-
Notifications
You must be signed in to change notification settings - Fork 228
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add: custom annotations on service and deployment #2030
Conversation
Signed-off-by: tozastation <tozastation@gmail.com>
Welcome @tozastation! |
Hi @tozastation. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
✅ Deploy Preview for kubernetes-sigs-kueue ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
/ok-to-test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall LGTM.
@tozastation do you have a specific use-case for this? Maybe we can document it.
@trasc In Prometheus, we can use Relabel Config to define the scraping target without using the Service Monitor (Prometheus Operator CRD). The following annotations are available by default in Prometheus' Helm Chart. prometheus.io/path: /metrics
prometheus.io/port: '8080'
prometheus.io/scrape: 'true'
etc... Implementing this with the proposed changes will result in the following example (values.yaml): Pod Annotations controllerManager:
manager:
podAnnotations:
prometheus.io/path: /metrics
prometheus.io/port: '8080'
prometheus.io/scrape: 'true' example (values.yaml): Service Annotations metricsService:
annotations:
prometheus.io/path: /metrics
prometheus.io/port: '8443'
prometheus.io/scrape: 'true'
prometheus.io/scheme: https ※ Service Scaraping requires the following additions to the Prometheus configuration. scrape_configs:
- tls_config:
insecure_skip_verify: true
authorization:
credentials_file: /var/run/secrets/kubernetes.io/serviceaccount/token |
Thanks, /lgtm |
LGTM label has been added. Git tree hash: c660d9fe8776db46159f37c7a89ce2b89ee8d47e
|
/assign @tenzen-y |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm wondering if we need to update https://github.com/kubernetes-sigs/kueue/blob/a0290b3f67770b34b6169bcd10e74e07ad831945/hack/update-helm.sh as well.
@tozastation What happens if you perform make update-helm
?
thanks The following is the result of the execution. ❯ make update-helm
/Users/tozastation/ghq/github.com/tozastation/kueue/bin/controller-gen \
crd:generateEmbeddedObjectMeta=true output:crd:artifacts:config=config/components/crd/bases\
paths="./apis/..."
/Users/tozastation/ghq/github.com/tozastation/kueue/bin/controller-gen \
rbac:roleName=manager-role output:rbac:artifacts:config=config/components/rbac\
webhook output:webhook:artifacts:config=config/components/webhook\
paths="./pkg/controller/...;./pkg/webhooks/...;./pkg/util/cert/...;./pkg/visibility/..."
go: downloading github.com/mikefarah/yq/v4 v4.34.1
go: downloading gopkg.in/op/go-logging.v1 v1.0.0-20160211212156-b2cb9fa56473
go: downloading github.com/elliotchance/orderedmap v1.5.0
go: downloading github.com/a8m/envsubst v1.4.2
go: downloading github.com/alecthomas/participle/v2 v2.0.0
go: downloading github.com/goccy/go-yaml v1.11.0
go: downloading github.com/pelletier/go-toml/v2 v2.0.7
SED=/opt/homebrew/opt/gnu-sed/libexec/gnubin/sed ./hack/update-helm.sh |
Oh, I see. Thank you for checking! |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: tenzen-y, tozastation The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/release-note-edit
|
What type of PR is this?
/kind feature
What this PR does / why we need it:
I have changed to be able to set Custom Annotations on Service resources and Deployment's Pod resources via Helm Chart.
Which issue(s) this PR fixes:
Fixes #1619
Special notes for your reviewer:
Does this PR introduce a user-facing change?