@@ -192,11 +192,6 @@ func (c *Cluster) Sync(newSpec *cpov1.Postgresql) error {
192192 return fmt .Errorf ("error refreshing restore configmap: %v" , err )
193193 }
194194
195- // sync monitoring
196- if err = c .syncMonitoringSecret (& oldSpec , newSpec ); err != nil {
197- return fmt .Errorf ("could not sync monitoring: %v" , err )
198- }
199-
200195 if err = c .initUsers (); err != nil {
201196 err = fmt .Errorf ("could not init users: %v" , err )
202197 return err
@@ -1689,37 +1684,6 @@ func (c *Cluster) createTDESecret() error {
16891684 return nil
16901685}
16911686
1692- func (c * Cluster ) createMonitoringSecret () error {
1693- c .logger .Info ("creating Monitoring secret" )
1694- c .setProcessName ("creating Monitoring secret" )
1695- generatedKey := make ([]byte , 16 )
1696- rand .Read (generatedKey )
1697-
1698- generatedSecret := v1.Secret {
1699- ObjectMeta : metav1.ObjectMeta {
1700- Name : c .getMonitoringSecretName (),
1701- Namespace : c .Namespace ,
1702- Labels : c .labelsSet (true ),
1703- },
1704- Type : v1 .SecretTypeOpaque ,
1705- Data : map [string ][]byte {
1706- "username" : []byte (monitorUsername ),
1707- "password" : []byte (fmt .Sprintf ("%x" , generatedKey )),
1708- },
1709- }
1710- secret , err := c .KubeClient .Secrets (generatedSecret .Namespace ).Create (context .TODO (), & generatedSecret , metav1.CreateOptions {})
1711- if err == nil {
1712- c .Secrets [secret .UID ] = secret
1713- c .logger .Debugf ("created new secret %s, namespace: %s, uid: %s" , util .NameFromMeta (secret .ObjectMeta ), generatedSecret .Namespace , secret .UID )
1714- } else {
1715- if ! k8sutil .ResourceAlreadyExists (err ) {
1716- return fmt .Errorf ("could not create secret for Monitoring %s: in namespace %s: %v" , util .NameFromMeta (secret .ObjectMeta ), generatedSecret .Namespace , err )
1717- }
1718- }
1719-
1720- return nil
1721- }
1722-
17231687// delete monitoring secret
17241688func (c * Cluster ) deleteMonitoringSecret () (err error ) {
17251689 // Repeat the same for the secret object
@@ -1739,47 +1703,6 @@ func (c *Cluster) deleteMonitoringSecret() (err error) {
17391703 return nil
17401704}
17411705
1742- // Sync monitoring
1743- // In case of monitoring is added/deleted, we need to
1744- // 1. Update sts to in/exclude the exporter contianer
1745- // 2. Add/Delete the respective user
1746- // 3. Add/Delete the respective secret
1747- func (c * Cluster ) syncMonitoringSecret (oldSpec , newSpec * cpov1.Postgresql ) error {
1748- c .logger .Info ("syncing Monitoring secret" )
1749- c .setProcessName ("syncing Monitoring secret" )
1750-
1751- if newSpec .Spec .Monitoring != nil && oldSpec .Spec .Monitoring == nil {
1752- // Create monitoring secret
1753- if err := c .createMonitoringSecret (); err != nil {
1754- return fmt .Errorf ("could not create the monitoring secret: %v" , err )
1755- } else {
1756- flags := []string {constants .RoleFlagLogin }
1757- monitorUser := map [string ]spec.PgUser {
1758- monitorUsername : {
1759- Origin : spec .RoleOriginInfrastructure ,
1760- Name : monitorUsername ,
1761- Namespace : c .Namespace ,
1762- Flags : flags ,
1763- },
1764- }
1765- c .pgUsers [monitorUsername ] = monitorUser [monitorUsername ]
1766- }
1767- c .logger .Info ("monitoring secret was successfully created" )
1768- } else if newSpec .Spec .Monitoring == nil && oldSpec .Spec .Monitoring != nil {
1769- // Delete the monitoring secret
1770- if err := c .deleteMonitoringSecret (); err != nil {
1771- return fmt .Errorf ("could not delete the monitoring secret: %v" , err )
1772- } else {
1773- // Delete the monitoring user
1774- monitorUser := c .pgUsers [monitorUsername ]
1775- monitorUser .Deleted = true
1776- c .pgUsers [monitorUsername ] = monitorUser
1777- }
1778- c .logger .Info ("monitoring secret was successfully deleted" )
1779- }
1780- return nil
1781- }
1782-
17831706func generateRootCertificate (
17841707 privateKey * ecdsa.PrivateKey , serialNumber * big.Int ,
17851708) (* x509.Certificate , error ) {
0 commit comments