Skip to content

Commit

Permalink
[bot] [main] Automated version update
Browse files Browse the repository at this point in the history
  • Loading branch information
prom-op-bot committed Jun 10, 2024
1 parent 616f591 commit 91b653c
Show file tree
Hide file tree
Showing 16 changed files with 2,141 additions and 851 deletions.
2 changes: 1 addition & 1 deletion jsonnet/kube-prometheus/versions.json
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
"prometheus": "2.52.0",
"prometheusAdapter": "0.12.0",
"prometheusOperator": "0.74.0",
"kubeRbacProxy": "0.17.1",
"kubeRbacProxy": "0.18.0",
"configmapReload": "0.13.0",
"pyrra": "0.6.4"
}
30 changes: 15 additions & 15 deletions jsonnetfile.lock.json
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
"subdir": "contrib/mixin"
}
},
"version": "0b2f15f616be1c18ef49d24178055b724b82e220",
"version": "8a0054fecb0d52d8c7d513652c770a533a4c1037",
"sum": "IXI3LQIT9NmTPJAk8WLUJd5+qZfcGpeNCyWIK7oEpws="
},
{
Expand Down Expand Up @@ -58,7 +58,7 @@
"subdir": "gen/grafonnet-latest"
}
},
"version": "fb76e2b3e511769900d9ec7bbf9dd77b5051ecfe",
"version": "119d65363dff84a1976bba609f2ac3a8f450e760",
"sum": "eyuJ0jOXeA4MrobbNgU4/v5a7ASDHslHZ0eS6hDdWoI="
},
{
Expand All @@ -68,7 +68,7 @@
"subdir": "gen/grafonnet-v10.0.0"
}
},
"version": "fb76e2b3e511769900d9ec7bbf9dd77b5051ecfe",
"version": "119d65363dff84a1976bba609f2ac3a8f450e760",
"sum": "xdcrJPJlpkq4+5LpGwN4tPAuheNNLXZjE6tDcyvFjr0="
},
{
Expand All @@ -78,8 +78,8 @@
"subdir": "gen/grafonnet-v11.0.0"
}
},
"version": "fb76e2b3e511769900d9ec7bbf9dd77b5051ecfe",
"sum": "NFIxfF9YprxwmcpqC5f05faEj4Gl740Abs6YDUun0M4="
"version": "119d65363dff84a1976bba609f2ac3a8f450e760",
"sum": "Fuo+qTZZzF+sHDBWX/8fkPsUmwW6qhH8hRVz45HznfI="
},
{
"source": {
Expand All @@ -98,7 +98,7 @@
"subdir": "mixin-utils"
}
},
"version": "6db8202a2360090ff19144c48a14b9fb1a314625",
"version": "553b9c250567ff618f70f3ff681eb2804dbb752d",
"sum": "A0f0G3aJEkdu5sqHXtizHDyU1jOSx6VuEXLRlI9Psp8="
},
{
Expand Down Expand Up @@ -138,7 +138,7 @@
"subdir": "jsonnet/kube-state-metrics"
}
},
"version": "85762cdf9790999957d8e9afdfc7253b1fa705db",
"version": "7995d5fd23bcff7ae24ab6849f7c393d262fb025",
"sum": "msMZyUvcebzRILLzNlTIiSOwa1XgQKtP7jbZTkiqwM0="
},
{
Expand All @@ -148,7 +148,7 @@
"subdir": "jsonnet/kube-state-metrics-mixin"
}
},
"version": "85762cdf9790999957d8e9afdfc7253b1fa705db",
"version": "7995d5fd23bcff7ae24ab6849f7c393d262fb025",
"sum": "qclI7LwucTjBef3PkGBkKxF0mfZPbHnn4rlNWKGtR4c="
},
{
Expand All @@ -158,7 +158,7 @@
"subdir": "jsonnet/mixin"
}
},
"version": "2adc2bade4b143c74b3af1d766298358781b9edb",
"version": "0d8575e0f5a801d368f181b4f9350c05d7adb5d5",
"sum": "gi+knjdxs2T715iIQIntrimbHRgHnpM8IFBJDD1gYfs=",
"name": "prometheus-operator-mixin"
},
Expand All @@ -169,8 +169,8 @@
"subdir": "jsonnet/prometheus-operator"
}
},
"version": "2adc2bade4b143c74b3af1d766298358781b9edb",
"sum": "dep5QbZrBzG8kBt9x8xqRSm6RWBsBH9IRh3BKedcY7o="
"version": "0d8575e0f5a801d368f181b4f9350c05d7adb5d5",
"sum": "jmdawkwvv5xPgbtNpOgH7QlpbSX/giVhdu3OEfNOO6Q="
},
{
"source": {
Expand All @@ -179,7 +179,7 @@
"subdir": "doc/alertmanager-mixin"
}
},
"version": "b67bde8cf981dd2f5e86cbb7b886074bf24d7a9c",
"version": "b59669f43821a59b89e846ff2f89c2f171fde336",
"sum": "IpF46ZXsm+0wJJAPtAre8+yxTNZA57mBqGpBP/r7/kw=",
"name": "alertmanager"
},
Expand All @@ -190,7 +190,7 @@
"subdir": "docs/node-mixin"
}
},
"version": "6603633c0e758d7876519cdf5804e5138e3eb1d7",
"version": "dc185bc0f640293944f332745e94f3278dbcaab0",
"sum": "R9ROsvpjZLgQJ78WAyD4HzrIq976Bpr4V2P2Fo2Kfns="
},
{
Expand All @@ -200,7 +200,7 @@
"subdir": "documentation/prometheus-mixin"
}
},
"version": "bfdca40fd2fa78c7d80f335c0b67cdaa2b5432fd",
"version": "08621bebe976c683683aa8198303bb000381be57",
"sum": "vGD+MxGadIBvvDC+/71BRKWEA8vHgcuBP5PcuCKZGEs=",
"name": "prometheus"
},
Expand All @@ -222,7 +222,7 @@
"subdir": "mixin"
}
},
"version": "863d914432e89683658bd7f9d4f15b9667329674",
"version": "b72f7da3407a9d47468453684e8e2dee1aea2289",
"sum": "HhSSbGGCNHCMy1ee5jElYDm0yS9Vesa7QB2/SHKdjsY=",
"name": "thanos-mixin"
},
Expand Down
