Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

oci-proxy: set alerts for sandbox and prod. #4145

Merged
merged 3 commits into from
Aug 30, 2022

Conversation

ameukam
Copy link
Member

@ameukam ameukam commented Aug 25, 2022

Add a terraform module to ensure alerts are created for:

  • SSL certificate expiration: an alert is sent if the certificate for
    given domain is not renewed less than 15 days before the expiration
    date.
  • uptime check: given a hostname, ensure the host is alive on port 443
    for the root path (/). A check is done every minute.

Ensure alerts are created using the terraform module.

Signed-off-by: Arnaud Meukam [email protected]

Add a terraform module to ensure alerts are created for:
- SSL certificate expiration: an alert is sent if the certificate for
  given domain is not renewed less than 15 days before the expiration
  date.
- uptime check: given a hostname ensure the host is alive on port 443
  for the root path (/). A check is done every minute.

Signed-off-by: Arnaud Meukam <[email protected]>
registry.k8s.io

Use uptime alert terraform module to set alerts for
registry-sandbox.k8s.io and registry.k8s.io

Signed-off-by: Arnaud Meukam <[email protected]>
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Aug 25, 2022
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: ameukam

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot requested a review from thockin August 25, 2022 23:25
@k8s-ci-robot k8s-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. area/infra Infrastructure management, infrastructure design, code in infra/ area/terraform Terraform modules, testing them, writing more of them, code in infra/gcp/clusters/ sig/k8s-infra Categorizes an issue or PR as relevant to SIG K8s Infra. labels Aug 25, 2022
@ameukam
Copy link
Member Author

ameukam commented Aug 25, 2022

cc @dims
Already Deployed. I can't fully tested using Terraform. The tests can only be done with the UI.

@ArkaSaha30
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Aug 30, 2022
@k8s-ci-robot k8s-ci-robot merged commit 18f6934 into kubernetes:main Aug 30, 2022
@k8s-ci-robot k8s-ci-robot added this to the v1.25 milestone Aug 30, 2022
@ameukam
Copy link
Member Author

ameukam commented Sep 2, 2022

Ref: #3411

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/infra Infrastructure management, infrastructure design, code in infra/ area/terraform Terraform modules, testing them, writing more of them, code in infra/gcp/clusters/ cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. sig/k8s-infra Categorizes an issue or PR as relevant to SIG K8s Infra. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants