-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Configmap check is enabled by default #368
Comments
I have this problem too And the ClusterRole from your Chart doesn't have permissions for watching of ConfigMap resources by default time=2024-12-26T10:28:38.862Z level=WARN msg="failed to fetch configmaps from namespace \"vault\": configmaps is forbidden: User \"system:serviceaccount:x509-certificate-exporter:x509-certificate-exporter\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"vault\"" apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
app.kubernetes.io/instance: x509-certificate-exporter
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: x509-certificate-exporter
app.kubernetes.io/version: 3.18.0
helm.sh/chart: x509-certificate-exporter-3.18.0
helm.toolkit.fluxcd.io/name: x509-certificate-exporter
helm.toolkit.fluxcd.io/namespace: x509-certificate-exporter
name: x509-certificate-exporter
rules:
- apiGroups:
- ""
resources:
- namespaces
verbs:
- get
- watch
- list
- apiGroups:
- ""
resources:
- secrets
verbs:
- get
- watch
- list It seems that because of this I only get the x509_read_errors metric My values: prometheusRules:
create: false |
Hi, |
The problem is that if you don't enable configmap watching, secret watching doesn't work. prometheusRules:
create: false
secretsExporter:
configMapKeys: ["tls.crt"] |
Yes I understand. It hasn't been a good release and we should have made a beta version this time. More than anything, this shows our tests are insufficient, we'll work on that to get back to 100% coverage and do true e2e testing. But rest assured we are very attentive nothing malicious is introduced by contributors. |
🎉 This issue has been resolved in version 3.18.1 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
in the latest version 3.18.0 there is an error.
secretsExporter.configMapKeys is not announced, this option is not thrown in deployment and clusterrole.
nevertheless, there is an error in the logs:
it looks like the configmap check is enabled by default.
The text was updated successfully, but these errors were encountered: