Skip to content
Snippets Groups Projects
Unverified Commit 124eed6c authored by Paweł Krupa's avatar Paweł Krupa Committed by GitHub
Browse files

Merge pull request #1518 from PaytmLabs/hotfix/addons/scope-values-namespace

parents fcd8d01f 80d04a1d
No related branches found
No related tags found
No related merge requests found
...@@ -46,7 +46,7 @@ ...@@ -46,7 +46,7 @@
spec+: spec+:
$.antiaffinity( $.antiaffinity(
$.alertmanager._config.selectorLabels, $.alertmanager._config.selectorLabels,
$.values.common.namespace, $.values.alertmanager.namespace,
$.values.alertmanager.podAntiAffinity, $.values.alertmanager.podAntiAffinity,
$.values.alertmanager.podAntiAffinityTopologyKey, $.values.alertmanager.podAntiAffinityTopologyKey,
), ),
...@@ -58,7 +58,7 @@ ...@@ -58,7 +58,7 @@
spec+: spec+:
$.antiaffinity( $.antiaffinity(
$.prometheus._config.selectorLabels, $.prometheus._config.selectorLabels,
$.values.common.namespace, $.values.prometheus.namespace,
$.values.prometheus.podAntiAffinity, $.values.prometheus.podAntiAffinity,
$.values.prometheus.podAntiAffinityTopologyKey, $.values.prometheus.podAntiAffinityTopologyKey,
), ),
...@@ -72,7 +72,7 @@ ...@@ -72,7 +72,7 @@
spec+: spec+:
$.antiaffinity( $.antiaffinity(
$.blackboxExporter._config.selectorLabels, $.blackboxExporter._config.selectorLabels,
$.values.common.namespace, $.values.blackboxExporter.namespace,
$.values.blackboxExporter.podAntiAffinity, $.values.blackboxExporter.podAntiAffinity,
$.values.blackboxExporter.podAntiAffinityTopologyKey, $.values.blackboxExporter.podAntiAffinityTopologyKey,
), ),
...@@ -88,7 +88,7 @@ ...@@ -88,7 +88,7 @@
spec+: spec+:
$.antiaffinity( $.antiaffinity(
$.prometheusAdapter._config.selectorLabels, $.prometheusAdapter._config.selectorLabels,
$.values.common.namespace, $.values.prometheusAdapter.namespace,
$.values.prometheusAdapter.podAntiAffinity, $.values.prometheusAdapter.podAntiAffinity,
$.values.prometheusAdapter.podAntiAffinityTopologyKey, $.values.prometheusAdapter.podAntiAffinityTopologyKey,
), ),
......
...@@ -37,7 +37,7 @@ ...@@ -37,7 +37,7 @@
kind: 'ServiceMonitor', kind: 'ServiceMonitor',
metadata: { metadata: {
name: 'aws-node', name: 'aws-node',
namespace: $.values.common.namespace, namespace: $.values.kubernetesControlPlane.namespace,
labels: { labels: {
'app.kubernetes.io/name': 'aws-node', 'app.kubernetes.io/name': 'aws-node',
}, },
......
...@@ -4,7 +4,7 @@ ...@@ -4,7 +4,7 @@
{ {
values+:: { values+:: {
prometheusAdapter+: { prometheusAdapter+: {
namespace: $.values.common.namespace, namespace: $.values.prometheusAdapter.namespace,
// Rules for custom-metrics // Rules for custom-metrics
config+:: { config+:: {
rules+: [ rules+: [
......
...@@ -4,7 +4,6 @@ ...@@ -4,7 +4,6 @@
{ {
values+:: { values+:: {
prometheusAdapter+: { prometheusAdapter+: {
namespace: $.values.common.namespace,
// Rules for external-metrics // Rules for external-metrics
config+:: { config+:: {
externalRules+: [ externalRules+: [
......
