-
Story
-
Resolution: Done
-
Major
-
None
-
5
-
False
-
None
-
False
-
SECFLOWOTL-87 - Operator to handle fleets of ArgoCD CRs
-
-
-
-
GITOPS Sprint 241, GITOPS Sprint 243, GITOPS Sprint 3244, GITOPS Sprint 3245
Once Argo CD operator is emitting the necessary metrics out, GitOps operator needs to be able to consume those changes and also emit those same metrics out. Further, in order for openshift monitoring to pick up the metrics being emitted, the following things must be done:
- Add kube-rbac-proxy container to the operator deployment
- Add a metrics service annotated with `service.beta.openshift.io/serving-cert-secret-name` with some value, which will instruct ca-operator to generate a cert and inject it into a secret with the given name
- Add a service monitor that can watch the created service, and specifies the bearertokenfile path and appropriate tlsConfig values for Prometheus
- A role and rolebinding that allows the openshfit-monitoring stack prometheus serviceaccount to access pods, endpoints and services within the gitops operator namespace
- update all labels on gitops-operator manifests to `control-plane: gitops-operator`
Acceptance criteria:
- All the above detailed steps are carried out in a PR
- GitOps metrics are displayed under observe > metrics in the admin console
- is blocked by
-
GITOPS-3073 change gitops-operator installation namespace
- Closed
- links to