Initial release

This commit is contained in:
2024-03-19 13:13:53 +01:00
commit 451fdb09fc
391 changed files with 184309 additions and 0 deletions

View File

@@ -0,0 +1,84 @@
# Source: opentelemetry-operator/templates/admission-webhooks/operator-webhook-with-cert-manager.yaml
apiVersion: admissionregistration.k8s.io/v1
kind: MutatingWebhookConfiguration
metadata:
annotations:
cert-manager.io/inject-ca-from: vynil-monitor/open-telemetry-opentelemetry-operator-serving-cert
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: webhook
name: open-telemetry-opentelemetry-operator-mutation
webhooks:
- admissionReviewVersions:
- v1
clientConfig:
service:
name: open-telemetry-opentelemetry-operator-webhook
namespace: vynil-monitor
path: /mutate-opentelemetry-io-v1alpha1-instrumentation
port: 443
failurePolicy: Fail
name: minstrumentation.kb.io
rules:
- apiGroups:
- opentelemetry.io
apiVersions:
- v1alpha1
operations:
- CREATE
- UPDATE
resources:
- instrumentations
scope: Namespaced
sideEffects: None
timeoutSeconds: 10
- admissionReviewVersions:
- v1
clientConfig:
service:
name: open-telemetry-opentelemetry-operator-webhook
namespace: vynil-monitor
path: /mutate-opentelemetry-io-v1alpha1-opentelemetrycollector
port: 443
failurePolicy: Fail
name: mopentelemetrycollector.kb.io
rules:
- apiGroups:
- opentelemetry.io
apiVersions:
- v1alpha1
operations:
- CREATE
- UPDATE
resources:
- opentelemetrycollectors
scope: Namespaced
sideEffects: None
timeoutSeconds: 10
- admissionReviewVersions:
- v1
clientConfig:
service:
name: open-telemetry-opentelemetry-operator-webhook
namespace: vynil-monitor
path: /mutate-v1-pod
port: 443
failurePolicy: Ignore
name: mpod.kb.io
rules:
- apiGroups:
- ""
apiVersions:
- v1
operations:
- CREATE
- UPDATE
resources:
- pods
scope: Namespaced
sideEffects: None
timeoutSeconds: 10

View File

@@ -0,0 +1,105 @@
# Source: opentelemetry-operator/templates/admission-webhooks/operator-webhook-with-cert-manager.yaml
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
annotations:
cert-manager.io/inject-ca-from: vynil-monitor/open-telemetry-opentelemetry-operator-serving-cert
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: webhook
name: open-telemetry-opentelemetry-operator-validation
webhooks:
- admissionReviewVersions:
- v1
clientConfig:
service:
name: open-telemetry-opentelemetry-operator-webhook
namespace: vynil-monitor
path: /validate-opentelemetry-io-v1alpha1-instrumentation
port: 443
failurePolicy: Fail
name: vinstrumentationcreateupdate.kb.io
rules:
- apiGroups:
- opentelemetry.io
apiVersions:
- v1alpha1
operations:
- CREATE
- UPDATE
resources:
- instrumentations
scope: Namespaced
sideEffects: None
timeoutSeconds: 10
- admissionReviewVersions:
- v1
clientConfig:
service:
name: open-telemetry-opentelemetry-operator-webhook
namespace: vynil-monitor
path: /validate-opentelemetry-io-v1alpha1-instrumentation
port: 443
failurePolicy: Ignore
name: vinstrumentationdelete.kb.io
rules:
- apiGroups:
- opentelemetry.io
apiVersions:
- v1alpha1
operations:
- DELETE
resources:
- instrumentations
scope: Namespaced
sideEffects: None
timeoutSeconds: 10
- admissionReviewVersions:
- v1
clientConfig:
service:
name: open-telemetry-opentelemetry-operator-webhook
namespace: vynil-monitor
path: /validate-opentelemetry-io-v1alpha1-opentelemetrycollector
port: 443
failurePolicy: Fail
name: vopentelemetrycollectorcreateupdate.kb.io
rules:
- apiGroups:
- opentelemetry.io
apiVersions:
- v1alpha1
operations:
- CREATE
- UPDATE
resources:
- opentelemetrycollectors
scope: Namespaced
sideEffects: None
timeoutSeconds: 10
- admissionReviewVersions:
- v1
clientConfig:
service:
name: open-telemetry-opentelemetry-operator-webhook
namespace: vynil-monitor
path: /validate-opentelemetry-io-v1alpha1-opentelemetrycollector
port: 443
failurePolicy: Ignore
name: vopentelemetrycollectordelete.kb.io
rules:
- apiGroups:
- opentelemetry.io
apiVersions:
- v1alpha1
operations:
- DELETE
resources:
- opentelemetrycollectors
scope: Namespaced
sideEffects: None
timeoutSeconds: 10