...@@ -30,7 +30,7 @@ ...@@ -30,7 +30,7 @@
kind: 'ClusterRole', kind: 'ClusterRole',
name: 'ksm-autoscaler', name: 'ksm-autoscaler',
}, },
subjects: [{ kind: 'ServiceAccount', name: 'ksm-autoscaler', namespace: $.values.common.namespace }], subjects: [{ kind: 'ServiceAccount', name: 'ksm-autoscaler', namespace: $.values.kubeStateMetrics.namespace }],
}, },
roleBinding: { roleBinding: {
...@@ -38,7 +38,7 @@ ...@@ -38,7 +38,7 @@
kind: 'RoleBinding', kind: 'RoleBinding',
metadata: { metadata: {
name: 'ksm-autoscaler', name: 'ksm-autoscaler',
namespace: $.values.common.namespace, namespace: $.values.kubeStateMetrics.namespace,
}, },
roleRef: { roleRef: {
apiGroup: 'rbac.authorization.k8s.io', apiGroup: 'rbac.authorization.k8s.io',
...@@ -53,7 +53,7 @@ ...@@ -53,7 +53,7 @@
kind: 'Role', kind: 'Role',
metadata: { metadata: {
name: 'ksm-autoscaler', name: 'ksm-autoscaler',
namespace: $.values.common.namespace, namespace: $.values.kubeStateMetrics.namespace,
}, },
rules: [ rules: [
{ {
...@@ -76,7 +76,7 @@ ...@@ -76,7 +76,7 @@
kind: 'ServiceAccount', kind: 'ServiceAccount',
metadata: { metadata: {
name: 'ksm-autoscaler', name: 'ksm-autoscaler',
namespace: $.values.common.namespace, namespace: $.values.kubeStateMetrics.namespace,
}, },
}, },
...@@ -88,7 +88,7 @@ ...@@ -88,7 +88,7 @@
args: [ args: [
'/cpvpa', '/cpvpa',
'--target=deployment/kube-state-metrics', '--target=deployment/kube-state-metrics',
'--namespace=' + $.values.common.namespace, '--namespace=' + $.values.kubeStateMetrics.namespace,
'--logtostderr=true', '--logtostderr=true',
'--poll-period-seconds=10', '--poll-period-seconds=10',
'--default-config={"kube-state-metrics":{"requests":{"cpu":{"base":"' + $.values.clusterVerticalAutoscaler.baseCPU + '--default-config={"kube-state-metrics":{"requests":{"cpu":{"base":"' + $.values.clusterVerticalAutoscaler.baseCPU +
...@@ -110,7 +110,7 @@ ...@@ -110,7 +110,7 @@
kind: 'Deployment', kind: 'Deployment',
metadata: { metadata: {
name: 'ksm-autoscaler', name: 'ksm-autoscaler',
namespace: $.values.common.namespace, namespace: $.values.kubeStateMetrics.namespace,
labels: podLabels, labels: podLabels,
}, },
spec: { spec: {
......
...@@ -59,7 +59,7 @@ local restrictedPodSecurityPolicy = { ...@@ -59,7 +59,7 @@ local restrictedPodSecurityPolicy = {
kind: 'Role', kind: 'Role',
metadata: { metadata: {
name: 'alertmanager-' + $.values.alertmanager.name, name: 'alertmanager-' + $.values.alertmanager.name,
namespace: $.values.common.namespace, namespace: $.values.alertmanager.namespace,
}, },
rules: [{ rules: [{
apiGroups: ['policy'], apiGroups: ['policy'],
...@@ -74,7 +74,7 @@ local restrictedPodSecurityPolicy = { ...@@ -74,7 +74,7 @@ local restrictedPodSecurityPolicy = {
kind: 'RoleBinding', kind: 'RoleBinding',
metadata: { metadata: {
name: 'alertmanager-' + $.values.alertmanager.name, name: 'alertmanager-' + $.values.alertmanager.name,
namespace: $.values.common.namespace, namespace: $.values.alertmanager.namespace,
}, },
roleRef: { roleRef: {
apiGroup: 'rbac.authorization.k8s.io', apiGroup: 'rbac.authorization.k8s.io',
...@@ -132,7 +132,7 @@ local restrictedPodSecurityPolicy = { ...@@ -132,7 +132,7 @@ local restrictedPodSecurityPolicy = {
kind: 'Role', kind: 'Role',
metadata: { metadata: {
name: 'grafana', name: 'grafana',
namespace: $.values.common.namespace, namespace: $.values.grafana.namespace,
}, },
rules: [{ rules: [{
apiGroups: ['policy'], apiGroups: ['policy'],
...@@ -147,7 +147,7 @@ local restrictedPodSecurityPolicy = { ...@@ -147,7 +147,7 @@ local restrictedPodSecurityPolicy = {
kind: 'RoleBinding', kind: 'RoleBinding',
metadata: { metadata: {
name: 'grafana', name: 'grafana',
namespace: $.values.common.namespace, namespace: $.values.grafana.namespace,
}, },
roleRef: { roleRef: {
apiGroup: 'rbac.authorization.k8s.io', apiGroup: 'rbac.authorization.k8s.io',
......
...@@ -84,7 +84,7 @@ ...@@ -84,7 +84,7 @@
type: 'Opaque', type: 'Opaque',
metadata: { metadata: {
name: 'kube-etcd-client-certs', name: 'kube-etcd-client-certs',
namespace: $.values.common.namespace, namespace: $.values.prometheus.namespace,
}, },
data: { data: {
'etcd-client-ca.crt': std.base64($.values.etcd.clientCA), 'etcd-client-ca.crt': std.base64($.values.etcd.clientCA),
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment