mirror of
https://github.com/prometheus/prometheus.git
synced 2024-12-25 13:44:05 -08:00
Merge pull request #10235 from roidelapluie/ownnamespace
Followup on k8s' "own namespace" feature
This commit is contained in:
commit
1ba40dd4ec
|
@ -1181,6 +1181,14 @@ var expectedErrors = []struct {
|
||||||
filename: "kubernetes_http_config_without_api_server.bad.yml",
|
filename: "kubernetes_http_config_without_api_server.bad.yml",
|
||||||
errMsg: "to use custom HTTP client configuration please provide the 'api_server' URL explicitly",
|
errMsg: "to use custom HTTP client configuration please provide the 'api_server' URL explicitly",
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
filename: "kubernetes_kubeconfig_with_own_namespace.bad.yml",
|
||||||
|
errMsg: "cannot use 'kubeconfig_file' and 'namespaces.own_namespace' simultaneously",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
filename: "kubernetes_api_server_with_own_namespace.bad.yml",
|
||||||
|
errMsg: "cannot use 'api_server' and 'namespaces.own_namespace' simultaneously",
|
||||||
|
},
|
||||||
{
|
{
|
||||||
filename: "kubernetes_kubeconfig_with_apiserver.bad.yml",
|
filename: "kubernetes_kubeconfig_with_apiserver.bad.yml",
|
||||||
errMsg: "cannot use 'kubeconfig_file' and 'api_server' simultaneously",
|
errMsg: "cannot use 'kubeconfig_file' and 'api_server' simultaneously",
|
||||||
|
|
7
config/testdata/kubernetes_api_server_with_own_namespace.bad.yml
vendored
Normal file
7
config/testdata/kubernetes_api_server_with_own_namespace.bad.yml
vendored
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
scrape_configs:
|
||||||
|
- job_name: prometheus
|
||||||
|
kubernetes_sd_configs:
|
||||||
|
- role: endpoints
|
||||||
|
api_server: 'https://localhost:1234'
|
||||||
|
namespaces:
|
||||||
|
own_namespace: true
|
7
config/testdata/kubernetes_kubeconfig_with_own_namespace.bad.yml
vendored
Normal file
7
config/testdata/kubernetes_kubeconfig_with_own_namespace.bad.yml
vendored
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
scrape_configs:
|
||||||
|
- job_name: prometheus
|
||||||
|
kubernetes_sd_configs:
|
||||||
|
- role: endpoints
|
||||||
|
kubeconfig_file: /home/User1/.kubeconfig
|
||||||
|
namespaces:
|
||||||
|
own_namespace: true
|
|
@ -184,6 +184,12 @@ func (c *SDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error {
|
||||||
if c.APIServer.URL == nil && !reflect.DeepEqual(c.HTTPClientConfig, config.DefaultHTTPClientConfig) {
|
if c.APIServer.URL == nil && !reflect.DeepEqual(c.HTTPClientConfig, config.DefaultHTTPClientConfig) {
|
||||||
return errors.Errorf("to use custom HTTP client configuration please provide the 'api_server' URL explicitly")
|
return errors.Errorf("to use custom HTTP client configuration please provide the 'api_server' URL explicitly")
|
||||||
}
|
}
|
||||||
|
if c.APIServer.URL != nil && c.NamespaceDiscovery.IncludeOwnNamespace {
|
||||||
|
return errors.Errorf("cannot use 'api_server' and 'namespaces.own_namespace' simultaneously")
|
||||||
|
}
|
||||||
|
if c.KubeConfig != "" && c.NamespaceDiscovery.IncludeOwnNamespace {
|
||||||
|
return errors.Errorf("cannot use 'kubeconfig_file' and 'namespaces.own_namespace' simultaneously")
|
||||||
|
}
|
||||||
|
|
||||||
foundSelectorRoles := make(map[Role]struct{})
|
foundSelectorRoles := make(map[Role]struct{})
|
||||||
allowedSelectors := map[Role][]string{
|
allowedSelectors := map[Role][]string{
|
||||||
|
@ -276,8 +282,9 @@ func New(l log.Logger, conf *SDConfig) (*Discovery, error) {
|
||||||
l = log.NewNopLogger()
|
l = log.NewNopLogger()
|
||||||
}
|
}
|
||||||
var (
|
var (
|
||||||
kcfg *rest.Config
|
kcfg *rest.Config
|
||||||
err error
|
err error
|
||||||
|
ownNamespace string
|
||||||
)
|
)
|
||||||
if conf.KubeConfig != "" {
|
if conf.KubeConfig != "" {
|
||||||
kcfg, err = clientcmd.BuildConfigFromFlags("", conf.KubeConfig)
|
kcfg, err = clientcmd.BuildConfigFromFlags("", conf.KubeConfig)
|
||||||
|
@ -291,6 +298,18 @@ func New(l log.Logger, conf *SDConfig) (*Discovery, error) {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if conf.NamespaceDiscovery.IncludeOwnNamespace {
|
||||||
|
ownNamespaceContents, err := ioutil.ReadFile("/var/run/secrets/kubernetes.io/serviceaccount/namespace")
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("could not determine the pod's namespace: %w", err)
|
||||||
|
}
|
||||||
|
if len(ownNamespaceContents) == 0 {
|
||||||
|
return nil, errors.New("could not read own namespace name (empty file)")
|
||||||
|
}
|
||||||
|
ownNamespace = string(ownNamespaceContents)
|
||||||
|
}
|
||||||
|
|
||||||
level.Info(l).Log("msg", "Using pod service account via in-cluster config")
|
level.Info(l).Log("msg", "Using pod service account via in-cluster config")
|
||||||
} else {
|
} else {
|
||||||
rt, err := config.NewRoundTripperFromConfig(conf.HTTPClientConfig, "kubernetes_sd")
|
rt, err := config.NewRoundTripperFromConfig(conf.HTTPClientConfig, "kubernetes_sd")
|
||||||
|
@ -310,11 +329,6 @@ func New(l log.Logger, conf *SDConfig) (*Discovery, error) {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
ownNamespace, err := ioutil.ReadFile("/var/run/secrets/kubernetes.io/serviceaccount/namespace")
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("could not determine the pod's namespace: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return &Discovery{
|
return &Discovery{
|
||||||
client: c,
|
client: c,
|
||||||
logger: l,
|
logger: l,
|
||||||
|
@ -322,7 +336,7 @@ func New(l log.Logger, conf *SDConfig) (*Discovery, error) {
|
||||||
namespaceDiscovery: &conf.NamespaceDiscovery,
|
namespaceDiscovery: &conf.NamespaceDiscovery,
|
||||||
discoverers: make([]discovery.Discoverer, 0),
|
discoverers: make([]discovery.Discoverer, 0),
|
||||||
selectors: mapSelector(conf.Selectors),
|
selectors: mapSelector(conf.Selectors),
|
||||||
ownNamespace: string(ownNamespace),
|
ownNamespace: ownNamespace,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue