Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🐛 [BUG] - KubeMonitoring chart produces a diff on every helm upgrade #547

Closed
IvoGoman opened this issue Dec 10, 2024 · 2 comments
Closed
Assignees
Labels
bug Something isn't working observability

Comments

@IvoGoman
Copy link
Contributor

IvoGoman commented Dec 10, 2024

Priority

(Medium) I'm annoyed but I'll live

Description

Related to #546

The kube-monitoring plugin creates a diff on every helm diff, this leads to reoccurring reconciliations.
The problematic file is Secret/tls-prometheus-alertmanager-auth which looks to be static in the chart: https://github.com/cloudoperators/greenhouse-extensions/blob/main/kube-monitoring/charts/templates/alertmanager-tls-secret.yaml.

The secret values used are mounted via secretRef into the Plugin. In this case from tls-greenhouse-prometheus-auth, which is the secret for Certificate greenhouse-prometheus-auth.

annotations:
"helm.sh/hook": pre-install, pre-upgrade

Since the Certificate uses helm lifecycle hooks and no "helm.sh/hook-delete-policy" is defined, it is recreated on every helm deploy If no hook deletion policy annotation is specified, the before-hook-creation behavior applies by default.

"Secret/tls-prometheus-alertmanager-auth: [\n {\n \"value\": \"***** - after\",\n \"op\": \"replace\",\n \"path\": \"/data/tls.crt\"\n },\n {\n \"value\": \"***** - after\",\n \"op\": \"replace\",\n \"path\": \"/data/tls.key\"\n }\n]"} 

Reproduction steps

1. Go to the organisation namespace 
2. `helm history kube-monitoring`
3. see frequent upgrades of the plugin

Screenshots

![DESCRIPTION](LINK.png)
@IvoGoman IvoGoman added bug Something isn't working observability labels Dec 10, 2024
@richardtief richardtief self-assigned this Dec 11, 2024
@richardtief richardtief moved this from No status to In progress in Observability Roadmap Dec 11, 2024
@richardtief
Copy link
Member

@IvoGoman I think this is solved by keeping the cert in greenhouse-prometheus-auth generated by the alerts plugin static.

@IvoGoman
Copy link
Contributor Author

IvoGoman commented Dec 11, 2024

Ah yes, I overlooked that both certs are enclosed by the same if-condition. Can be closed in favour of #546

@github-project-automation github-project-automation bot moved this from In progress to Done in Observability Roadmap Dec 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working observability
Projects
Status: Done
Development

No branches or pull requests

2 participants