View File

@@ -0,0 +1,113 @@
# Source: opentelemetry-operator/templates/deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator
namespace: vynil-monitor
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/component: controller-manager
template:
metadata:
annotations:
kubectl.kubernetes.io/default-container: manager
labels:
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/component: controller-manager
spec:
hostNetwork: false
containers:
- args:
- --metrics-addr=0.0.0.0:8080
- --enable-leader-election
- --health-probe-addr=:8081
- --webhook-port=9443
- --collector-image=otel/opentelemetry-collector-contrib:0.95.0
command:
- /manager
env:
- name: ENABLE_WEBHOOKS
value: "true"
image: "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator:0.95.0"
name: manager
ports:
- containerPort: 8080
name: metrics
protocol: TCP
- containerPort: 9443
name: webhook-server
protocol: TCP
livenessProbe:
httpGet:
path: /healthz
port: 8081
initialDelaySeconds: 15
periodSeconds: 20
readinessProbe:
httpGet:
path: /readyz
port: 8081
initialDelaySeconds: 5
periodSeconds: 10
resources:
limits:
cpu: 100m
memory: 128Mi
requests:
cpu: 100m
memory: 64Mi
volumeMounts:
- mountPath: /tmp/k8s-webhook-server/serving-certs
name: cert
readOnly: true
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
- args:
- --secure-listen-address=0.0.0.0:8443
- --upstream=http://127.0.0.1:8080/
- --logtostderr=true
- --v=0
image: "quay.io/brancz/kube-rbac-proxy:v0.15.0"
name: kube-rbac-proxy
ports:
- containerPort: 8443
name: https
protocol: TCP
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 5m
memory: 64Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
serviceAccountName: opentelemetry-operator
terminationGracePeriodSeconds: 10
volumes:
- name: cert
secret:
defaultMode: 420
secretName: open-telemetry-opentelemetry-operator-controller-manager-service-cert
securityContext:
fsGroup: 65532
runAsGroup: 65532
runAsNonRoot: true
runAsUser: 65532

View File

@@ -0,0 +1,24 @@
# Source: opentelemetry-operator/templates/certmanager.yaml
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: webhook
name: open-telemetry-opentelemetry-operator-serving-cert
namespace: vynil-monitor
spec:
dnsNames:
- open-telemetry-opentelemetry-operator-webhook.vynil-monitor.svc
- open-telemetry-opentelemetry-operator-webhook.vynil-monitor.svc.cluster.local
issuerRef:
kind: Issuer
name: open-telemetry-opentelemetry-operator-selfsigned-issuer
secretName: open-telemetry-opentelemetry-operator-controller-manager-service-cert
subject:
organizationalUnits:
- open-telemetry-opentelemetry-operator

View File

@@ -0,0 +1,15 @@
# Source: opentelemetry-operator/templates/certmanager.yaml
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: webhook
name: open-telemetry-opentelemetry-operator-selfsigned-issuer
namespace: vynil-monitor
spec:
selfSigned: {}

