-
Notifications
You must be signed in to change notification settings - Fork 64
🐛 Removing Unused and Insecure Manifests for Prometheus since its integration is not supported #1535
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🐛 Removing Unused and Insecure Manifests for Prometheus since its integration is not supported #1535
Conversation
… integration is not supported We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
✅ Deploy Preview for olmv1 ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #1535 +/- ##
=======================================
Coverage 74.25% 74.25%
=======================================
Files 42 42
Lines 3329 3329
=======================================
Hits 2472 2472
Misses 676 676
Partials 181 181
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
de6a813
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
… integration is not supported (operator-framework#1535) We are not using these manifests or supporting this option. Therefore, they should be removed, as they are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default. If we want enable this option then we need configure it with: ```yaml apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: control-plane: operator-controller-controller-manager name: controller-manager-metrics-monitor namespace: system spec: endpoints: - path: /metrics port: https scheme: https bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token tlsConfig: insecureSkipVerify: false ca: secret: name: olmv1-cert key: ca.crt cert: secret: name: olmv1-cert key: tls.cert keySecret: name: olmv1-cert key: tls.key selector: matchLabels: control-plane: operator-controller-controller-manager ```
We are not using these manifests or supporting this option. Therefore, they should be removed. They are not configured to use certificates and have insecureSkipVerify: false, which promotes an insecure setup by default.
As we discussed in the Community Meeting we agreed in remove those