From 7435daba783f2e31a1fdf0fec00017a8bb55875b Mon Sep 17 00:00:00 2001 From: Denis Patrakeev Date: Tue, 4 Mar 2025 19:33:03 +0300 Subject: [PATCH] [hotfix] fix secret prometheus 2 (!95) Co-authored-by: denis.patrakeev Reviewed-on: https://git.avroid.tech/K8s/k8s-configs/pulls/95 --- .../monitoring/prometheus/values-override.yaml | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/clusters/k8s-avroid-office.prod.local/namespaces/cloud-prod/monitoring/prometheus/values-override.yaml b/clusters/k8s-avroid-office.prod.local/namespaces/cloud-prod/monitoring/prometheus/values-override.yaml index 8b781d7..fb72ed9 100644 --- a/clusters/k8s-avroid-office.prod.local/namespaces/cloud-prod/monitoring/prometheus/values-override.yaml +++ b/clusters/k8s-avroid-office.prod.local/namespaces/cloud-prod/monitoring/prometheus/values-override.yaml @@ -66,6 +66,15 @@ server: name: prometheus-secret key: consul.secret + ## Additional Prometheus server Secret mounts + # Defines additional mounts with secrets. Secrets must be manually created in the namespace. + extraSecretMounts: + - name: consul-secret + mountPath: /etc/secrets + subPath: "consul-secret" + secretName: prometheus-secret + readOnly: true + ingress: ## If true, Prometheus server Ingress will be created ## @@ -173,7 +182,7 @@ serverFiles: tags: [ k8s_postgres_exporter ] services: [ monitoring_k8s_postgres_exporter ] authorization: - credentials: ${CONSUL_SECRET} + credentials_file: /etc/secrets/consul-secret/consul.secret relabel_configs: - source_labels: [ __meta_consul_service_metadata_metrics_path ] target_label: __metrics_path__