Skip to content

Commit 491ab3b

Browse files
Merge pull request #2425 from machine424/metrics-server-cl
MON-3900: follow-up: clean up operator logic and some tests now that metrics-server is the default Metrics API backend
2 parents dc82562 + f51127a commit 491ab3b

File tree

5 files changed

+5
-83
lines changed

5 files changed

+5
-83
lines changed

pkg/operator/operator.go

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,6 @@ type Operator struct {
168168
telemetryMatches []string
169169
remoteWrite bool
170170
userWorkloadEnabled bool
171-
metricsServerEnabled bool
172171
collectionProfilesEnabled bool
173172

174173
lastKnowInfrastructureConfig *InfrastructureConfig
@@ -266,7 +265,6 @@ func New(
266265
userWorkloadConfigMapName: userWorkloadConfigMapName,
267266
remoteWrite: remoteWrite,
268267
userWorkloadEnabled: false,
269-
metricsServerEnabled: false,
270268
collectionProfilesEnabled: false,
271269
namespace: namespace,
272270
namespaceUserWorkload: namespaceUserWorkload,
@@ -472,16 +470,11 @@ func New(
472470
if err != nil {
473471
return nil, err
474472
}
475-
o.metricsServerEnabled = featureGates.Enabled(features.FeatureGateMetricsServer)
476473
o.collectionProfilesEnabled = featureGates.Enabled(features.FeatureGateMetricsCollectionProfiles)
477474
case <-time.After(1 * time.Minute):
478475
return nil, fmt.Errorf("timed out waiting for FeatureGate detection")
479476
}
480477

481-
if o.metricsServerEnabled {
482-
klog.Info("Metrics Server enabled")
483-
}
484-
485478
// csrController runs a controller that requests a client TLS certificate
486479
// for Prometheus k8s. This certificate is used to authenticate against the
487480
// /metrics endpoint of the targets.
@@ -819,7 +812,7 @@ func (o *Operator) sync(ctx context.Context, key string) error {
819812
newTaskSpec("NodeExporter", tasks.NewNodeExporterTask(o.client, factory)),
820813
newTaskSpec("KubeStateMetrics", tasks.NewKubeStateMetricsTask(o.client, factory, *o.lastKnownVPACustomResourceDefinitionPresent)),
821814
newTaskSpec("OpenshiftStateMetrics", tasks.NewOpenShiftStateMetricsTask(o.client, factory)),
822-
newTaskSpec("MetricsServer", tasks.NewMetricsServerTask(ctx, o.namespace, o.client, o.metricsServerEnabled, factory, config)),
815+
newTaskSpec("MetricsServer", tasks.NewMetricsServerTask(ctx, o.namespace, o.client, factory, config)),
823816
newTaskSpec("TelemeterClient", tasks.NewTelemeterClientTask(o.client, factory, config)),
824817
newTaskSpec("ThanosQuerier", tasks.NewThanosQuerierTask(o.client, factory, config)),
825818
newTaskSpec("ControlPlaneComponents", tasks.NewControlPlaneTask(o.client, factory, config)),

pkg/tasks/metricsserver.go

Lines changed: 1 addition & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,17 +13,15 @@ import (
1313

1414
type MetricsServerTask struct {
1515
client *client.Client
16-
enabled bool
1716
ctx context.Context
1817
factory *manifests.Factory
1918
config *manifests.Config
2019
namespace string
2120
}
2221

23-
func NewMetricsServerTask(ctx context.Context, namespace string, client *client.Client, metricsServerEnabled bool, factory *manifests.Factory, config *manifests.Config) *MetricsServerTask {
22+
func NewMetricsServerTask(ctx context.Context, namespace string, client *client.Client, factory *manifests.Factory, config *manifests.Config) *MetricsServerTask {
2423
return &MetricsServerTask{
2524
client: client,
26-
enabled: metricsServerEnabled,
2725
factory: factory,
2826
config: config,
2927
namespace: namespace,
@@ -32,13 +30,6 @@ func NewMetricsServerTask(ctx context.Context, namespace string, client *client.
3230
}
3331

3432
func (t *MetricsServerTask) Run(ctx context.Context) error {
35-
if t.enabled {
36-
return t.create(ctx)
37-
}
38-
return nil
39-
}
40-
41-
func (t *MetricsServerTask) create(ctx context.Context) error {
4233
{
4334
// TODO: This is a temporary workaround until the requirements for https://github.com/openshift/cluster-monitoring-operator/pull/2329
4435
// are ready.

test/e2e/framework/helpers.go

Lines changed: 0 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -197,41 +197,6 @@ func (f *Framework) GetClusterVersion(name string) (*configv1.ClusterVersion, er
197197
return f.OpenShiftConfigClient.ConfigV1().ClusterVersions().Get(context.Background(), name, metav1.GetOptions{})
198198
}
199199

