-
Notifications
You must be signed in to change notification settings - Fork 718
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
5133460
commit efc23b1
Showing
568 changed files
with
127,372 additions
and
0 deletions.
There are no files selected for viewing
Binary file added
BIN
+398 KB
assets/rancher-monitoring-crd/rancher-monitoring-crd-103.0.1+up45.31.1.tgz
Binary file not shown.
Binary file not shown.
Binary file not shown.
10 changes: 10 additions & 0 deletions
10
charts/rancher-monitoring-crd/103.0.1+up45.31.1/Chart.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
annotations: | ||
catalog.cattle.io/certified: rancher | ||
catalog.cattle.io/hidden: "true" | ||
catalog.cattle.io/namespace: cattle-monitoring-system | ||
catalog.cattle.io/release-name: rancher-monitoring-crd | ||
apiVersion: v1 | ||
description: Installs the CRDs for rancher-monitoring. | ||
name: rancher-monitoring-crd | ||
type: application | ||
version: 103.0.1+up45.31.1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
# rancher-monitoring-crd | ||
A Rancher chart that installs the CRDs used by rancher-monitoring. | ||
|
||
## How does this chart work? | ||
|
||
This chart marshalls all of the CRD files placed in the `crd-manifest` directory into a ConfigMap that is installed onto a cluster alongside relevant RBAC (ServiceAccount, ClusterRoleBinding, ClusterRole, and PodSecurityPolicy). | ||
|
||
Once the relevant dependent resourcees are installed / upgraded / rolled back, this chart executes a post-install / post-upgrade / post-rollback Job that: | ||
- Patches any existing versions of the CRDs contained within the `crd-manifest` on the cluster to set `spec.preserveUnknownFields=false`; this step is required since, based on [Kubernetes docs](https://kubernetes.io/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#field-pruning) and a [known workaround](https://github.com/kubernetes-sigs/controller-tools/issues/476#issuecomment-691519936), such CRDs cannot be upgraded normally from `apiextensions.k8s.io/v1beta1` to `apiextensions.k8s.io/v1`. | ||
- Runs a `kubectl apply` on the CRDs that are contained within the crd-manifest ConfigMap to upgrade CRDs in the cluster | ||
|
||
On an uninstall, this chart executes a separate post-delete Job that: | ||
- Patches any existing versions of the CRDs contained within `crd-manifest` on the cluster to set `metadata.finalizers=[]` | ||
- Runs a `kubectl delete` on the CRDs that are contained within the crd-manifest ConfigMap to clean up the CRDs from the cluster | ||
|
||
Note: If the relevant CRDs already existed in the cluster at the time of install, this chart will absorb ownership of the lifecycle of those CRDs; therefore, on a `helm uninstall`, those CRDs will also be removed from the cluster alongside this chart. | ||
|
||
## Why can't we just place the CRDs in the templates/ directory of the main chart? | ||
|
||
In Helm today, you cannot declare a CRD and declare a resource of that CRD's kind in templates/ without encountering a failure on render. | ||
|
||
## [Helm 3] Why can't we just place the CRDs in the crds/ directory of the main chart? | ||
|
||
The Helm 3 `crds/` directory only supports the installation of CRDs, but does not support the upgrade and removal of CRDs, unlike what this chart facilitiates. |
4,481 changes: 4,481 additions & 0 deletions
4,481
charts/rancher-monitoring-crd/103.0.1+up45.31.1/crd-manifest/crd-alertmanagerconfigs.yaml
Large diffs are not rendered by default.
Oops, something went wrong.
7,112 changes: 7,112 additions & 0 deletions
7,112
charts/rancher-monitoring-crd/103.0.1+up45.31.1/crd-manifest/crd-alertmanagers.yaml
Large diffs are not rendered by default.
Oops, something went wrong.
666 changes: 666 additions & 0 deletions
666
charts/rancher-monitoring-crd/103.0.1+up45.31.1/crd-manifest/crd-podmonitors.yaml
Large diffs are not rendered by default.
Oops, something went wrong.
705 changes: 705 additions & 0 deletions
705
charts/rancher-monitoring-crd/103.0.1+up45.31.1/crd-manifest/crd-probes.yaml
Large diffs are not rendered by default.
Oops, something went wrong.
9,177 changes: 9,177 additions & 0 deletions
9,177
charts/rancher-monitoring-crd/103.0.1+up45.31.1/crd-manifest/crd-prometheuses.yaml
Large diffs are not rendered by default.
Oops, something went wrong.
