-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide support for using Prometheus scaler with Azure Monitor managed service for Prometheus (preview) #4153
Comments
Thankyou @tomkerkhove for opening this issue. I am starting to look into this support and would need some time to go through the details and come up with a plan. Will share the proppsal/idea for further discussion/brainstorming once I am there! |
Great, thank you @raggupta-ms! |
I spent some time on KEDA code and this is what I am thinking:
@tomkerkhove, please share your comments on the above thought. Also, please add/tag other folks who can help reviewing. |
This is OK for me, if we agree on it with other maintainers then we should track a new issue for it.
I am on the fence on this one since we do support it for other Azure scalers and implementation should be minimal. Pod Identity is deprecated, but not archived yet so I'm leaning toward adding it. @JorTurFer @zroubalik? Correct, this should work as an end outcome.
This is already a pre-requisite so a non-action for you.
@JorTurFer @zroubalik can you validate this, Sounds legit to me though.
I agree, changes should be easy. |
I have no idea about what is Azure AD App auth, but it looks good to me
Agree with @tomkerkhove , if AAD-Pod-Identity is still alive (its EOL is December if I'm not wrong), we should support both. The best part is that we already have the code to get the token (like for AAD-WI), so the extra required code should be low About the implementation, sound good in my mind, but I need to see the code to have a real opinion about it. From my side, you can go ahead. Remember that e2e test is also required as part of the feature. You will need to do another PR to the testing infra repository, adding the needed terraform to deploy the managed prometheus and performing the role assignment required to grant permissions to the e2e managed identity |
Thankyou @tomkerkhove and @JorTurFer for reviweing. I didn't have strong opinion on not adding support for Pod Identity. Since you feel it should be there (I also agree somewhat that it is going to stick in for probably around an year more), I will add that as well. Will proceed to make code changes at my end. Noted the testing part, I may have more questions, especially around testing when I reach there. Thanks for the support! |
@JorTurFer This is just Azure AD authentication with a client app |
@tomkerkhove @JorTurFer I am facing an issue while trying to setup my VSCode for debugging and could use your help, in case you know. I am following the steps listed here: https://github.com/kedacore/keda/blob/main/BUILD.md#operator but when I launch VS Code, I get following error:
Looks like the operator is trying to get hold of ca and tls certs. Is this expected when debugging locally? Is there a way to disable tls on local setup? I am using minikube cluster. I could find some annotation related to tls cert in keda-metrics-apiserver yaml file and removed all of it, annotated with I tried to supply a ca.crt at the mentioned location but then it asked for tls.crt etc. and I could not resolve that completely - am no expert on tls and certs :( Any idea what I might be doing wrong or to get it working? Note that when I deploy by scaling keda operator to 0 and then |
Oh! Sorry, this has been my fault :( |
Hi @raggupta-ms , Thanks for notifying the documentation gap :) |
@JorTurFer thankyou for the instructions. It did the resolve the issue :) |
no worries, it was missing due to my fault xD |
created a PR: #4256 |
Docs and feature are in, we are good to go! |
Thank you @raggupta-ms ! |
Proposal
Provide support for using Prometheus scaler with Azure Monitor managed service for Prometheus (preview) which relies on Azure AD authentication.
Use-Case
Customers using Azure Monitor managed service for Prometheus (preview) can scale their applications based on existing metrics.
Is this a feature you are interested in implementing yourself?
No
Anything else?
This requires the addition of Azure AD authentication, I'll dig in to the requirements for this.
The text was updated successfully, but these errors were encountered: