You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/nodes-cma-autoscaling-custom-prometheus-config.adoc
+41-23Lines changed: 41 additions & 23 deletions
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,8 @@
8
8
9
9
You can use the installed {product-title} Prometheus monitoring as a source for the metrics used by the custom metrics autoscaler. However, there are some additional configurations you must perform.
10
10
11
+
For your scaled objects to be able to read the {product-title} Prometheus metrics, you must use a trigger authentication or a cluster trigger authentication in order to provide the authentication information required. The following procedure differs depending on which trigger authentication method you use. For more information on trigger authentications, see "Understanding custom metrics autoscaler trigger authentications".
12
+
11
13
[NOTE]
12
14
====
13
15
These steps are not required for an external Prometheus source.
@@ -32,12 +34,16 @@ You must perform the following tasks, as described in this section:
32
34
33
35
.Procedure
34
36
35
-
. Change to the project with the object you want to scale:
37
+
. Change to the appropriate project:
36
38
+
37
39
[source,terminal]
38
40
----
39
-
$ oc project my-project
41
+
$ oc project <project_name> <1>
40
42
----
43
+
<1> Specifies one of the following projects:
44
+
+
45
+
* If you are using a trigger authentication, specify the project with the object you want to scale.
46
+
* If you are using a cluster trigger authentication, specify the `openshift-keda` project.
41
47
42
48
. Create a service account and token, if your cluster does not have one:
43
49
@@ -47,7 +53,6 @@ $ oc project my-project
47
53
----
48
54
$ oc create serviceaccount thanos <1>
49
55
----
50
-
+
51
56
<1> Specifies the name of the service account.
52
57
53
58
.. Create a `secret` YAML to generate a service account token:
@@ -62,7 +67,6 @@ metadata:
62
67
kubernetes.io/service-account.name: thanos <1>
63
68
type: kubernetes.io/service-account-token
64
69
----
65
-
+
66
70
<1> Specifies the name of the service account.
67
71
68
72
.. Create the secret object by using the following command:
0 commit comments