View File

@@ -0,0 +1,122 @@
locals {
common-labels = {
"vynil.solidite.fr/owner-name" = var.instance
"vynil.solidite.fr/owner-namespace" = var.namespace
"vynil.solidite.fr/owner-category" = var.category
"vynil.solidite.fr/owner-component" = var.component
"app.kubernetes.io/managed-by" = "vynil"
"app.kubernetes.io/name" = var.component
"app.kubernetes.io/instance" = var.instance
}
rb-patch = <<-EOF
- op: replace
path: /subjects/0/namespace
value: "${var.namespace}"
EOF
}
data "kustomization_overlay" "data" {
common_labels = local.common-labels
namespace = var.namespace
resources = [for file in fileset(path.module, "*.yaml"): file if file != "index.yaml" && length(regexall("ClusterRole",file))<1 && length(regexall("WebhookConfiguration",file))<1]
images {
name = "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator"
new_name = "${var.images.operator.registry}/${var.images.operator.repository}"
new_tag = "${var.images.operator.tag}"
}
images {
name = "quay.io/brancz/kube-rbac-proxy"
new_name = "${var.images.rbac_proxy.registry}/${var.images.rbac_proxy.repository}"
new_tag = "${var.images.rbac_proxy.tag}"
}
patches {
target {
kind = "Certificate"
name = "open-telemetry-opentelemetry-operator-serving-cert"
}
patch = <<-EOF
- op: replace
path: /spec/dnsNames/0
value: "open-telemetry-opentelemetry-operator-webhook.${var.namespace}.svc"
- op: replace
path: /spec/dnsNames/1
value: "open-telemetry-opentelemetry-operator-webhook.${var.namespace}.svc.cluster.local"
EOF
}
patches {
target {
kind = "Deployment"
name = "open-telemetry-opentelemetry-operator"
}
patch = <<-EOF
apiVersion: apps/v1
kind: Deployment
metadata:
name: open-telemetry-opentelemetry-operator
spec:
replicas: ${var.replicas}
EOF
}
}
data "kustomization_overlay" "data_no_ns" {
common_labels = local.common-labels
resources = [for file in fileset(path.module, "*.yaml"): file if file != "index.yaml" && (length(regexall("ClusterRole",file))>0 || length(regexall("WebhookConfiguration",file))>0)]
patches {
target {
kind = "ClusterRoleBinding"
name = "open-telemetry-opentelemetry-operator-manager"
}
patch = local.rb-patch
}
patches {
target {
kind = "ClusterRoleBinding"
name = "open-telemetry-opentelemetry-operator-proxy"
}
patch = local.rb-patch
}
patches {
target {
kind = "MutatingWebhookConfiguration"
name = "open-telemetry-opentelemetry-operator-mutation"
}
patch = <<-EOF
- op: replace
path: /webhooks/0/clientConfig/service/namespace
value: "${var.namespace}"
- op: replace
path: /webhooks/1/clientConfig/service/namespace
value: "${var.namespace}"
- op: replace
path: /webhooks/2/clientConfig/service/namespace
value: "${var.namespace}"
- op: replace
path: /metadata/annotations/certmanager.k8s.io~1inject-ca-from
value: "${var.namespace}/open-telemetry-opentelemetry-operator-serving-cert"
EOF
}
patches {
target {
kind = "ValidatingWebhookConfiguration"
name = "open-telemetry-opentelemetry-operator-validation"
}
patch = <<-EOF
- op: replace
path: /webhooks/0/clientConfig/service/namespace
value: "${var.namespace}"
- op: replace
path: /webhooks/1/clientConfig/service/namespace
value: "${var.namespace}"
- op: replace
path: /webhooks/2/clientConfig/service/namespace
value: "${var.namespace}"
- op: replace
path: /webhooks/3/clientConfig/service/namespace
value: "${var.namespace}"
- op: replace
path: /metadata/annotations/certmanager.k8s.io~1inject-ca-from
value: "${var.namespace}/open-telemetry-opentelemetry-operator-serving-cert"
EOF
}
}

