|
||||
],
|
||||
secret_key_base: secret_key_base
|
||||
|
||||
# ## Using releases
|
||||
#
|
||||
# If you are doing OTP releases, you need to instruct Phoenix
|
||||
# to start each relevant endpoint:
|
||||
#
|
||||
# config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint, server: true
|
||||
#
|
||||
# Then you can assemble a release by calling `mix release`.
|
||||
# See `mix help release` for more information.
|
||||
end
|
||||
14
config/test.exs
Normal file
14
config/test.exs
Normal file
@@ -0,0 +1,14 @@
|
||||
import Config
|
||||
|
||||
# We don't run a server during test. If one is required,
|
||||
# you can enable the server option below.
|
||||
config :kafkaex_lag_exporter, KafkaexLagExporterWeb.Endpoint,
|
||||
http: [ip: {127, 0, 0, 1}, port: 4002],
|
||||
secret_key_base: "+3V7k0WsFksjqGwm5O54NJQX4Sz9LLr8CSJp+4X6UOXBX6IUwzMOqrRQOsziQ6mv",
|
||||
server: false
|
||||
|
||||
# Print only warnings and errors during test
|
||||
config :logger, level: :warn
|
||||
|
||||
# Initialize plugs at runtime for faster test compilation
|
||||
config :phoenix, :plug_init_mode, :runtime
|
||||
Reference in New Issue
Block a user