-
Notifications
You must be signed in to change notification settings - Fork 462
/
secret.go
113 lines (96 loc) · 3.33 KB
/
secret.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and Gardener contributors
//
// SPDX-License-Identifier: Apache-2.0
package prometheus
import (
"fmt"
"strings"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"github.com/gardener/gardener/pkg/utils"
)
const (
secretNameSuffixAdditionalScrapeConfigs = "-additional-scrape-configs"
secretNameSuffixAdditionalAlertRelabelConfigs = "-additional-alert-relabel-configs"
secretNameSuffixAdditionalAlertmanagerConfigs = "-additional-alertmanager-configs"
secretNameSuffixRemoteWriteBasicAuth = "-remote-write-basic-auth"
)
func (p *prometheus) secretAdditionalScrapeConfigs() *corev1.Secret {
var scrapeConfigs strings.Builder
for _, config := range p.values.CentralConfigs.AdditionalScrapeConfigs {
scrapeConfigs.WriteString(fmt.Sprintf("- %s\n", utils.Indent(config, 2)))
}
return &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: p.name() + secretNameSuffixAdditionalScrapeConfigs,
Namespace: p.namespace,
Labels: p.getLabels(),
},
Type: corev1.SecretTypeOpaque,
Data: map[string][]byte{dataKeyAdditionalScrapeConfigs: []byte(scrapeConfigs.String())},
}
}
func (p *prometheus) secretAdditionalAlertRelabelConfigs() *corev1.Secret {
if p.values.Alerting == nil {
return nil
}
return &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: p.name() + secretNameSuffixAdditionalAlertRelabelConfigs,
Namespace: p.namespace,
Labels: p.getLabels(),
},
Type: corev1.SecretTypeOpaque,
Data: map[string][]byte{dataKeyAdditionalAlertRelabelConfigs: []byte(`
- source_labels: [ ignoreAlerts ]
regex: true
action: drop
`)},
}
}
func (p *prometheus) secretAdditionalAlertmanagerConfigs() *corev1.Secret {
if p.values.Alerting == nil || p.values.Alerting.AdditionalAlertmanager == nil {
return nil
}
config := `
static_configs:
- targets:
- ` + string(p.values.Alerting.AdditionalAlertmanager["url"])
switch string(p.values.Alerting.AdditionalAlertmanager["auth_type"]) {
case "basic":
config += `
basic_auth:
username: ` + string(p.values.Alerting.AdditionalAlertmanager["username"]) + `
password: ` + string(p.values.Alerting.AdditionalAlertmanager["password"])
case "certificate":
config += `
tls_config:
ca: ` + string(p.values.Alerting.AdditionalAlertmanager["ca.crt"]) + `
cert: ` + string(p.values.Alerting.AdditionalAlertmanager["tls.crt"]) + `
key: ` + string(p.values.Alerting.AdditionalAlertmanager["tls.key"]) + `
insecure_skip_verify: ` + string(p.values.Alerting.AdditionalAlertmanager["insecure_skip_verify"])
}
return &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: p.name() + secretNameSuffixAdditionalAlertmanagerConfigs,
Namespace: p.namespace,
Labels: p.getLabels(),
},
Type: corev1.SecretTypeOpaque,
Data: map[string][]byte{dataKeyAdditionalAlertmanagerConfigs: []byte(config)},
}
}
func (p *prometheus) secretRemoteWriteBasicAuth() *corev1.Secret {
if p.values.RemoteWrite == nil || p.values.RemoteWrite.GlobalShootRemoteWriteSecret == nil {
return nil
}
return &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: p.name() + secretNameSuffixRemoteWriteBasicAuth,
Namespace: p.namespace,
Labels: p.getLabels(),
},
Type: corev1.SecretTypeOpaque,
Data: p.values.RemoteWrite.GlobalShootRemoteWriteSecret.Data,
}
}