View File

@@ -0,0 +1,100 @@
---
apiVersion: vinyl.solidite.fr/v1beta1
kind: Component
category: monitor
metadata:
name: opentelemetry
description: Kubernetes Operator for OpenTelemetry Collector
options:
images:
default:
operator:
pullPolicy: IfNotPresent
registry: ghcr.io
repository: open-telemetry/opentelemetry-operator/opentelemetry-operator
tag: 0.92.1
rbac_proxy:
pullPolicy: IfNotPresent
registry: quay.io
repository: brancz/kube-rbac-proxy
tag: v0.15.0
examples:
- operator:
pullPolicy: IfNotPresent
registry: ghcr.io
repository: open-telemetry/opentelemetry-operator/opentelemetry-operator
tag: 0.92.1
rbac_proxy:
pullPolicy: IfNotPresent
registry: quay.io
repository: brancz/kube-rbac-proxy
tag: v0.15.0
properties:
operator:
default:
pullPolicy: IfNotPresent
registry: ghcr.io
repository: open-telemetry/opentelemetry-operator/opentelemetry-operator
tag: 0.92.1
properties:
pullPolicy:
default: IfNotPresent
enum:
- Always
- Never
- IfNotPresent
type: string
registry:
default: ghcr.io
type: string
repository:
default: open-telemetry/opentelemetry-operator/opentelemetry-operator
type: string
tag:
default: 0.92.1
type: string
type: object
rbac_proxy:
default:
pullPolicy: IfNotPresent
registry: quay.io
repository: brancz/kube-rbac-proxy
tag: v0.15.0
properties:
pullPolicy:
default: IfNotPresent
enum:
- Always
- Never
- IfNotPresent
type: string
registry:
default: quay.io
type: string
repository:
default: brancz/kube-rbac-proxy
type: string
tag:
default: v0.15.0
type: string
type: object
type: object
replicas:
default: 1
examples:
- 1
type: integer
dependencies:
- dist: null
category: crd
component: opentelemetry
providers:
kubernetes: true
authentik: null
kubectl: true
postgresql: null
mysql: null
restapi: null
http: null
gitea: null
tfaddtype: null

View File

@@ -0,0 +1,20 @@
---
# Source: opentelemetry-operator/templates/pdb.yaml
apiVersion: policy/v1
kind: PodDisruptionBudget
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator
namespace: vynil-monitor
spec:
minAvailable: 1
selector:
matchLabels:
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/component: controller-manager

View File

@@ -0,0 +1,20 @@
# Source: opentelemetry-operator/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator-manager
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: open-telemetry-opentelemetry-operator-manager
subjects:
- kind: ServiceAccount
name: opentelemetry-operator
namespace: vynil-monitor

View File

@@ -0,0 +1,20 @@
# Source: opentelemetry-operator/templates/clusterrolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator-proxy
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: open-telemetry-opentelemetry-operator-proxy
subjects:
- kind: ServiceAccount
name: opentelemetry-operator
namespace: vynil-monitor

View File

@@ -0,0 +1,208 @@
# Source: opentelemetry-operator/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator-manager
rules:
- apiGroups:
- ""
resources:
- configmaps
- persistentvolumeclaims
- persistentvolumes
- pods
- serviceaccounts
- services
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- apiGroups:
- ""
resources:
- namespaces
verbs:
- list
- watch
- apiGroups:
- apps
resources:
- daemonsets
- deployments
- statefulsets
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- apps
resources:
- replicasets
verbs:
- get
- list
- watch
- apiGroups:
- autoscaling
resources:
- horizontalpodautoscalers
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- config.openshift.io
resources:
- infrastructures
- infrastructures/status
verbs:
- get
- list
- watch
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- create
- get
- list
- update
- apiGroups:
- monitoring.coreos.com
resources:
- podmonitors
- servicemonitors
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- networking.k8s.io
resources:
- ingresses
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- opentelemetry.io
resources:
- instrumentations
verbs:
- get
- list
- patch
- update
- watch
- apiGroups:
- opentelemetry.io
resources:
- opampbridges
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- opentelemetry.io
resources:
- opampbridges/finalizers
verbs:
- update
- apiGroups:
- opentelemetry.io
resources:
- opampbridges/status
verbs:
- get
- patch
- update
- apiGroups:
- opentelemetry.io
resources:
- opentelemetrycollectors
verbs:
- get
- list
- patch
- update
- watch
- apiGroups:
- opentelemetry.io
resources:
- opentelemetrycollectors/finalizers
verbs:
- get
- patch
- update
- apiGroups:
- opentelemetry.io
resources:
- opentelemetrycollectors/status
verbs:
- get
- patch
- update
- apiGroups:
- policy
resources:
- poddisruptionbudgets
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- route.openshift.io
resources:
- routes
- routes/custom-host
verbs:
- create
- delete
- get
- list
- patch
- update
- watch

