Skip to content

Update module github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring to v0.81.0 #628

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

red-hat-konflux[bot]
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Mar 2, 2025

This PR contains the following updates:

Package Type Update Change
github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring require minor v0.76.2 -> v0.81.0

Warning

Some dependencies could not be looked up. Check the warning logs for more information.


Release Notes

prometheus-operator/prometheus-operator (github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring)

v0.81.0: 0.81.0 / 2025-03-11

Compare Source

  • [CHANGE] Remove the lower-case hypervisor and instance roles for the OpenStack Service Discovery from the ScrapeConfig CRD (users are required to use Hypervisor and Instance instead). #​7370
  • [FEATURE] Add serviceName field to the ThanosRuler and Alertmanager CRDs. #​7325
  • [FEATURE] Add shardRetentionPolicy field to the Prometheus CRD (it requires the PrometheusShardRetentionPolicy feature gate). #​7274
  • [FEATURE] Add support for the cluster mTLS configuration to the Alertmanager CRD. #​7149
  • [FEATURE] Add LoadBalancer role for the OpenStack Service Discovery to the ScrapeConfig CRD. #​7356
  • [ENHANCEMENT] Add enableServiceLinks field to the Alertmanager, Prometheus, PrometheusAgent and ThanosRuler CRDs. #​7384
  • [BUGFIX] Fix Alertmanager configuration with PushOver duration fields. #​7249

v0.80.1: 0.80.1 / 2025-02-19

Compare Source

  • [BUGFIX] Fix msteamsv2_configs to work with either webhook_url or webhook_url_file. #​7352

v0.80.0: 0.80.0 / 2025-02-04

Compare Source

  • [CHANGE] Add more API validations to the ScrapeConfig CRD. #​7231 #​7220 #​7215 #​7238 #​7244 #​7255
  • [FEATURE] Add serviceName field to the Prometheus and PrometheusAgent CRDs. #​6687
  • [FEATURE] Add keepIdentifyingResourceAttributes field in OTLPConfig for Prometheus and PrometheusAgent CRDs. #​7240
  • [FEATURE] Add fallbackScrapeProtocol field to ScrapeClass for Prometheus and PrometheusAgent CRDs. #​7288
  • [FEATURE] Support MSTeamsV2Config receiver in Alertmanager configuration Secret. #​7296
  • [FEATURE] Support JiraConfig and RocketChat receivers in Alertmanager configuration secret. #​7315
  • [FEATURE] Support global smtp_tls_config field in Alertmanager configuration secret. #​7316
  • [FEATURE] Add timeout field in Webhook receiver in Alertmanager configuration Secret. #​7312
  • [FEATURE] Add content, username and avatarUrl fields in Discord receiver in Alertmanager configuration secret. #​7313
  • [FEATURE] Add scrapeFailureLogFile field to the Prometheus and PrometheusAgent CRDs. #​7038 #​7311
  • [BUGFIX] Validate respective api URL field in PagerDutyConfigs, DiscordConfigs, SlackConfigs and WebhookConfigs in AlertManagerConfig CRD. #​6585

v0.79.2: 0.79.2 / 2024-12-18

Compare Source

  • [BUGFIX] Fix pod and service monitor selector validation. #​7214

v0.79.1: 0.79.1 / 2024-12-17

Compare Source

  • [CHANGE] Rename the field scrapeFallbackProtocol to fallbackScrapeProtocol to match with naming as in Prometheus #​7199
  • [BUGFIX] Remove the field scrapeFallbackProtocol from Prometheus/PrometheusAgent global config. #​7197

v0.79.0: 0.79.0 / 2024-12-13

Compare Source

[!IMPORTANT]
With this release, the operator will be deploying Prometheus v3.0.1 unless a specific version is specified.
Users who want to stay with Prometheus v2 need to set the version field under
Prometheus/PrometheusAgent Spec.