2 changes: 1 addition & 1 deletion manifests/blackboxExporter-deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ spec:
- --secure-listen-address=:9115
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --upstream=http://127.0.0.1:19115/
image: quay.io/brancz/kube-rbac-proxy:v0.17.1
image: quay.io/brancz/kube-rbac-proxy:v0.18.0
name: kube-rbac-proxy
ports:
- containerPort: 9115
Expand Down
4 changes: 2 additions & 2 deletions manifests/kubeStateMetrics-deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ spec:
- --secure-listen-address=:8443
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --upstream=http://127.0.0.1:8081/
image: quay.io/brancz/kube-rbac-proxy:v0.17.1
image: quay.io/brancz/kube-rbac-proxy:v0.18.0
name: kube-rbac-proxy-main
ports:
- containerPort: 8443
Expand All @@ -83,7 +83,7 @@ spec:
- --secure-listen-address=:9443
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --upstream=http://127.0.0.1:8082/
image: quay.io/brancz/kube-rbac-proxy:v0.17.1
image: quay.io/brancz/kube-rbac-proxy:v0.18.0
name: kube-rbac-proxy-self
ports:
- containerPort: 9443
Expand Down
2 changes: 1 addition & 1 deletion manifests/nodeExporter-daemonset.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: status.podIP
image: quay.io/brancz/kube-rbac-proxy:v0.17.1
image: quay.io/brancz/kube-rbac-proxy:v0.18.0
name: kube-rbac-proxy
ports:
- containerPort: 9100
Expand Down
2 changes: 1 addition & 1 deletion manifests/prometheusOperator-deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ spec:
- --secure-listen-address=:8443
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --upstream=http://127.0.0.1:8080/
image: quay.io/brancz/kube-rbac-proxy:v0.17.1
image: quay.io/brancz/kube-rbac-proxy:v0.18.0
name: kube-rbac-proxy
ports:
- containerPort: 8443
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
operator.prometheus.io/version: 0.74.0
name: alertmanagerconfigs.monitoring.coreos.com
spec:
Expand Down
2 changes: 1 addition & 1 deletion manifests/setup/0alertmanagerCustomResourceDefinition.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
operator.prometheus.io/version: 0.74.0
name: alertmanagers.monitoring.coreos.com
spec:
Expand Down
2 changes: 1 addition & 1 deletion manifests/setup/0podmonitorCustomResourceDefinition.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
operator.prometheus.io/version: 0.74.0
name: podmonitors.monitoring.coreos.com
spec:
Expand Down
2 changes: 1 addition & 1 deletion manifests/setup/0probeCustomResourceDefinition.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
operator.prometheus.io/version: 0.74.0
name: probes.monitoring.coreos.com
spec:
Expand Down
11 changes: 6 additions & 5 deletions manifests/setup/0prometheusCustomResourceDefinition.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
operator.prometheus.io/version: 0.74.0
name: prometheuses.monitoring.coreos.com
spec:
Expand Down Expand Up @@ -5177,10 +5177,11 @@ spec:
type: object
overrideHonorLabels:
description: |-
When true, Prometheus resolves label conflicts by renaming the labels in
the scraped data to "exported_<label value>" for all targets created
from service and pod monitors.
Otherwise the HonorLabels field of the service or pod monitor applies.
When true, Prometheus resolves label conflicts by renaming the labels in the scraped data
to “exported_” for all targets created from ServiceMonitor, PodMonitor and
ScrapeConfig objects. Otherwise the HonorLabels field of the service or pod monitor applies.
In practice,`overrideHonorLaels:true` enforces `honorLabels:false`
for all ServiceMonitor, PodMonitor and ScrapeConfig objects.
type: boolean
overrideHonorTimestamps:
description: |-
Expand Down
22 changes: 17 additions & 5 deletions manifests/setup/0prometheusagentCustomResourceDefinition.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
operator.prometheus.io/version: 0.74.0
name: prometheusagents.monitoring.coreos.com
spec:
Expand Down Expand Up @@ -4468,17 +4468,29 @@ spec:
enabling the StatefulSetMinReadySeconds feature gate.
format: int32
type: integer
mode:
description: |-
Mode defines how the Prometheus operator deploys the PrometheusAgent pod(s).
For now this field has no effect.