View File

@@ -0,0 +1,17 @@
# Source: opentelemetry-operator/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator-metrics
rules:
- nonResourceURLs:
- /metrics
verbs:
- get

View File

@@ -0,0 +1,25 @@
# Source: opentelemetry-operator/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator-proxy
rules:
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create

View File

@@ -0,0 +1,21 @@
# Source: opentelemetry-operator/templates/rolebinding.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator-leader-election
namespace: vynil-monitor
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: open-telemetry-opentelemetry-operator-leader-election
subjects:
- kind: ServiceAccount
name: opentelemetry-operator
namespace: vynil-monitor

View File

@@ -0,0 +1,41 @@
# Source: opentelemetry-operator/templates/role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator-leader-election
namespace: vynil-monitor
rules:
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- ""
resources:
- configmaps/status
verbs:
- get
- update
- patch
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch

View File

@@ -0,0 +1,45 @@
# first loop through resources in ids_prio[0]
resource "kustomization_resource" "pre_no_ns" {
for_each = data.kustomization_overlay.data_no_ns.ids_prio[0]
manifest = (
contains(["_/Secret"], regex("(?P<group_kind>.*/.*)/.*/.*", each.value)["group_kind"])
? sensitive(data.kustomization_overlay.data_no_ns.manifests[each.value])
: data.kustomization_overlay.data_no_ns.manifests[each.value]
)
}
# then loop through resources in ids_prio[1]
# and set an explicit depends_on on kustomization_resource.pre
# wait 2 minutes for any deployment or daemonset to become ready
resource "kustomization_resource" "main_no_ns" {
for_each = data.kustomization_overlay.data_no_ns.ids_prio[1]
manifest = (
contains(["_/Secret"], regex("(?P<group_kind>.*/.*)/.*/.*", each.value)["group_kind"])
? sensitive(data.kustomization_overlay.data_no_ns.manifests[each.value])
: data.kustomization_overlay.data_no_ns.manifests[each.value]
)
wait = true
timeouts {
create = "5m"
update = "5m"
}
depends_on = [kustomization_resource.pre_no_ns]
}
# finally, loop through resources in ids_prio[2]
# and set an explicit depends_on on kustomization_resource.main
resource "kustomization_resource" "post_no_ns" {
for_each = data.kustomization_overlay.data_no_ns.ids_prio[2]
manifest = (
contains(["_/Secret"], regex("(?P<group_kind>.*/.*)/.*/.*", each.value)["group_kind"])
? sensitive(data.kustomization_overlay.data_no_ns.manifests[each.value])
: data.kustomization_overlay.data_no_ns.manifests[each.value]
)
depends_on = [kustomization_resource.main_no_ns]
}

View File

@@ -0,0 +1,13 @@
# Source: opentelemetry-operator/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: opentelemetry-operator
namespace: vynil-monitor
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager

View File

@@ -0,0 +1,21 @@
# Source: opentelemetry-operator/templates/service.yaml
apiVersion: v1
kind: Service
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator-webhook
namespace: vynil-monitor
spec:
ports:
- port: 443
protocol: TCP
targetPort: webhook-server
selector:
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/component: controller-manager

View File

@@ -0,0 +1,26 @@
# Source: opentelemetry-operator/templates/service.yaml
apiVersion: v1
kind: Service
metadata:
labels:
helm.sh/chart: opentelemetry-operator-0.49.1
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/version: "0.95.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/instance: open-telemetry
app.kubernetes.io/component: controller-manager
name: open-telemetry-opentelemetry-operator
namespace: vynil-monitor
spec:
ports:
- name: https
port: 8443
protocol: TCP
targetPort: https
- name: metrics
port: 8080
protocol: TCP
targetPort: metrics
selector:
app.kubernetes.io/name: opentelemetry-operator
app.kubernetes.io/component: controller-manager