  • [CHANGE/FEATURE] Set Prometheus v3.0.1 as default version installed by operator. #​7158
  • [CHANGE] Add more API validations to the ScrapeConfig CRD. #​6738 #​7006
  • [FEATURE] Set Alertmanager API version to v2 for Prometheus v3 and above. #​7102
  • [FEATURE] Add enableOTLPReceiver field in the Prometheus/PrometheusAgent CRDs. #​7105
  • [FEATURE] Add support for TranslationStrategy option for OTLP receiver. #​7112
  • [FEATURE] Add nameValidationScheme field in Prometheus global configuration. #​7116
  • [FEATURE] Add scrapeFallbackProtocol field in Prometheus, PrometheusAgent, ServiceMonitor, PodMonitor, Probe, ScrapeConfig and globally. #​7131
  • [FEATURE] Add support for labels in PrometheusRule CRD at rules level. #​7140
  • [FEATURE] Add support for ProxyConfig in Alertmanager Endpoints. #​7191
  • [FEATURE] Add support for configuring Alertmanager STS persistentVolumeClaimRetentionPolicy. #​7183
  • [FEATURE] Add enableHTTP2 to ScrapeConfig CRD. #​7024
  • [FEATURE] Add filter field in ConsulSDConfig in ScrapeConfig CRD #​7124
  • [FEATURE] Add messageThreadID field to TelegramConfig in AlertmanagerConfig CRD. #​6999
  • [ENHANCEMENT] Allow users to control the sharding label(s). #​7126
  • [ENHANCEMENT] Add support for role selector field selectorMechanism on ServiceMonitor. #​7086
  • [ENHANCEMENT] Add support for role selector field selectorMechanism on PodMonitor. #​7185
  • [ENHANCEMENT] Add support for the PrometheusText1.0.0 scrape protocol. #​7085
  • [ENHANCEMENT] Allow users to toggle Prometheus controller's custom configuration deprecation behavior using the --deprecate-custom-configuration flag. #​6955
  • [BUGFIX] Add goGC field to PrometheusAgent CRD. #​6667
  • [BUGFIX] Validate SMTPSmarthost and SMTPFrom fields in EmailConfig in AlertManagerConfig CRD. #​6004
  • [BUGFIX] Fix flaky discovery behavior caused by delayed endpoints publishing for Alertmanager. #​7084

v0.78.2: 0.78.2 / 2024-11-21

Compare Source

  • [BUGFIX] Revert the removal of the proxyURL field in AlertmanagerConfig CRD. The field takes precedence over proxyUrl. #​7114

v0.78.1: 0.78.1 / 2024-10-30

Compare Source

v0.78.0: 0.78.0 / 2024-10-30

Compare Source

  • [CHANGE] Allow overlapping compactions by default in Prometheus when the Thanos sidecar is configured with uploads. #​6906
  • [CHANGE] Drop support (officially) for Alertmanager less than v0.15. #​7057
  • [FEATURE] Add dnsConfig and dnsPolicy fields to Alertmanager, Prometheus, PrometheusAgent and ThanosRuler CRDs. #​3889
  • [FEATURE] Add ruleQueryOffset field to Prometheus CRD and query_offset field to PrometheusRule CRD. #​6957
  • [FEATURE] Add support for Remote Write v2.0 to Prometheus and PrometheusAgent CRDs. #​7033
  • [ENHANCEMENT] Add goGC field to Prometheus and PrometheusAgent CRDs. #​6667
  • [BUGFIX] Fix label name validation in ScrapeConfig CRD. #​6892
  • [BUGFIX] Fix version checking for the promoteResourceAttributes field. #​7017

v0.77.2: 0.77.2 / 2024-10-21

Compare Source

  • [BUGFIX] Correct HTTP port name for the Kubelet endpoint. #​7027

v0.77.1: 0.77.1 / 2024-09-25

Compare Source

  • [BUGFIX] Fix Thanos Ruler reconciliations not triggered on StatefulSet updates. #​6964
  • [BUGFIX] Fix error message for unsupported versions. #​6965

v0.77.0: 0.77.0 / 2024-09-19

Compare Source

[!NOTE]
Along with this release we also introduce a new command line tool poctl. It is designed specifically for managing Prometheus Operator Custom Resources. This project is currently under active development and fully experimental, so expect breaking changes and rough edges. We encourage you to try it out and provide the feedback.

[!WARNING]
Another notable change is that we have switched the logging framework from go-kit/log to slog which may lead to some differences in the log output.

