- 27 Oct, 2017 2 commits
-
-
Fabian Reinartz authored
-
Tom Wilkie authored
* Fast path the merge querier such that it is completely removed from query path when there is no remote storage. * Add NoopQuerier * Add copyright notice. * Avoid global, use a function.
-
- 26 Oct, 2017 24 commits
-
-
Tom Wilkie authored
Revert "Bypass the fanout storage merging if no remote storage is configured."
-
Tom Wilkie authored
-
Tom Wilkie authored
Update remote storage APIs from 1.8 branch
-
Tom Wilkie authored
-
Tom Wilkie authored
This reverts commit 0997191b.
-
Tom Wilkie authored
-
Tom Wilkie authored
-
Tom Wilkie authored
-
Tom Wilkie authored
-
Tom Wilkie authored
-
Tom Wilkie authored
-
Bryan Boreham authored
Removes configurability introduced in #3160 in favour of hard-coding, per advice from @brian-brazil.
-
Tom Wilkie authored
-
Conor Broderick authored
-
Tom Wilkie authored
-
Tom Wilkie authored
-
Tom Wilkie authored
-
Fabian Reinartz authored
Bypass the fanout storage merging if no remote storage is configured.
-
Fabian Reinartz authored
Tsdb StartTime : Use a simplier way to compute StartTime
-
Fabian Reinartz authored
-
Fabian Reinartz authored
storage/tsdb: check that max block duration is larger than min
-
Fabian Reinartz authored
Remove .codeclimate.yml
-
-
Paul Gier authored
If the user accidentally sets the max block duration smaller than the min, the current error is not informative. This change just performs the check earlier and improves the error message.
-
- 25 Oct, 2017 6 commits
-
-
Fabian Reinartz authored
Cut v2.0.0-rc.2
-
Thibault Chataigner authored
-
Fabian Reinartz authored
-
Fabian Reinartz authored
-
Jason Anderson authored
* Allow getting credentials via EC2 role This is subtly different than the existing `role_arn` solution, which allows Prometheus to assume an IAM role given some set of credentials already in-scope. With EC2 roles, one specifies the role at instance launch time (via an instance profile.) The instance then exposes temporary credentials via its metadata. The AWS Go SDK exposes a credential provider that polls the [instance metadata endpoint][1] already, so we can simply use that and it will take care of renewing the credentials when they expire. Without this, if this is being used inside EC2, it is difficult to cleanly allow the use of STS credentials. One has to set up a proxy role that can assume the role you really want, and launch the EC2 instance with the proxy role. This isn't very clean, and also doesn't seem to be [supported very well][2]. [1]: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html [2]: https://github.com/aws/aws-cli/issues/1390 * Automatically try to detect EC2 role credentials The `Available()` function exposed on ec2metadata returns a simple true/false if the ec2 metadata is available. This is the best way to know if we're actually running in EC2 (which is the only valid use-case for this credential provider.) This allows this to "just work" if you are using EC2 instance roles.
-
Julius Volz authored
In some places, where ctxhttp or gRPC are concerned, we still need to use the old contexts.
-
- 24 Oct, 2017 1 commit
-
-
Takashi Kokubun authored
-
- 23 Oct, 2017 6 commits
-
-
Tom Wilkie authored
-
Fabian Reinartz authored
-
Julius Volz authored
I left the promql ones and some others untouched as I remember that @fabxc prefers them that way.
-
Julius Volz authored
staticcheck fails with: storage/remote/read_test.go:199:27: do not pass a nil Context, even if a function permits it; pass context.TODO if you are unsure about which Context to use (SA1012)
-
Julius Volz authored
Kingpin now automatically does this via --version.
-
Julius Volz authored
Hey, branding :)
-
- 21 Oct, 2017 1 commit
-
-
Brian Brazil authored
-