/
deployment.yaml
113 lines (113 loc) · 4.21 KB
/
deployment.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/managed-by: cluster-monitoring-operator
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/part-of: openshift-monitoring
app.kubernetes.io/version: 0.63.0
name: prometheus-operator
namespace: openshift-user-workload-monitoring
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/component: controller
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/part-of: openshift-monitoring
template:
metadata:
annotations:
kubectl.kubernetes.io/default-container: prometheus-operator
target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}'
labels:
app.kubernetes.io/component: controller
app.kubernetes.io/managed-by: cluster-monitoring-operator
app.kubernetes.io/name: prometheus-operator
app.kubernetes.io/part-of: openshift-monitoring
app.kubernetes.io/version: 0.63.0
spec:
automountServiceAccountToken: true
containers:
- args:
- --prometheus-config-reloader=quay.io/prometheus-operator/prometheus-config-reloader:v0.63.0
- --prometheus-instance-namespaces=openshift-user-workload-monitoring
- --alertmanager-instance-namespaces=openshift-user-workload-monitoring
- --thanos-ruler-instance-namespaces=openshift-user-workload-monitoring
- --config-reloader-cpu-limit=0
- --config-reloader-memory-limit=0
- --config-reloader-cpu-request=1m
- --config-reloader-memory-request=10Mi
- --web.listen-address=127.0.0.1:8080
image: quay.io/prometheus-operator/prometheus-operator:v0.63.0
name: prometheus-operator
ports: []
resources:
requests:
cpu: 1m
memory: 17Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
terminationMessagePolicy: FallbackToLogsOnError
- args:
- --logtostderr
- --secure-listen-address=:8443
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --upstream=http://127.0.0.1:8080/
- --tls-cert-file=/etc/tls/private/tls.crt
- --tls-private-key-file=/etc/tls/private/tls.key
- --config-file=/etc/kube-rbac-policy/config.yaml
- --client-ca-file=/etc/tls/client/client-ca.crt
image: quay.io/brancz/kube-rbac-proxy:v0.14.1
name: kube-rbac-proxy
ports:
- containerPort: 8443
name: https
resources:
requests:
cpu: 1m
memory: 10Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /etc/tls/private
name: prometheus-operator-user-workload-tls
readOnly: true
- mountPath: /etc/kube-rbac-policy
name: prometheus-operator-uwm-kube-rbac-proxy-config
readOnly: true
- mountPath: /etc/tls/client
name: metrics-client-ca
readOnly: true
nodeSelector:
kubernetes.io/os: linux
node-role.kubernetes.io/master: ""
priorityClassName: openshift-user-critical
securityContext:
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
serviceAccountName: prometheus-operator
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
volumes:
- name: prometheus-operator-user-workload-tls
secret:
secretName: prometheus-operator-user-workload-tls
- name: prometheus-operator-uwm-kube-rbac-proxy-config
secret:
secretName: prometheus-operator-uwm-kube-rbac-proxy-config
- configMap:
name: metrics-client-ca
name: metrics-client-ca