  • [CHANGE] Add more API validation and changes to the ScrapeConfig CRD. #​6921 #​6855 #​6744
  • [CHANGE] Update the validating webhook to reject PrometheusRule objects that would generate configuration greater than the max ConfigMap size (512KiB). #​6606
  • [FEATURE] Add experimental Prometheus 3 support. It allows to try the new Prometheus v3.0.0-beta.0. #​6940
    • Feature requests in this version won't be supported until Prometheus 3 reaches a stable release. However, users are encouraged to try the beta version with the Operator and report any issues they encounter.
  • [FEATURE] Add support for PodMonitor to the PrometheusAgent CRD in DaemonSet mode. #​6879
  • [FEATURE] Add -kubelet-endpointslice argument to support EndpointSlice for the kubelet controller. #​6882
  • [FEATURE] Add outOfOrderTimeWindow field to the PrometheusAgent CRD. #​6851
  • [FEATURE] Add matchFirstNetwork field to the ScrapeConfig CRD for the Docker Service Discovery. #​6849 #​6894
  • [FEATURE] Add the otlp field to the Prometheus and PrometheusAgent CRDs. #​6780
  • [FEATURE] Add support for certificate, key and client CA file paths to the web TLS configuration. #​6358
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for OAuth2 clients. #​6922
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for HTTP clients. #​6864
  • [FEATURE] Add Ionos Service Discovery support to ScrapeConfig CRD. (#​6732)
  • [BUGFIX] Fix panic when processing an invalid AlertmanagerConfig object used for global configuration. #​6931
  • [BUGFIX] Allow configuring proxy URL for all Prometheus versions. #​6845

Configuration

📅 Schedule: Branch creation - "after 5am on sunday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.

This PR has been generated by MintMaker (powered by Renovate Bot).

Copy link
Contributor Author

red-hat-konflux bot commented Mar 2, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 23 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22.5 -> 1.23.7
github.com/onsi/gomega v1.34.1 -> v1.36.1
golang.org/x/net v0.28.0 -> v0.34.0
k8s.io/api v0.30.3 -> v0.32.2
k8s.io/apiextensions-apiserver v0.30.3 -> v0.32.2
k8s.io/apimachinery v0.30.3 -> v0.32.2
k8s.io/client-go v0.30.3 -> v0.32.2
github.com/evanphx/json-patch/v5 v5.9.0 -> v5.9.11
golang.org/x/crypto v0.26.0 -> v0.32.0
golang.org/x/oauth2 v0.22.0 -> v0.23.0
golang.org/x/sync v0.8.0 -> v0.10.0
golang.org/x/sys v0.24.0 -> v0.29.0
golang.org/x/term v0.23.0 -> v0.28.0
golang.org/x/text v0.17.0 -> v0.21.0
golang.org/x/time v0.6.0 -> v0.7.0
golang.org/x/tools v0.24.0 -> v0.26.0
google.golang.org/genproto/googleapis/rpc v0.0.0-20240708141625-4ad9e859172b -> v0.0.0-20240826202546-f6391c0de4c7
google.golang.org/protobuf v1.34.2 -> v1.35.1
gopkg.in/yaml.v3 v3.0.1 -> v3.0.1
k8s.io/apiserver v0.30.3 -> v0.32.2
k8s.io/kube-openapi v0.0.0-20240808142205-8e686545bdb8 -> v0.0.0-20241105132330-32ad38e42d3f
k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 -> v0.0.0-20241210054802-24370beab758
sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd -> v0.0.0-20241014173422-cfa47c3a1cc8
sigs.k8s.io/structured-merge-diff/v4 v4.4.1 -> v4.5.0

@openshift-ci openshift-ci bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Mar 2, 2025
Copy link
Contributor

openshift-ci bot commented Mar 2, 2025

Hi @red-hat-konflux[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci openshift-ci bot requested review from Vincent056 and xiaojiey March 2, 2025 14:33
Copy link
Contributor

openshift-ci bot commented Mar 2, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: red-hat-konflux[bot]
Once this PR has been reviewed and has the lgtm label, please assign yuumasato for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

…apis/monitoring to v0.81.0

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/master/proxy-git.cwkhome.fun-prometheus-operator-prometheus-operator-pkg-apis-monitoring-0.x branch from 14c0e8a to 035cd7d Compare March 30, 2025 16:14
@red-hat-konflux red-hat-konflux bot changed the title Update module github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring to v0.80.1 Update module github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring to v0.81.0 Mar 30, 2025
@rhmdnd
Copy link
Contributor

rhmdnd commented Apr 24, 2025

/ok-to-test

@openshift-ci openshift-ci bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Apr 24, 2025
Copy link
Contributor

openshift-ci bot commented May 22, 2025

@red-hat-konflux[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-rosa 035cd7d link false /test e2e-rosa
ci/prow/ci-index-file-integrity-operator-bundle 035cd7d link true /test ci-index-file-integrity-operator-bundle
ci/prow/images 035cd7d link true /test images
ci/prow/unit 035cd7d link true /test unit
ci/prow/verify 035cd7d link true /test verify
ci/prow/e2e-aws 035cd7d link true /test e2e-aws

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ok-to-test Indicates a non-member PR verified by an org member that is safe to test.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant