I am trying to bypass tls cert verification for a target fetched by 
querying consul.

- job_name: "grafana"
consul_sd_configs:
- server: "consul.service.consul:8500"
services:
- grafana
scheme: https
tls_config:
insecure_skip_verify: true
relabel_configs:
- source_labels: [__meta_consul_node]
target_label: hostname
- target_label: __scheme__
replacement: https

The 'insecure_skip_verify' part only seems to be used for accessing consul. 
But since grafana is running using a self-signed cert as well, I was hoping 
that its certificate would also not be verified.

But I keep getting this error suggesting that the final target is still 
getting its cert verified.

May 02 00:00:43 isengard prometheus[53817]: ts=2023-05-02T04:00:43.400Z 
caller=scrape.go:1353 level=debug component="scrape manager" 
scrape_pool=grafana target=https://192.168.1.31:3001/metrics msg="Scrape 
failed" err="Get \"https://192.168.1.xx:3001/metrics\": x509: certificate 
is valid for 127.0.0.1, not 192.168.1.xx"

Is there a way to bypass tls cert verification for the final target? Any 
suitable annotation that I can relabel?

I am using Prometheus 2.43.0.

Thanks,
  Sandip

-- 
You received this message because you are subscribed to the Google Groups 
"Prometheus Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to prometheus-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/prometheus-users/47796577-21d8-4c72-9760-35abd2a6af48n%40googlegroups.com.

Reply via email to