mirror of
https://github.com/prometheus-operator/kube-prometheus.git
synced 2025-10-24 05:31:00 +02:00
Merge pull request #1518 from PaytmLabs/hotfix/addons/scope-values-namespace
This commit is contained in:
commit
124eed6c72
@ -46,7 +46,7 @@
|
|||||||
spec+:
|
spec+:
|
||||||
$.antiaffinity(
|
$.antiaffinity(
|
||||||
$.alertmanager._config.selectorLabels,
|
$.alertmanager._config.selectorLabels,
|
||||||
$.values.common.namespace,
|
$.values.alertmanager.namespace,
|
||||||
$.values.alertmanager.podAntiAffinity,
|
$.values.alertmanager.podAntiAffinity,
|
||||||
$.values.alertmanager.podAntiAffinityTopologyKey,
|
$.values.alertmanager.podAntiAffinityTopologyKey,
|
||||||
),
|
),
|
||||||
@ -58,7 +58,7 @@
|
|||||||
spec+:
|
spec+:
|
||||||
$.antiaffinity(
|
$.antiaffinity(
|
||||||
$.prometheus._config.selectorLabels,
|
$.prometheus._config.selectorLabels,
|
||||||
$.values.common.namespace,
|
$.values.prometheus.namespace,
|
||||||
$.values.prometheus.podAntiAffinity,
|
$.values.prometheus.podAntiAffinity,
|
||||||
$.values.prometheus.podAntiAffinityTopologyKey,
|
$.values.prometheus.podAntiAffinityTopologyKey,
|
||||||
),
|
),
|
||||||
@ -72,7 +72,7 @@
|
|||||||
spec+:
|
spec+:
|
||||||
$.antiaffinity(
|
$.antiaffinity(
|
||||||
$.blackboxExporter._config.selectorLabels,
|
$.blackboxExporter._config.selectorLabels,
|
||||||
$.values.common.namespace,
|
$.values.blackboxExporter.namespace,
|
||||||
$.values.blackboxExporter.podAntiAffinity,
|
$.values.blackboxExporter.podAntiAffinity,
|
||||||
$.values.blackboxExporter.podAntiAffinityTopologyKey,
|
$.values.blackboxExporter.podAntiAffinityTopologyKey,
|
||||||
),
|
),
|
||||||
@ -88,7 +88,7 @@
|
|||||||
spec+:
|
spec+:
|
||||||
$.antiaffinity(
|
$.antiaffinity(
|
||||||
$.prometheusAdapter._config.selectorLabels,
|
$.prometheusAdapter._config.selectorLabels,
|
||||||
$.values.common.namespace,
|
$.values.prometheusAdapter.namespace,
|
||||||
$.values.prometheusAdapter.podAntiAffinity,
|
$.values.prometheusAdapter.podAntiAffinity,
|
||||||
$.values.prometheusAdapter.podAntiAffinityTopologyKey,
|
$.values.prometheusAdapter.podAntiAffinityTopologyKey,
|
||||||
),
|
),
|
||||||
|
|||||||
@ -37,7 +37,7 @@
|
|||||||
kind: 'ServiceMonitor',
|
kind: 'ServiceMonitor',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'aws-node',
|
name: 'aws-node',
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.kubernetesControlPlane.namespace,
|
||||||
labels: {
|
labels: {
|
||||||
'app.kubernetes.io/name': 'aws-node',
|
'app.kubernetes.io/name': 'aws-node',
|
||||||
},
|
},
|
||||||
|
|||||||
@ -4,7 +4,7 @@
|
|||||||
{
|
{
|
||||||
values+:: {
|
values+:: {
|
||||||
prometheusAdapter+: {
|
prometheusAdapter+: {
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.prometheusAdapter.namespace,
|
||||||
// Rules for custom-metrics
|
// Rules for custom-metrics
|
||||||
config+:: {
|
config+:: {
|
||||||
rules+: [
|
rules+: [
|
||||||
|
|||||||
@ -4,7 +4,6 @@
|
|||||||
{
|
{
|
||||||
values+:: {
|
values+:: {
|
||||||
prometheusAdapter+: {
|
prometheusAdapter+: {
|
||||||
namespace: $.values.common.namespace,
|
|
||||||
// Rules for external-metrics
|
// Rules for external-metrics
|
||||||
config+:: {
|
config+:: {
|
||||||
externalRules+: [
|
externalRules+: [
|
||||||
|
|||||||
@ -30,7 +30,7 @@
|
|||||||
kind: 'ClusterRole',
|
kind: 'ClusterRole',
|
||||||
name: 'ksm-autoscaler',
|
name: 'ksm-autoscaler',
|
||||||
},
|
},
|
||||||
subjects: [{ kind: 'ServiceAccount', name: 'ksm-autoscaler', namespace: $.values.common.namespace }],
|
subjects: [{ kind: 'ServiceAccount', name: 'ksm-autoscaler', namespace: $.values.kubeStateMetrics.namespace }],
|
||||||
},
|
},
|
||||||
|
|
||||||
roleBinding: {
|
roleBinding: {
|
||||||
@ -38,7 +38,7 @@
|
|||||||
kind: 'RoleBinding',
|
kind: 'RoleBinding',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'ksm-autoscaler',
|
name: 'ksm-autoscaler',
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.kubeStateMetrics.namespace,
|
