-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update monitoring role for config policy #40
Update monitoring role for config policy #40
Conversation
As mentioned in a comment in the metrics doc, our config policy metrics are not showing up on managed clusters, but it works on the hub I'm guessing because the roles are obtained another way. I followed this doc to make these updates: https://docs.openshift.com/container-platform/4.11/operators/operator_sdk/osdk-monitoring-prometheus.html After updating, the prometheus on the managed cluster was able to start collecting the metrics. Refs: - https://issues.redhat.com/browse/ACM-2324 Signed-off-by: Gus Parvin <[email protected]>
@@ -18,6 +18,9 @@ rules: | |||
resources: | |||
- services | |||
- pods | |||
- endpoints | |||
- nodes |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems odd that nodes are required here. I can kind of understand endpoints and maybe secrets though... But this is what's doc'd so, it seems good to me!
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: gparvin, JustinKuli The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@gparvin: cannot checkout In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Reducing the permissions added by pr #40 We discovered only the endpoints permission was needed. The secrets and nodes was not needed. Since those were documented there is a chance there could be some scenario where the extra permissions are needed. Preferring to keep the rbac more restrictive. Signed-off-by: Gus Parvin <[email protected]>
Reducing the permissions added by pr open-cluster-management-io/governance-policy-addon-controller#40 We discovered only the endpoints permission was needed. The secrets and nodes was not needed. Since those were documented there is a chance there could be some scenario where the extra permissions are needed. Preferring to keep the rbac more restrictive. Signed-off-by: Gus Parvin <[email protected]> (cherry picked from commit 1755befaf76eee44a7fe36a4a1f575d953f5d4fc)
Reducing the permissions added by pr open-cluster-management-io/governance-policy-addon-controller#40 We discovered only the endpoints permission was needed. The secrets and nodes was not needed. Since those were documented there is a chance there could be some scenario where the extra permissions are needed. Preferring to keep the rbac more restrictive. Signed-off-by: Gus Parvin <[email protected]> (cherry picked from commit 1755befaf76eee44a7fe36a4a1f575d953f5d4fc)
Reducing the permissions added by pr open-cluster-management-io/governance-policy-addon-controller#40 We discovered only the endpoints permission was needed. The secrets and nodes was not needed. Since those were documented there is a chance there could be some scenario where the extra permissions are needed. Preferring to keep the rbac more restrictive. Signed-off-by: Gus Parvin <[email protected]> (cherry picked from commit 1755befaf76eee44a7fe36a4a1f575d953f5d4fc)
Reducing the permissions added by pr open-cluster-management-io/governance-policy-addon-controller#40 We discovered only the endpoints permission was needed. The secrets and nodes was not needed. Since those were documented there is a chance there could be some scenario where the extra permissions are needed. Preferring to keep the rbac more restrictive. Signed-off-by: Gus Parvin <[email protected]> (cherry picked from commit 1755befaf76eee44a7fe36a4a1f575d953f5d4fc)
As mentioned in a comment in the metrics doc, our config policy metrics are not showing up on managed clusters, but it works on the hub I'm guessing because the roles are obtained another way. I followed this doc to make these updates:
https://docs.openshift.com/container-platform/4.11/operators/operator_sdk/osdk-monitoring-prometheus.html After updating, the prometheus on the managed cluster was able to start collecting the metrics.
Refs:
Signed-off-by: Gus Parvin [email protected]