200-
func (f *Framework) IsFeatureGateEnabled(t *testing.T, name string) bool {
201-
t.Helper()
202-
var enabledFeatureGates []configv1.FeatureGateAttributes
203-
// Get cluster version
204-
clusterVersion, err := f.GetClusterVersion("version")
205-
if err != nil {
206-
t.Fatalf("failed to get cluster version: %s", err.Error())
207-
}
208-
209-
// Get the desired cluster version
210-
version := clusterVersion.Status.Desired.Version
211-
212-
// Get FeatureGates
213-
featureGates, err := f.OpenShiftConfigClient.ConfigV1().FeatureGates().Get(context.Background(), "cluster", metav1.GetOptions{})
214-
if err != nil {
215-
t.Fatalf("failed to get featuregate `cluster`: %s", err.Error())
216-
}
217-
218-
// Get Enabled FeatureGates for the desired cluster version
219-
for _, fg := range featureGates.Status.FeatureGates {
220-
if fg.Version == version {
221-
enabledFeatureGates = fg.Enabled
222-
break
223-
}
224-
}
225-
226-
for _, g := range enabledFeatureGates {
227-
if g.Name == configv1.FeatureGateName(name) {
228-
return true
229-
}
230-
}
231-
232-
return false
233-
}
234-
235200
func ensureCreatedByTestLabel(obj metav1.Object) {
236201
// only add the label if it doesn't exist yet, leave existing values
237202
// untouched

test/e2e/metrics_adapter_test.go

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -30,18 +30,6 @@ import (
3030
apiservicesv1 "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1"
3131
)
3232

33-
const MetricsServerFeatureGate string = "MetricsServer"
34-
35-
func skipMetricsServerTests(t *testing.T) {
36-
if !f.IsFeatureGateEnabled(t, MetricsServerFeatureGate) {
37-
t.Skip("Skipping Metrics Server test")
38-
}
39-
}
40-
41-
func isAPIServicePointingToRightMetricsService(t *testing.T, metricsService *apiservicesv1.APIService) bool {
42-
return metricsService.Spec.Service.Name == "metrics-server"
43-
}
44-
4533
func isNodeInNodesList(node string, nodes []corev1.Node) bool {
4634
for _, n := range nodes {
4735
if n.Name == node {
@@ -242,7 +230,6 @@ func TestAggregatedMetricPermissions(t *testing.T) {
242230
}
243231

244232
func TestMetricsServerRollout(t *testing.T) {
245-
skipMetricsServerTests(t)
246233
for _, test := range []scenario{
247234
{
248235
name: "assert metrics-server deployment is rolled out",
@@ -266,18 +253,6 @@ func TestMetricsServerRollout(t *testing.T) {
266253
},
267254
),
268255
},
269-
{
270-
name: "assert prometheus-adapter service monitor is deleted",
271-
assertion: f.AssertServiceMonitorDoesNotExist("prometheus-adapter", f.Ns),
272-
},
273-
{
274-
name: "assert prometheus-adapter service is deleted",
275-
assertion: f.AssertServiceDoesNotExist("prometheus-adapter", f.Ns),
276-
},
277-
{
278-
name: "assert prometheus-adapter deployment is deleted",
279-
assertion: f.AssertDeploymentDoesNotExist("prometheus-adapter", f.Ns),
280-
},
281256
} {
282257
t.Run(test.name, test.assertion)
283258
}

test/e2e/tls_security_profile_test.go

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -124,11 +124,9 @@ func TestTLSSecurityProfileConfiguration(t *testing.T) {
124124
assertCorrectTLSConfiguration(t, "prometheus-k8s", "statefulset",
125125
manifests.KubeRbacProxyTLSCipherSuitesFlag,
126126
manifests.KubeRbacProxyMinTLSVersionFlag, tt.expectedCipherSuite, tt.expectedMinTLSVersion)
127-
if f.IsFeatureGateEnabled(t, MetricsServerFeatureGate) {
128-
assertCorrectTLSConfiguration(t, "metrics-server", "deployment",
129-
manifests.MetricsServerTLSCipherSuitesFlag,
130-
manifests.MetricsServerTLSMinTLSVersionFlag, tt.expectedCipherSuite, tt.expectedMinTLSVersion)
131-
}
127+
assertCorrectTLSConfiguration(t, "metrics-server", "deployment",
128+
manifests.MetricsServerTLSCipherSuitesFlag,
129+
manifests.MetricsServerTLSMinTLSVersionFlag, tt.expectedCipherSuite, tt.expectedMinTLSVersion)
132130
})
133131
}
134132
}

0 commit comments

Comments
 (0)