-
Notifications
You must be signed in to change notification settings - Fork 343
fix: openshift-gitops-operator-metrics-monitor ServiceMonitor is attempting to use a bearerTokenFile configuration in its endpoints definition #1005
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
…mpting to use a bearerTokenFile configuration in its endpoints definition Signed-off-by: akhil nittala <nakhil@redhat.com>
|
Skipping CI for Draft Pull Request. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
…mpting to use a bearerTokenFile configuration in its endpoints definition Signed-off-by: akhil nittala <nakhil@redhat.com>
…mpting to use a bearerTokenFile configuration in its endpoints definition Signed-off-by: akhil nittala <nakhil@redhat.com>
…mpting to use a bearerTokenFile configuration in its endpoints definition Signed-off-by: akhil nittala <nakhil@redhat.com>
…mpting to use a bearerTokenFile configuration in its endpoints definition Signed-off-by: akhil nittala <nakhil@redhat.com>
|
/retest |
|
/retest-required |
…mpting to use a bearerTokenFile configuration in its endpoints definition Signed-off-by: akhil nittala <nakhil@redhat.com>
anandf
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
What type of PR is this?
/kind bug
What does this PR do / why we need it:
The latest Prometheus upgrade enforces stricter security practices by requiring the use of Secrets and ConfigMaps for bearer tokens and TLS CA configurations. However, our current implementation references bearerTokenFile and tlsConfig.caFile using absolute filesystem paths. This approach is no longer permitted, as Prometheus now prohibits direct filesystem access for these files. As a result, the Prometheus Operator logs show errors when it attempts to access these paths.
Have you updated the necessary documentation?
Which issue(s) this PR fixes:
https://issues.redhat.com/browse/GITOPS-7992
Fixes #?
https://issues.redhat.com/browse/GITOPS-7992
Test acceptance criteria:
How to test changes / Special notes to the reviewer:
install gitops operator on oc cluster
make this change in cluster-monitoring-configmap like below