-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NETOBSERV-1295: Fix cacert monitoring copy #414
Conversation
@OlivierCazade: This pull request references NETOBSERV-1295 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Codecov ReportPatch coverage:
Additional details and impacted files@@ Coverage Diff @@
## main #414 +/- ##
==========================================
- Coverage 56.22% 55.41% -0.82%
==========================================
Files 46 46
Lines 5960 5995 +35
==========================================
- Hits 3351 3322 -29
- Misses 2383 2438 +55
- Partials 226 235 +9
Flags with carried forward coverage won't be shown. Click here to find out more.
☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
code lgtm
/ok-to-test |
New images:
They will expire after two weeks. To deploy this build: # Direct deployment, from operator repo
IMAGE=quay.io/netobserv/network-observability-operator:95e04c9 make deploy
# Or using operator-sdk
operator-sdk run bundle quay.io/netobserv/network-observability-operator-bundle:v0.0.0-95e04c9 Or as a Catalog Source: apiVersion: operators.coreos.com/v1alpha1
kind: CatalogSource
metadata:
name: netobserv-dev
namespace: openshift-marketplace
spec:
sourceType: grpc
image: quay.io/netobserv/network-observability-operator-catalog:v0.0.0-95e04c9
displayName: NetObserv development catalog
publisher: Me
updateStrategy:
registryPoll:
interval: 1m |
MonitoringNamespace = "openshift-monitoring" | ||
MonitoringServiceAccount = "prometheus-k8s" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what are these hard coded values for?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Constants for monitoring namespace and monitoring role, they were already there, I just moved them to the constant file since they are now used at different places.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@OlivierCazade - I am still getting error with the Operator image from this PR:
Warning FailedMount 3s (x6 over 18s) kubelet MountVolume.SetUp failed for volume "prom-certs" : configmap "prov-certs-ns" not found
$ oc get csv/netobserv-operator.v0.0.0-95e04c9 -n openshift-netobserv-operator -o yaml | egrep -A 1 "DOWN"
- --downstream-deployment=$(DOWNSTREAM_DEPLOYMENT)
command:
--
- name: DOWNSTREAM_DEPLOYMENT
value: "true"
OCP: 4.14.0-0.nightly-2023-09-12-024050
NetObserv operator: v0.0.0-95e04c9
Loki: 0-click-loki
eBPF-agent: main
FLP: main
ConsolePlugin: main
Using config:
tls:
insecureSkipVerify: false
provided:
certFile: tls.crt
certKey: tls.key
name: prov-certs-ns
namespace: netobserv-cm
type: configmap
providedCaFile:
file: rootCA.crt
name: prov-certs-ca-ns
namespace: netobserv-cm
type: configmap
type: PROVIDED
$ oc get cm -n netobserv-cm
NAME DATA AGE
kube-root-ca.crt 1 8m48s
openshift-service-ca.crt 1 8m48s
prov-certs-ca-ns 1 7m56s
prov-certs-ns 2 8m5s
Thanks @memodi. My initial PR was to fix the CaCert copy when in a different namespace, but it turn out there was also a bug with the old provided certs when they are also in a different namespace. Updated PR should resolve both. |
/ok-to-test |
New images:
They will expire after two weeks. To deploy this build: # Direct deployment, from operator repo
IMAGE=quay.io/netobserv/network-observability-operator:60dfe0a make deploy
# Or using operator-sdk
operator-sdk run bundle quay.io/netobserv/network-observability-operator-bundle:v0.0.0-60dfe0a Or as a Catalog Source: apiVersion: operators.coreos.com/v1alpha1
kind: CatalogSource
metadata:
name: netobserv-dev
namespace: openshift-marketplace
spec:
sourceType: grpc
image: quay.io/netobserv/network-observability-operator-catalog:v0.0.0-60dfe0a
displayName: NetObserv development catalog
publisher: Me
updateStrategy:
registryPoll:
interval: 1m |
/ok-to-test |
New images:
They will expire after two weeks. To deploy this build: # Direct deployment, from operator repo
IMAGE=quay.io/netobserv/network-observability-operator:47510aa make deploy
# Or using operator-sdk
operator-sdk run bundle quay.io/netobserv/network-observability-operator-bundle:v0.0.0-47510aa Or as a Catalog Source: apiVersion: operators.coreos.com/v1alpha1
kind: CatalogSource
metadata:
name: netobserv-dev
namespace: openshift-marketplace
spec:
sourceType: grpc
image: quay.io/netobserv/network-observability-operator-catalog:v0.0.0-47510aa
displayName: NetObserv development catalog
publisher: Me
updateStrategy:
registryPoll:
interval: 1m |
/label qe-approved |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: OlivierCazade The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Description
Add certificate copy to monitoring namespace.
Dependencies
n/a
Checklist
If you are not familiar with our processes or don't know what to answer in the list below, let us know in a comment: the maintainers will take care of that.