Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit da499ea

Browse files
Remove cert manager
1 parent 261ad19 commit da499ea

File tree

4 files changed

+5
-47
lines changed

4 files changed

+5
-47
lines changed

_includes/gdi/troubleshoot-zeroconfig-k8s.rst

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -21,17 +21,6 @@ Examine logs to make sure that the operator and cert manager are working.
2121
* ``kubectl logs -l app=cainjector``
2222
* ``kubectl logs -l app=webhook``
2323

24-
Resolve certificate manager issues
25-
----------------------------------------
26-
27-
A hanging operator can indicate issues with the certificate manager.
28-
29-
* Check the logs of your cert-manager pods.
30-
* Restart the cert-manager pods.
31-
* Ensure that your cluster has only one instance of cert-manager. This includes ``certmanager``, ``certmanager-cainjector``, and ``certmanager-webhook``.
32-
33-
See the official cert manager troubleshooting guide for more information: :new-page:`https://cert-manager.io/docs/troubleshooting/`.
34-
3524
Validate certificates
3625
---------------------------
3726

gdi/opentelemetry/automatic-discovery/k8s/k8s-backend.rst

Lines changed: 5 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -91,21 +91,10 @@ You might need to populate the file with additional values depending on your env
9191

9292
.. _k8s-auto-discovery-add-certificates:
9393

94-
Add certificates and OpenTelemetry CRDs
94+
Add OpenTelemetry CRDs
9595
------------------------------------------
9696

97-
The Operator requires certain TLS certificates to work. Use the following command to check whether a certificate manager is available:
98-
99-
.. code-block:: yaml
100-
101-
# Check if cert-manager is already installed, don't deploy a second cert-manager.
102-
kubectl get pods -l app=certmanager --all-namespaces
103-
104-
If a certificate manager isn't available in the cluster, add ``certmanager.enabled=true`` to your values.yaml file.
105-
106-
The Operator for Kubernetes also requires you to install OpenTelemetry Custom Resource Definitions (CRDs). To do this, add ``operatorcrds.install=true`` to your values.yaml file.
107-
108-
The following example YAML includes ``certmanager.enabled=true`` and ``operatorcrds.install=true``:
97+
The Operator for Kubernetes requires you to install OpenTelemetry Custom Resource Definitions (CRDs). To do this, add ``operatorcrds.install=true`` to your values.yaml file:
10998

11099
.. code-block:: yaml
111100
:emphasize-lines: 7,8
@@ -115,9 +104,7 @@ The following example YAML includes ``certmanager.enabled=true`` and ``operatorc
115104
splunkObservability:
116105
realm: <splunk_realm>
117106
accessToken: <splunk_access_token>
118-
119-
certmanager:
120-
enabled: true
107+
121108
operator:
122109
enabled: true
123110
operatorcrds:
@@ -248,27 +235,23 @@ Verify all the OpenTelemetry resources are deployed successfully
248235

249236
Resources include the Collector, the Operator, webhook, and instrumentation. Run the following commands to verify the resources are deployed correctly.
250237

251-
The pods running in the collector namespace must include the following:
238+
The pods running in the Collector namespace must include the following:
252239

253240
.. code-block:: yaml
254241
255242
kubectl get pods
256243
# NAME READY
257244
# NAMESPACE NAME READY STATUS
258245
# monitoring splunk-otel-collector-agent-lfthw 2/2 Running
259-
# monitoring splunk-otel-collector-cert-manager-6b9fb8b95f-2lmv4 1/1 Running
260-
# monitoring splunk-otel-collector-cert-manager-cainjector-6d65b6d4c-khcrc 1/1 Running
261-
# monitoring splunk-otel-collector-cert-manager-webhook-87b7ffffc-xp4sr 1/1 Running
262246
# monitoring splunk-otel-collector-k8s-cluster-receiver-856f5fbcf9-pqkwg 1/1 Running
263247
# monitoring splunk-otel-collector-opentelemetry-operator-56c4ddb4db-zcjgh 2/2 Running
264248
265-
The webhooks in the collector namespace must include the following:
249+
The webhooks in the Collector namespace must include the following:
266250

267251
.. code-block:: yaml
268252
269253
kubectl get mutatingwebhookconfiguration.admissionregistration.k8s.io
270254
# NAME WEBHOOKS AGE
271-
# splunk-otel-collector-cert-manager-webhook 1 14m
272255
# splunk-otel-collector-opentelemetry-operator-mutation 3 14m
273256
274257
The instrumentation in the collector namespace must include the following:

gdi/opentelemetry/collector-kubernetes/kubernetes-config.rst

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -255,13 +255,6 @@ For the Operator:
255255
operator:
256256
enabled: true
257257
258-
Additionally, deploy the cert-manager for the Operator if it hasn't been already.
259-
260-
.. code-block:: yaml
261-
262-
certmanager:
263-
enabled: true
264-
265258
With the above configuration:
266259

267260
* The Collector is set up to receive profiling data.

gdi/opentelemetry/collector-kubernetes/kubernetes-helm-releases.rst

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@ Optional releases for subcharts
2626

2727
* :new-page:`https://github.com/open-telemetry/opentelemetry-helm-charts/releases`
2828

29-
* :new-page:`https://github.com/cert-manager/cert-manager/releases`
30-
3129
.. _helm-chart-images:
3230

3331
Helm chart images
@@ -50,11 +48,6 @@ Optional add-on feature images
5048
* :new-page:`https://quay.io/signalfx/splunk-otel-collector-windows`
5149
* :new-page:`https://registry.access.redhat.com`
5250
* :new-page:`https://ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator`
53-
* :new-page:`https://quay.io/jetstack/cert-manager-controller`
54-
* :new-page:`https://quay.io/jetstack/cert-manager-acmesolver`
55-
* :new-page:`https://quay.io/jetstack/cert-manager-webhook`
56-
* :new-page:`https://quay.io/jetstack/cert-manager-cainjector`
57-
* :new-page:`https://quay.io/jetstack/cert-manager-ctl`
5851
* :new-page:`https://ghcr.io/signalfx/splunk-otel-java/splunk-otel-java`
5952
* :new-page:`https://ghcr.io/signalfx/splunk-otel-js/splunk-otel-js`
6053
* :new-page:`https://ghcr.io/signalfx/splunk-otel-dotnet/splunk-otel-dotnet`

0 commit comments

Comments
 (0)