-
Notifications
You must be signed in to change notification settings - Fork 14
ServiceMonitor: wrong caFile path #66
Comments
thanks, which cluster are you running on (distribution and version)? |
Amazon EKS (Kubernetes v1.21) and Prometheus v2.28.1. |
I see now. So you are deploying via helm on EKS. That |
Yes, it works with The only thing I had to workaround is that OpenShift has the Service annotation for its SSL certificate and I needed to create my own little piece of automation to compensate for that. I'll take a look at the patch operator, thank you. However, it will take a bit to migrate our GitOps tooling to it. Back to the original problem: wouldn't it make sense to leave your OpenShift value for the cert as sane default but simply make it overridable? |
The caFile in the
ServiceMonitor
for Prometheus needs to be updated.Old value:
/etc/prometheus/configmaps/serving-certs-ca-bundle/service-ca.crt
New value:
/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
With the old value, Prometheus will throw the following error
error creating HTTP client: unable to load specified CA cert /etc/prometheus/configmaps/serving-certs-ca-bundle/service-ca.crt: open /etc/prometheus/configmaps/serving-certs-ca-bundle/service-ca.crt: no such file or directory
The text was updated successfully, but these errors were encountered: