[hotfix] fix secret prometheus 2 (!95)
Co-authored-by: denis.patrakeev <denis.patrakeev@avroid.tech> Reviewed-on: https://git.avroid.tech/K8s/k8s-configs/pulls/95
This commit is contained in:
@@ -66,6 +66,15 @@ server:
|
|||||||
name: prometheus-secret
|
name: prometheus-secret
|
||||||
key: consul.secret
|
key: consul.secret
|
||||||
|
|
||||||
|
## Additional Prometheus server Secret mounts
|
||||||
|
# Defines additional mounts with secrets. Secrets must be manually created in the namespace.
|
||||||
|
extraSecretMounts:
|
||||||
|
- name: consul-secret
|
||||||
|
mountPath: /etc/secrets
|
||||||
|
subPath: "consul-secret"
|
||||||
|
secretName: prometheus-secret
|
||||||
|
readOnly: true
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
## If true, Prometheus server Ingress will be created
|
## If true, Prometheus server Ingress will be created
|
||||||
##
|
##
|
||||||
@@ -173,7 +182,7 @@ serverFiles:
|
|||||||
tags: [ k8s_postgres_exporter ]
|
tags: [ k8s_postgres_exporter ]
|
||||||
services: [ monitoring_k8s_postgres_exporter ]
|
services: [ monitoring_k8s_postgres_exporter ]
|
||||||
authorization:
|
authorization:
|
||||||
credentials: ${CONSUL_SECRET}
|
credentials_file: /etc/secrets/consul-secret/consul.secret
|
||||||
relabel_configs:
|
relabel_configs:
|
||||||
- source_labels: [ __meta_consul_service_metadata_metrics_path ]
|
- source_labels: [ __meta_consul_service_metadata_metrics_path ]
|
||||||
target_label: __metrics_path__
|
target_label: __metrics_path__
|
||||||
|
|||||||
Reference in New Issue
Block a user