(Alpha) Using this field requires the `PrometheusAgentDaemonSet` feature gate to be enabled.
enum:
- StatefulSet
- DaemonSet
type: string
nodeSelector:
additionalProperties:
type: string
description: Defines on which Nodes the Pods are scheduled.
type: object
overrideHonorLabels:
description: |-
When true, Prometheus resolves label conflicts by renaming the labels in
the scraped data to "exported_<label value>" for all targets created
from service and pod monitors.
Otherwise the HonorLabels field of the service or pod monitor applies.
When true, Prometheus resolves label conflicts by renaming the labels in the scraped data
to “exported_” for all targets created from ServiceMonitor, PodMonitor and
ScrapeConfig objects. Otherwise the HonorLabels field of the service or pod monitor applies.
In practice,`overrideHonorLaels:true` enforces `honorLabels:false`
for all ServiceMonitor, PodMonitor and ScrapeConfig objects.
type: boolean
overrideHonorTimestamps:
description: |-
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
annotations:
controller-gen.kubebuilder.io/version: v0.14.0
controller-gen.kubebuilder.io/version: v0.15.0
operator.prometheus.io/version: 0.74.0
name: prometheusrules.monitoring.coreos.com
spec:
Expand Down
Loading

0 comments on commit 91b653c

Please sign in to comment.