From 2306736a0103bc1b133955a2aea20fecdcc70f4c Mon Sep 17 00:00:00 2001 From: Denis Patrakeev Date: Tue, 4 Mar 2025 20:25:12 +0300 Subject: [PATCH] [hotfix] change to ArgoCD Vault Plugin 4 (!99) Co-authored-by: denis.patrakeev Reviewed-on: https://git.avroid.tech/K8s/k8s-configs/pulls/99 --- .../prometheus/values-override.yaml | 22 ------------------- 1 file changed, 22 deletions(-) diff --git a/clusters/k8s-avroid-office.prod.local/namespaces/cloud-prod/monitoring/prometheus/values-override.yaml b/clusters/k8s-avroid-office.prod.local/namespaces/cloud-prod/monitoring/prometheus/values-override.yaml index 5654cd2..4d8a845 100644 --- a/clusters/k8s-avroid-office.prod.local/namespaces/cloud-prod/monitoring/prometheus/values-override.yaml +++ b/clusters/k8s-avroid-office.prod.local/namespaces/cloud-prod/monitoring/prometheus/values-override.yaml @@ -44,28 +44,6 @@ server: ## Maybe same with Ingress host name baseURL: "cloud-k8s-prometheus.avroid.tech" - ## Additional server container environment variables - ## - ## You specify this manually like you would a raw deployment manifest. - ## This means you can bind in environment variables from secrets. - ## - ## e.g. static environment variable: - ## - name: DEMO_GREETING - ## value: "Hello from the environment" - ## - ## e.g. secret environment variable: - ## - name: USERNAME - ## valueFrom: - ## secretKeyRef: - ## name: mysecret - ## key: username - env: - - name: CONSUL_SECRET - valueFrom: - secretKeyRef: - name: prometheus-secret - key: consul.secret - ## Additional Prometheus server Secret mounts # Defines additional mounts with secrets. Secrets must be manually created in the namespace. extraSecretMounts: