Description
Bug Report
What did you do?
with regards to theMonitoring feature, the endpoint was defined with scheme http, but the serviceMonitor created was of scheme HTTPS causing it to not function as intended. Even if the scheme was left empty, the default as per the documentation is http but the serviceMonitor was of scheme https
What did you expect to see?
Expected to see http as the default scheme for ServiceMonitor created by the operator.
What did you see instead?
HTTPS was the scheme in the service monitor created by the operator
Environment
OpenShift
Possible solution
The issue is identified to be in the utils/utils.go file in line 1203-1207
if ba.GetManageTLS() == nil || *ba.GetManageTLS() {
if len(ba.GetMonitoring().GetEndpoints()) == 0 || ba.GetMonitoring().GetEndpoints()[0].TLSConfig == nil {
sm.Spec.Endpoints[0].Scheme = "https"
if sm.Spec.Endpoints[0].TLSConfig == nil {
sm.Spec.Endpoints[0].TLSConfig = &prometheusv1.TLSConfig{}
}
sm.Spec.Endpoints[0].TLSConfig.CA = prometheusv1.SecretOrConfigMap{}
sm.Spec.Endpoints[0].TLSConfig.CA.Secret = &corev1.SecretKeySelector{}
sm.Spec.Endpoints[0].TLSConfig.CA.Secret.Name = ba.GetStatus().GetReferences()[common.StatusReferenceCertSecretName]
sm.Spec.Endpoints[0].TLSConfig.CA.Secret.Key = "tls.crt"
sm.Spec.Endpoints[0].TLSConfig.ServerName = obj.GetName() + "." + obj.GetNamespace() + ".svc"
}
}
The problem is solved if the tlsConfig of the first endpoint is not nil. So giving an empty value in any of the fields results in http scheme being used.
if ba.GetManageTLS() == nil || *ba.GetManageTLS() {
if len(ba.GetMonitoring().GetEndpoints()) == 0 || ba.GetMonitoring().GetEndpoints()[0].TLSConfig == nil {
sm.Spec.Endpoints[0].Scheme = "https"
... }
... }
in the second if statement if there are no endpoints or if the first endpoint has no TLSConfig, it is setting the scheme to https. This is the issue that needs to be fixed.
Additional context
If there is only one intended end point and that has to be http then this logic does not allow the same.