Skip to content

Commit f9ffbc3

Browse files
authored
Better logging including namespaces (#76)
* Better logging including namespaces * Correct string order to namespace/name
1 parent b128d16 commit f9ffbc3

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

controllers/valssecret_controller.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ func (r *ValsSecretReconciler) Reconcile(ctx context.Context, req ctrl.Request)
120120
}
121121

122122
// Stop reconciliation as the item is being deleted
123-
r.Log.Info(fmt.Sprintf("Secret %s deleted", secret.Name))
123+
r.Log.Info(fmt.Sprintf("Secret %s/%s deleted", secret.Namespace, secret.Name))
124124
dmetrics.SecretInfo.WithLabelValues(secret.Name, secret.Namespace).Set(0)
125125
return ctrl.Result{}, nil
126126
}
@@ -200,7 +200,7 @@ func (r *ValsSecretReconciler) Reconcile(ctx context.Context, req ctrl.Request)
200200
t, err := template.New(k).Funcs(sprig.FuncMap()).Parse(v)
201201
if err != nil {
202202
dmetrics.SecretError.WithLabelValues(secret.Name, secret.Namespace).SetToCurrentTime()
203-
r.Log.Error(err, "Cannot parse template")
203+
r.Log.Error(err, "Cannot parse template", "name", secret.Name, "namespace", secret.Namespace)
204204
if r.recordingEnabled(&secret) {
205205
msg := fmt.Sprintf("Template could not be parsed: %v", err)
206206
r.Recorder.Event(&secret, corev1.EventTypeNormal, "Failed", msg)
@@ -209,7 +209,7 @@ func (r *ValsSecretReconciler) Reconcile(ctx context.Context, req ctrl.Request)
209209
}
210210
if err := t.Execute(b, &dataStr); err != nil {
211211
dmetrics.SecretError.WithLabelValues(secret.Name, secret.Namespace).SetToCurrentTime()
212-
r.Log.Error(err, "Cannot render template")
212+
r.Log.Error(err, "Cannot render template", "name", secret.Name, "namespace", secret.Namespace)
213213
if r.recordingEnabled(&secret) {
214214
msg := fmt.Sprintf("Template could not be rendered: %v", err)
215215
r.Recorder.Event(&secret, corev1.EventTypeNormal, "Failed", msg)
@@ -222,7 +222,7 @@ func (r *ValsSecretReconciler) Reconcile(ctx context.Context, req ctrl.Request)
222222

223223
err = r.upsertSecret(&secret, data)
224224
if err != nil {
225-
r.Log.Error(err, "Failed to create secret")
225+
r.Log.Error(err, "Failed to create secret", "name", secret.Name, "namespace", secret.Namespace)
226226
return ctrl.Result{}, nil
227227
}
228228
elapsedProcess := time.Since(start).Milliseconds() // Calculate the elapsed time
@@ -309,7 +309,7 @@ func (r *ValsSecretReconciler) upsertSecret(sDef *secretv1.ValsSecret, data map[
309309

310310
if err != nil {
311311
if r.recordingEnabled(sDef) {
312-
msg := fmt.Sprintf("Secret %s not saved %v", secret.Name, err)
312+
msg := fmt.Sprintf("Secret %s/%s not saved %v", secret.Namespace, secret.Name, err)
313313
r.Recorder.Event(sDef, corev1.EventTypeNormal, "Failed", msg)
314314
}
315315
dmetrics.SecretFailures.Inc()
@@ -323,7 +323,7 @@ func (r *ValsSecretReconciler) upsertSecret(sDef *secretv1.ValsSecret, data map[
323323
if r.recordingEnabled(sDef) {
324324
r.Recorder.Event(sDef, corev1.EventTypeNormal, "Updated", "Secret created or updated")
325325
}
326-
r.Log.Info("Updated secret", "name", secretName)
326+
r.Log.Info("Updated secret", "name", secretName, "namespace", secret.Namespace)
327327

328328
if len(sDef.Spec.Databases) > 0 {
329329
r.updateDatabases(sDef, secret)
@@ -376,7 +376,7 @@ func (r *ValsSecretReconciler) updateDatabases(sDef *secretv1.ValsSecret, secret
376376
Port: sDef.Spec.Databases[db].Port,
377377
}
378378
if err := valsDb.UpdateUserPassword(dbQuery); err != nil {
379-
r.Log.Error(err, "Cannot update DB password")
379+
r.Log.Error(err, "Cannot update DB password", "name", secret.Name, "namespace", secret.Namespace)
380380
if r.recordingEnabled(sDef) {
381381
r.Recorder.Event(sDef, corev1.EventTypeNormal, "Failed", "Cannot update database password")
382382
}
@@ -430,7 +430,7 @@ func (r *ValsSecretReconciler) getKeyFromK8sSecret(secretRef string) (string, er
430430
matchMap := utils.FindAllGroups(re, secretRef)
431431

432432
if !utils.K8sSecretFound(matchMap) {
433-
return "", fmt.Errorf("The ref+k8s secret '%s' did not match the regular expression for ref+k8s://namespace/secret-name#key", secretRef)
433+
return "", fmt.Errorf("the ref+k8s secret '%s' did not match the regular expression for ref+k8s://namespace/secret-name#key", secretRef)
434434
}
435435
secret, err := r.getSecret(matchMap["secretName"], matchMap["namespace"])
436436
if err != nil {

0 commit comments

Comments
 (0)