Merge pull request #151 from metalmatze/kube-state-metrics-1.7.0-rc.1
Bump kube-state-metrics to v1.7.0
This commit is contained in:
@@ -16,7 +16,7 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
},
|
},
|
||||||
|
|
||||||
versions+:: {
|
versions+:: {
|
||||||
kubeStateMetrics: 'v1.6.0',
|
kubeStateMetrics: 'v1.7.1',
|
||||||
kubeRbacProxy: 'v0.4.1',
|
kubeRbacProxy: 'v0.4.1',
|
||||||
addonResizer: '1.8.4',
|
addonResizer: '1.8.4',
|
||||||
},
|
},
|
||||||
@@ -43,7 +43,8 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
local clusterRole = k.rbac.v1.clusterRole;
|
local clusterRole = k.rbac.v1.clusterRole;
|
||||||
local rulesType = clusterRole.rulesType;
|
local rulesType = clusterRole.rulesType;
|
||||||
|
|
||||||
local coreRule = rulesType.new() +
|
local rules = [
|
||||||
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['']) +
|
rulesType.withApiGroups(['']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'configmaps',
|
'configmaps',
|
||||||
@@ -59,9 +60,9 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
'namespaces',
|
'namespaces',
|
||||||
'endpoints',
|
'endpoints',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['list', 'watch']);
|
rulesType.withVerbs(['list', 'watch']),
|
||||||
|
|
||||||
local extensionsRule = rulesType.new() +
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['extensions']) +
|
rulesType.withApiGroups(['extensions']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'daemonsets',
|
'daemonsets',
|
||||||
@@ -69,9 +70,9 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
'replicasets',
|
'replicasets',
|
||||||
'ingresses',
|
'ingresses',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['list', 'watch']);
|
rulesType.withVerbs(['list', 'watch']),
|
||||||
|
|
||||||
local appsRule = rulesType.new() +
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['apps']) +
|
rulesType.withApiGroups(['apps']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'statefulsets',
|
'statefulsets',
|
||||||
@@ -79,52 +80,58 @@ local k = import 'ksonnet/ksonnet.beta.4/k.libsonnet';
|
|||||||
'deployments',
|
'deployments',
|
||||||
'replicasets',
|
'replicasets',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['list', 'watch']);
|
rulesType.withVerbs(['list', 'watch']),
|
||||||
|
|
||||||
local batchRule = rulesType.new() +
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['batch']) +
|
rulesType.withApiGroups(['batch']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'cronjobs',
|
'cronjobs',
|
||||||
'jobs',
|
'jobs',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['list', 'watch']);
|
rulesType.withVerbs(['list', 'watch']),
|
||||||
|
|
||||||
local autoscalingRule = rulesType.new() +
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['autoscaling']) +
|
rulesType.withApiGroups(['autoscaling']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'horizontalpodautoscalers',
|
'horizontalpodautoscalers',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['list', 'watch']);
|
rulesType.withVerbs(['list', 'watch']),
|
||||||
|
|
||||||
local authenticationRole = rulesType.new() +
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['authentication.k8s.io']) +
|
rulesType.withApiGroups(['authentication.k8s.io']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'tokenreviews',
|
'tokenreviews',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['create']);
|
rulesType.withVerbs(['create']),
|
||||||
|
|
||||||
local authorizationRole = rulesType.new() +
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['authorization.k8s.io']) +
|
rulesType.withApiGroups(['authorization.k8s.io']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'subjectaccessreviews',
|
'subjectaccessreviews',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['create']);
|
rulesType.withVerbs(['create']),
|
||||||
|
|
||||||
local policyRule = rulesType.new() +
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['policy']) +
|
rulesType.withApiGroups(['policy']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'poddisruptionbudgets',
|
'poddisruptionbudgets',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['list', 'watch']);
|
rulesType.withVerbs(['list', 'watch']),
|
||||||
|
|
||||||
local certificateRule = rulesType.new() +
|
rulesType.new() +
|
||||||
rulesType.withApiGroups(['certificates.k8s.io']) +
|
rulesType.withApiGroups(['certificates.k8s.io']) +
|
||||||
rulesType.withResources([
|
rulesType.withResources([
|
||||||
'certificatesigningrequests',
|
'certificatesigningrequests',
|
||||||
]) +
|
]) +
|
||||||
rulesType.withVerbs(['list', 'watch']);
|
rulesType.withVerbs(['list', 'watch']),
|
||||||
|
|
||||||
local rules = [coreRule, extensionsRule, appsRule, batchRule, autoscalingRule, authenticationRole, authorizationRole, policyRule, certificateRule];
|
rulesType.new() +
|
||||||
|
rulesType.withApiGroups(['storage.k8s.io']) +
|
||||||
|
rulesType.withResources([
|
||||||
|
'storageclasses',
|
||||||
|
]) +
|
||||||
|
rulesType.withVerbs(['list', 'watch']),
|
||||||
|
];
|
||||||
|
|
||||||
clusterRole.new() +
|
clusterRole.new() +
|
||||||
clusterRole.mixin.metadata.withName('kube-state-metrics') +
|
clusterRole.mixin.metadata.withName('kube-state-metrics') +
|
||||||
|
@@ -8,7 +8,7 @@
|
|||||||
"subdir": "jsonnet/kube-prometheus"
|
"subdir": "jsonnet/kube-prometheus"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"version": "aa7df507e98312f638c6a2aa7429906bc63949a6"
|
"version": "eb132e923ef07147131a62ed0e597cf0a90e984b"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "ksonnet",
|
"name": "ksonnet",
|
||||||
@@ -48,7 +48,7 @@
|
|||||||
"subdir": "grafana-builder"
|
"subdir": "grafana-builder"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"version": "dbc94ab71afa538b2cf467f06751b1836920dce9"
|
"version": "8e77b50ee8aea319dac9964b2cc2183f3bc184d2"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "grafana",
|
"name": "grafana",
|
||||||
@@ -78,7 +78,7 @@
|
|||||||
"subdir": "Documentation/etcd-mixin"
|
"subdir": "Documentation/etcd-mixin"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"version": "d137fa9d4ad7aa242f6fed04186a700ce082fdda"
|
"version": "149e5dc291a97eb41585fbd2b44ce00c4db684ad"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"name": "prometheus",
|
"name": "prometheus",
|
||||||
@@ -88,7 +88,7 @@
|
|||||||
"subdir": "documentation/prometheus-mixin"
|
"subdir": "documentation/prometheus-mixin"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"version": "87a0fe0c75a42d66fcfc82a0ad89bd2549fcfadf"
|
"version": "0f007373087bfb2d581f77a4a9a47941e5eeee6b"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@@ -82,3 +82,10 @@ rules:
|
|||||||
verbs:
|
verbs:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- storage.k8s.io
|
||||||
|
resources:
|
||||||
|
- storageclasses
|
||||||
|
verbs:
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
@@ -55,7 +55,7 @@ spec:
|
|||||||
- --port=8081
|
- --port=8081
|
||||||
- --telemetry-host=127.0.0.1
|
- --telemetry-host=127.0.0.1
|
||||||
- --telemetry-port=8082
|
- --telemetry-port=8082
|
||||||
image: quay.io/coreos/kube-state-metrics:v1.6.0
|
image: quay.io/coreos/kube-state-metrics:v1.7.1
|
||||||
name: kube-state-metrics
|
name: kube-state-metrics
|
||||||
resources:
|
resources:
|
||||||
limits:
|
limits:
|
||||||
|
Reference in New Issue
Block a user