From e1f6ca02651b2c5d45b8cafb438a0f2704c60e46 Mon Sep 17 00:00:00 2001 From: Siddhesh Mhadnak Date: Sat, 14 Sep 2024 23:48:41 +0530 Subject: [PATCH] fix(alloy): convert non-sensitive secret values to strings We're using `Secret` data in places where Alloy expects strings, not secrets. --- kubernetes/chart/values/prod/vipyrsec.yaml | 4 ++-- kubernetes/chart/values/staging/vipyrsec.yaml | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/kubernetes/chart/values/prod/vipyrsec.yaml b/kubernetes/chart/values/prod/vipyrsec.yaml index 54ccafd..7373a5c 100644 --- a/kubernetes/chart/values/prod/vipyrsec.yaml +++ b/kubernetes/chart/values/prod/vipyrsec.yaml @@ -104,11 +104,11 @@ alloy: } prometheus.scrape "postgres_do" { - targets = [{"__address__" = remote.kubernetes.secret.postgres.data.metrics_url}] + targets = [{"__address__" = nonsensitive(remote.kubernetes.secret.postgres.data.metrics_url)}] forward_to = [prometheus.relabel.tagged.receiver] basic_auth { - username = remote.kubernetes.secret.postgres.data.metrics_username + username = nonsensitive(remote.kubernetes.secret.postgres.data.metrics_username) password = remote.kubernetes.secret.postgres.data.metrics_password } } diff --git a/kubernetes/chart/values/staging/vipyrsec.yaml b/kubernetes/chart/values/staging/vipyrsec.yaml index 8f7d767..ce068c2 100644 --- a/kubernetes/chart/values/staging/vipyrsec.yaml +++ b/kubernetes/chart/values/staging/vipyrsec.yaml @@ -104,11 +104,11 @@ alloy: } prometheus.scrape "postgres_do" { - targets = [{"__address__" = remote.kubernetes.secret.postgres.data.metrics_url}] + targets = [{"__address__" = nonsensitive(remote.kubernetes.secret.postgres.data.metrics_url)}] forward_to = [prometheus.relabel.tagged.receiver] basic_auth { - username = remote.kubernetes.secret.postgres.data.metrics_username + username = nonsensitive(remote.kubernetes.secret.postgres.data.metrics_username) password = remote.kubernetes.secret.postgres.data.metrics_password } }