-
Notifications
You must be signed in to change notification settings - Fork 544
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(metrics): add service monitor config #682
fix(metrics): add service monitor config #682
Conversation
2d9b879
to
581c8b5
Compare
@jpeeler i asked the monitoring team for a review. |
We are trying to secure all metrics endpoints in the monitoring stack. You can find two examples similar to your use case in the node-exporter and kube-state-metrics manifests. I am not sure this would be a show-stopper though. |
@jpeeler I think this just needs a rebase and it's good to go, right? |
581c8b5
to
3abfeab
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Everything looks great! I just don't think we want this to be part of our upstream release.
@@ -1,3 +1,5 @@ | |||
#! validate-crd: ./deploy/chart/templates/06-catalogsource.crd.yaml | |||
#! parse-kind: CatalogSource |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I seem to remember these caused problems with the release artifacts, so we removed them.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As far as I understand it, these lines will get stripped when a release is made. These lines were already there.
3abfeab
to
f097e51
Compare
/retest |
This is to make room for a new file that needs to be loaded near the beginning.
Two new command line arguments are added to pass the paths to the certificate and private key, "tls-cert" and "tls-key".
This allows the certificates to be created before the deployments that reference them.
f097e51
to
888b81c
Compare
/retest |
1 similar comment
/retest |
/lgtm Looks good! Thanks! |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ecordell, jpeeler The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Please review @openshift/sig-monitoring. <-- I guess that doesn't work since this repo isn't in the openshift namespace?
There are no alerts as the OLM metrics are mostly informational.
The metrics are reported without TLS, that's ok right?(Edit: metrics are served over TLS.) And lastly, just in case the intent is not clear the goal is to scrape two separate endpoints.(This will need a make release done after final review I believe.)