||||||
},
|
},
|
||||||
roleRef: {
|
roleRef: {
|
||||||
apiGroup: 'rbac.authorization.k8s.io',
|
apiGroup: 'rbac.authorization.k8s.io',
|
||||||
@ -53,7 +53,7 @@
|
|||||||
kind: 'Role',
|
kind: 'Role',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'ksm-autoscaler',
|
name: 'ksm-autoscaler',
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.kubeStateMetrics.namespace,
|
||||||
},
|
},
|
||||||
rules: [
|
rules: [
|
||||||
{
|
{
|
||||||
@ -76,7 +76,7 @@
|
|||||||
kind: 'ServiceAccount',
|
kind: 'ServiceAccount',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'ksm-autoscaler',
|
name: 'ksm-autoscaler',
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.kubeStateMetrics.namespace,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -88,7 +88,7 @@
|
|||||||
args: [
|
args: [
|
||||||
'/cpvpa',
|
'/cpvpa',
|
||||||
'--target=deployment/kube-state-metrics',
|
'--target=deployment/kube-state-metrics',
|
||||||
'--namespace=' + $.values.common.namespace,
|
'--namespace=' + $.values.kubeStateMetrics.namespace,
|
||||||
'--logtostderr=true',
|
'--logtostderr=true',
|
||||||
'--poll-period-seconds=10',
|
'--poll-period-seconds=10',
|
||||||
'--default-config={"kube-state-metrics":{"requests":{"cpu":{"base":"' + $.values.clusterVerticalAutoscaler.baseCPU +
|
'--default-config={"kube-state-metrics":{"requests":{"cpu":{"base":"' + $.values.clusterVerticalAutoscaler.baseCPU +
|
||||||
@ -110,7 +110,7 @@
|
|||||||
kind: 'Deployment',
|
kind: 'Deployment',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'ksm-autoscaler',
|
name: 'ksm-autoscaler',
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.kubeStateMetrics.namespace,
|
||||||
labels: podLabels,
|
labels: podLabels,
|
||||||
},
|
},
|
||||||
spec: {
|
spec: {
|
||||||
|
|||||||
@ -59,7 +59,7 @@ local restrictedPodSecurityPolicy = {
|
|||||||
kind: 'Role',
|
kind: 'Role',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'alertmanager-' + $.values.alertmanager.name,
|
name: 'alertmanager-' + $.values.alertmanager.name,
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.alertmanager.namespace,
|
||||||
},
|
},
|
||||||
rules: [{
|
rules: [{
|
||||||
apiGroups: ['policy'],
|
apiGroups: ['policy'],
|
||||||
@ -74,7 +74,7 @@ local restrictedPodSecurityPolicy = {
|
|||||||
kind: 'RoleBinding',
|
kind: 'RoleBinding',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'alertmanager-' + $.values.alertmanager.name,
|
name: 'alertmanager-' + $.values.alertmanager.name,
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.alertmanager.namespace,
|
||||||
},
|
},
|
||||||
roleRef: {
|
roleRef: {
|
||||||
apiGroup: 'rbac.authorization.k8s.io',
|
apiGroup: 'rbac.authorization.k8s.io',
|
||||||
@ -132,7 +132,7 @@ local restrictedPodSecurityPolicy = {
|
|||||||
kind: 'Role',
|
kind: 'Role',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'grafana',
|
name: 'grafana',
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.grafana.namespace,
|
||||||
},
|
},
|
||||||
rules: [{
|
rules: [{
|
||||||
apiGroups: ['policy'],
|
apiGroups: ['policy'],
|
||||||
@ -147,7 +147,7 @@ local restrictedPodSecurityPolicy = {
|
|||||||
kind: 'RoleBinding',
|
kind: 'RoleBinding',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'grafana',
|
name: 'grafana',
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.grafana.namespace,
|
||||||
},
|
},
|
||||||
roleRef: {
|
roleRef: {
|
||||||
apiGroup: 'rbac.authorization.k8s.io',
|
apiGroup: 'rbac.authorization.k8s.io',
|
||||||
|
|||||||
@ -84,7 +84,7 @@
|
|||||||
type: 'Opaque',
|
type: 'Opaque',
|
||||||
metadata: {
|
metadata: {
|
||||||
name: 'kube-etcd-client-certs',
|
name: 'kube-etcd-client-certs',
|
||||||
namespace: $.values.common.namespace,
|
namespace: $.values.prometheus.namespace,
|
||||||
},
|
},
|
||||||
data: {
|
data: {
|
||||||
'etcd-client-ca.crt': std.base64($.values.etcd.clientCA),
|
'etcd-client-ca.crt': std.base64($.values.etcd.clientCA),
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user