cleanup
This commit is contained in:
@@ -2,36 +2,16 @@
|
|||||||
namespace: ontime-operator
|
namespace: ontime-operator
|
||||||
|
|
||||||
# Value of this field is prepended to the
|
# Value of this field is prepended to the
|
||||||
# names of all resources, e.g. a deployment named
|
# names of all resources
|
||||||
# "wordpress" becomes "alices-wordpress".
|
|
||||||
# Note that it should also match with the prefix (text before '-') of the namespace
|
|
||||||
# field above.
|
|
||||||
namePrefix: ontime-operator-
|
namePrefix: ontime-operator-
|
||||||
|
|
||||||
# Labels to add to all resources and selectors.
|
|
||||||
#labels:
|
|
||||||
#- includeSelectors: true
|
|
||||||
# pairs:
|
|
||||||
# someName: someValue
|
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
- ../crd
|
- ../crd
|
||||||
- ../rbac
|
- ../rbac
|
||||||
- ../manager
|
- ../manager
|
||||||
# [PROMETHEUS] To enable prometheus monitor, uncomment all sections with 'PROMETHEUS'.
|
|
||||||
#- ../prometheus
|
|
||||||
# [METRICS] Expose the controller manager metrics service.
|
|
||||||
- metrics_service.yaml
|
- metrics_service.yaml
|
||||||
# [NETWORK POLICY] Protect the /metrics endpoint and Webhook Server with NetworkPolicy.
|
|
||||||
# Only Pod(s) running a namespace labeled with 'metrics: enabled' will be able to gather the metrics.
|
|
||||||
# Only CR(s) which requires webhooks and are applied on namespaces labeled with 'webhooks: enabled' will
|
|
||||||
# be able to communicate with the Webhook Server.
|
|
||||||
#- ../network-policy
|
|
||||||
|
|
||||||
# Uncomment the patches line if you enable Metrics
|
|
||||||
patches:
|
patches:
|
||||||
# [METRICS] The following patch will enable the metrics endpoint using HTTPS and the port :8443.
|
|
||||||
# More info: https://book.kubebuilder.io/reference/metrics
|
|
||||||
- path: manager_metrics_patch.yaml
|
- path: manager_metrics_patch.yaml
|
||||||
target:
|
target:
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
|
|||||||
@@ -1,27 +0,0 @@
|
|||||||
# This NetworkPolicy allows ingress traffic
|
|
||||||
# with Pods running on namespaces labeled with 'metrics: enabled'. Only Pods on those
|
|
||||||
# namespaces are able to gather data from the metrics endpoint.
|
|
||||||
apiVersion: networking.k8s.io/v1
|
|
||||||
kind: NetworkPolicy
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: ontime-operator
|
|
||||||
app.kubernetes.io/managed-by: kustomize
|
|
||||||
name: allow-metrics-traffic
|
|
||||||
namespace: system
|
|
||||||
spec:
|
|
||||||
podSelector:
|
|
||||||
matchLabels:
|
|
||||||
control-plane: controller-manager
|
|
||||||
app.kubernetes.io/name: ontime-operator
|
|
||||||
policyTypes:
|
|
||||||
- Ingress
|
|
||||||
ingress:
|
|
||||||
# This allows ingress traffic from any namespace with the label metrics: enabled
|
|
||||||
- from:
|
|
||||||
- namespaceSelector:
|
|
||||||
matchLabels:
|
|
||||||
metrics: enabled # Only from namespaces with this label
|
|
||||||
ports:
|
|
||||||
- port: 8443
|
|
||||||
protocol: TCP
|
|
||||||
@@ -1,2 +0,0 @@
|
|||||||
resources:
|
|
||||||
- allow-metrics-traffic.yaml
|
|
||||||
@@ -1,4 +0,0 @@
|
|||||||
resources:
|
|
||||||
- monitor.yaml
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1,27 +0,0 @@
|
|||||||
# Prometheus Monitor Service (Metrics)
|
|
||||||
apiVersion: monitoring.coreos.com/v1
|
|
||||||
kind: ServiceMonitor
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
control-plane: controller-manager
|
|
||||||
app.kubernetes.io/name: ontime-operator
|
|
||||||
app.kubernetes.io/managed-by: kustomize
|
|
||||||
name: controller-manager-metrics-monitor
|
|
||||||
namespace: system
|
|
||||||
spec:
|
|
||||||
endpoints:
|
|
||||||
- path: /metrics
|
|
||||||
port: https # Ensure this is the name of the port that exposes HTTPS metrics
|
|
||||||
scheme: https
|
|
||||||
bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token
|
|
||||||
tlsConfig:
|
|
||||||
# TODO(user): The option insecureSkipVerify: true is not recommended for production since it disables
|
|
||||||
# certificate verification, exposing the system to potential man-in-the-middle attacks.
|
|
||||||
# For production environments, it is recommended to use cert-manager for automatic TLS certificate management.
|
|
||||||
# To apply this configuration, enable cert-manager and use the patch located at config/prometheus/servicemonitor_tls_patch.yaml,
|
|
||||||
# which securely references the certificate from the 'metrics-server-cert' secret.
|
|
||||||
insecureSkipVerify: true
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
control-plane: controller-manager
|
|
||||||
app.kubernetes.io/name: ontime-operator
|
|
||||||
Reference in New Issue
Block a user