tencent cloud

TencentCloud Managed Service for Prometheus

Product Introduction
Overview
Strengths
Use Cases
Concepts
Use Limits
Features
Service Regions
Purchase Guide
Billing Overview
Pay-as-You-Go (Postpaid)
Free Trial Introduction
Managed Collector Billing Introduction
Archive Storage Billing Introduction
Purchase Methods
Payment Overdue
Getting Started
Integration Guide
Scrape Configuration Description
Custom Monitoring
EMR Integration
Java Application Integration
Go Application Integration
Exporter Integration
Nacos Integration
Common Exporter
Health Check
Instructions for Installing Components in the TKE Cluster
Cloud Monitoring
Non-Tencent Cloud Host Monitoring
Read Cloud-Hosted Prometheus Instance Data via Remote Read
Agent Self-Service Access
Pushgateway Integration
Security Group Open Description
Operation Guide
Instance
TKE
Integration Center
Data Multi-Write
Recording Rule
Instance Diagnosis
Archive Storage
Alerting Rule
Tag
Access Control
Grafana
API Guide
TKE Metrics
Resource Usage and Billing Overview
Practical Tutorial
Migration from Self-Built Prometheus
Custom Integration with CVM
TKE Monitoring
Enabling Public Network Access for TKE Serverless Cluster
Connecting TMP to Local Grafana
Enabling Public Network Access for Prometheus Instances
Configuring a Public Network Address for a Prometheus Instance
Terraform
Terraform Overview
Managing Prometheus Instances Using Terraform
Managing the Integration Center of Prometheus Instances Using Terraform
Collecting Container Monitoring Data Using Terraform
Configuring Alarm Policies Using Terraform
FAQs
Basic Questions
Integration with TKE Cluster
Product Consulting
Use and Technology
Cloud Monitor FAQs
Service Level Agreement
TMP Policy
Privacy Policy
Data Processing And Security Agreement
DocumentationTencentCloud Managed Service for PrometheusPractical TutorialEnabling Public Network Access for Prometheus Instances

Enabling Public Network Access for Prometheus Instances

PDF
Focus Mode
Font Size
Last updated: 2024-11-22 18:16:04

Operation Background

In some scenarios, you may need your Prometheus instance to have the ability to access the public network, for example:
When Prometheus is integrated to monitor COS products on the cloud, since COS products do not support private network access, the Prometheus instance needs to have the ability to access the public network.
The WebHook in the Prometheus alarm policy is used, and this WebHook URL is a public network address.
In such cases, you need to enable public network access for Prometheus (which essentially means enabling public network access for the TKE-managed cluster where the Prometheus instance components are located).

Operations

1. Log in to TMP Console.
2. Click the corresponding instance to enter the Instance Management page. Then, click Subnet on the Basic info tab page.



3. In the top menu of the subnet, switch to the Routing rules section. Click the route table link (rtb-xxx on the list) to enter the route table interface.



4. On the route table page, click Add routing policy.
Destination: Enter 0.0.0.0/0.
Next hop type: select NAT Gateway.
Next hop: select the target gateway. If there is no gateway, please refer to the NAT Gateway guide to create one.



5. After completing the settings, click Create. After the creation is successful, public network access is enabled for TKE Serverless.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback