-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: upgrade PO to 0.61.0-rhobs1 #234
Conversation
e348df8
to
91a724d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The failure might be related to the fact that the admission webhook's service inside the pod is now exposed on port 443 rather than 8443?
91a724d
to
11f62ba
Compare
Thank you for the pointer. I had noticed it. The issue was that I was modifying only the prometheusrule validating webhook to adapt to the changes to admission-webhook but not the alertmanager-config validating webhook and the service generated by OLM resulted in conflict. I have fixed that now by
|
11f62ba
to
2a692dc
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 Thanks!
name: obo-prometheus-operator-admission-webhook | ||
namespace: operators | ||
path: /admission-prometheusrules/validate | ||
port: 8443 | ||
failurePolicy: Ignore | ||
failurePolicy: Fail |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wouldn't change the failure policy as part of this PR. 'Fail' means that applying PrometheusRule will be rejected when the admission webhook service is unavailable or unreachable. We haven't found a good solution for this in CMO for instance.
deploy/dependencies/admission-webhook/alertmanager-config-validating-webhook.yaml
Outdated
Show resolved
Hide resolved
deploy/dependencies/admission-webhook/prometheus-rule-validating-webhook.yaml
Outdated
Show resolved
Hide resolved
Admission Webhook Deployment relies on certs injected by OLM, thus this commit removes tls-certificates volume mounts from admission-webhook deployment. Signed-off-by: Sunil Thaha <sthaha@redhat.com>
00b4060
to
af170a3
Compare
No description provided.