Update containerization warnings (#2855)

Running node_exporter in containers is now a fairly well understood
problem. Replace the warnings with something less dire and more
prescriptive.

Signed-off-by: Ben Kochie <superq@gmail.com>
This commit is contained in:
Ben Kochie 2023-11-23 06:23:18 -06:00 committed by GitHub
parent 97029a20a8
commit 4abf2c972e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -26,10 +26,10 @@ For automated installs with [Ansible](https://www.ansible.com/), there is the [P
### Docker ### Docker
The `node_exporter` is designed to monitor the host system. It's not recommended The `node_exporter` is designed to monitor the host system. Deploying in containers requires
to deploy it as a Docker container because it requires access to the host system. extra care in order to avoid monitoring the container itself.
For situations where Docker deployment is needed, some extra flags must be used to allow For situations where containerized deployment is needed, some extra flags must be used to allow
the `node_exporter` access to the host namespaces. the `node_exporter` access to the host namespaces.
Be aware that any non-root mount points you want to monitor will need to be bind-mounted Be aware that any non-root mount points you want to monitor will need to be bind-mounted