120 changes: 120 additions & 0 deletions
120
charts/rancher-monitoring-crd/103.0.1+up45.31.1/crd-manifest/crd-prometheusrules.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,120 @@ | ||
# https://raw.githubusercontent.com/prometheus-operator/prometheus-operator/v0.63.0/example/prometheus-operator-crd/monitoring.coreos.com_prometheusrules.yaml | ||
--- | ||
apiVersion: apiextensions.k8s.io/v1 | ||
kind: CustomResourceDefinition | ||
metadata: | ||
annotations: | ||
controller-gen.kubebuilder.io/version: v0.11.1 | ||
creationTimestamp: null | ||
name: prometheusrules.monitoring.coreos.com | ||
spec: | ||
group: monitoring.coreos.com | ||
names: | ||
categories: | ||
- prometheus-operator | ||
kind: PrometheusRule | ||
listKind: PrometheusRuleList | ||
plural: prometheusrules | ||
shortNames: | ||
- promrule | ||
singular: prometheusrule | ||
scope: Namespaced | ||
versions: | ||
- name: v1 | ||
schema: | ||
openAPIV3Schema: | ||
description: PrometheusRule defines recording and alerting rules for a Prometheus | ||
instance | ||
properties: | ||
apiVersion: | ||
description: 'APIVersion defines the versioned schema of this representation | ||
of an object. Servers should convert recognized schemas to the latest | ||
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' | ||
type: string | ||
kind: | ||
description: 'Kind is a string value representing the REST resource this | ||
object represents. Servers may infer this from the endpoint the client | ||
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' | ||
type: string | ||
metadata: | ||
type: object | ||
spec: | ||
description: Specification of desired alerting rule definitions for Prometheus. | ||
properties: | ||
groups: | ||
description: Content of Prometheus rule file | ||
items: | ||
description: RuleGroup is a list of sequentially evaluated recording | ||
and alerting rules. | ||
properties: | ||
interval: | ||
description: Interval determines how often rules in the group | ||
are evaluated. | ||
pattern: ^(0|(([0-9]+)y)?(([0-9]+)w)?(([0-9]+)d)?(([0-9]+)h)?(([0-9]+)m)?(([0-9]+)s)?(([0-9]+)ms)?)$ | ||
type: string | ||
name: | ||
description: Name of the rule group. | ||
minLength: 1 | ||
type: string | ||
partial_response_strategy: | ||
description: 'PartialResponseStrategy is only used by ThanosRuler | ||
and will be ignored by Prometheus instances. More info: https://github.com/thanos-io/thanos/blob/main/docs/components/rule.md#partial-response' | ||
pattern: ^(?i)(abort|warn)?$ | ||
type: string | ||
rules: | ||
description: List of alerting and recording rules. | ||
items: | ||
description: 'Rule describes an alerting or recording rule | ||
See Prometheus documentation: [alerting](https://www.prometheus.io/docs/prometheus/latest/configuration/alerting_rules/) | ||
or [recording](https://www.prometheus.io/docs/prometheus/latest/configuration/recording_rules/#recording-rules) | ||
rule' | ||
properties: | ||
alert: | ||
description: Name of the alert. Must be a valid label | ||
value. Only one of `record` and `alert` must be set. | ||
type: string | ||
annotations: | ||
additionalProperties: | ||
type: string | ||
description: Annotations to add to each alert. Only valid | ||
for alerting rules. | ||
type: object | ||
expr: | ||
anyOf: | ||
- type: integer | ||
- type: string | ||
description: PromQL expression to evaluate. | ||
x-kubernetes-int-or-string: true | ||
for: | ||
description: Alerts are considered firing once they have | ||
been returned for this long. | ||
pattern: ^(0|(([0-9]+)y)?(([0-9]+)w)?(([0-9]+)d)?(([0-9]+)h)?(([0-9]+)m)?(([0-9]+)s)?(([0-9]+)ms)?)$ | ||
type: string | ||
labels: | ||
additionalProperties: | ||
type: string | ||
description: Labels to add or overwrite. | ||
type: object | ||
record: | ||
description: Name of the time series to output to. Must | ||
be a valid metric name. Only one of `record` and `alert` | ||
must be set. | ||
type: string | ||
required: | ||
- expr | ||
type: object | ||
type: array | ||
required: | ||
- name | ||
- rules | ||
type: object | ||
type: array | ||
x-kubernetes-list-map-keys: | ||
- name | ||
x-kubernetes-list-type: map | ||
type: object | ||
required: | ||
- spec | ||
type: object | ||
served: true | ||
storage: true |
Oops, something went wrong.