Skip to content

Commit 2fab4a2

Browse files
update the formatting
1 parent ab85e81 commit 2fab4a2

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

articles/azure-monitor/containers/prometheus-metrics-scrape-configuration.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -547,8 +547,6 @@ tls_config:
547547
key_file: /etc/prometheus/certs/<keyfile>
548548
insecure_skip_verify: false
549549
```
550-
551-
---
552550
### [Scrape Config using CRD(Pod/Service Monitor)](#tab/CRDScrapeConfigTLSAuth)
553551

554552
- To provide the TLS config setting in a CRD(Pod/Service Monitor), please follow the below example.
@@ -586,10 +584,10 @@ metadata:
586584
namespace: kube-system
587585
type: Opaque
588586
data:
589-
<certfile>: base64_cert_content # used for Tls
590-
<keyfile>: base64_key_content # used for Tls
591-
password1: <base64-encoded-string> # used for basic auth
592-
password2: <base64-encoded-string> # used for basic auth
587+
certfile: base64_cert_content # used for Tls
588+
keyfile: base64_key_content # used for Tls
589+
password1: base64-encoded-string # used for basic auth
590+
password2: base64-encoded-string # used for basic auth
593591
>
594592
> The secret should be created and then the configmap/CRD should be created in kube-system namespace. The order of secret creation matters. When there's no secret but a valid CRD/config map, you will find errors in collector log -> `no file found for cert....`
595593
>

0 commit comments

Comments
 (0)