Skip to content

Commit

Permalink
remove wavefront dependancy
Browse files Browse the repository at this point in the history
#18

Signed-off-by: Rui Yang <[email protected]>
  • Loading branch information
Rui Yang committed Jul 28, 2022
1 parent ab0f272 commit b307a99
Show file tree
Hide file tree
Showing 16 changed files with 0 additions and 543 deletions.
1 change: 0 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,6 @@ the bootstrapping pipeline, since this repo is private.
It will also prompt you to ensure that the required secrets have been added
to GCP Secret Manager. The following secrets must be created:

* `production-wavefront_token` - the wavefront token for sending metrics/traces
* `production-ci-github_client_id` - the client ID of the Github application
for authenticating with the CI concourse deployment
* `production-ci-github_client_secret` - the client ID of the Github
Expand Down
1 change: 0 additions & 1 deletion bootstrap/setup
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,6 @@ jq -n '{ "greenpeace_gcp_credentials_json": $credentials[] | tojson,
# TODO: actually validate that these secrets are present with gcloud cli
echo
echo "ensure that the following secrets have been added to GCP Secret Manager:"
echo "- production-wavefront_token"
echo "- production-ci-github_client_id"
echo "- production-ci-github_client_secret"
echo "- dispatcher-concourse-github_client_id"
Expand Down
154 changes: 0 additions & 154 deletions terraform/dependencies/wavefront/main.tf

This file was deleted.

8 changes: 0 additions & 8 deletions terraform/dependencies/wavefront/outputs.tf

This file was deleted.

14 changes: 0 additions & 14 deletions terraform/dependencies/wavefront/variables.tf

This file was deleted.

13 changes: 0 additions & 13 deletions terraform/environments/dispatcher/concourse-values.yml.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -34,19 +34,6 @@ web:
type: LoadBalancer
loadBalancerIP: ${lb_address}

sidecarContainers:
- name: otel-collector
image: otel/opentelemetry-collector-contrib:0.15.0
args: ['--config=/etc/config/otelcol.yml']
volumeMounts:
- name: otelcol-config
mountPath: /etc/config

additionalVolumes:
- name: otelcol-config
configMap:
name: ${otelcol_config_map_name}

worker:
replicas: 1
annotations:
Expand Down
2 changes: 0 additions & 2 deletions terraform/environments/dispatcher/concourse.tf
Original file line number Diff line number Diff line change
Expand Up @@ -66,8 +66,6 @@ data "template_file" "concourse_values" {
vault_ca_cert = jsonencode(module.vault.ca_pem)
vault_client_cert = jsonencode(module.vault.client_cert_pem)
vault_client_private_key = jsonencode(module.vault.client_private_key_pem)

otelcol_config_map_name = kubernetes_config_map.otel_collector.metadata.0.name
}
}

Expand Down
99 changes: 0 additions & 99 deletions terraform/environments/dispatcher/metrics.tf

This file was deleted.

16 changes: 0 additions & 16 deletions terraform/environments/production/ci-values.yml.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -37,18 +37,6 @@ web:
type: LoadBalancer
loadBalancerIP: ${lb_address}

sidecarContainers:
- name: otel-collector
image: otel/opentelemetry-collector-contrib:0.15.0
args: ['--config=/etc/config/otelcol.yml']
volumeMounts:
- name: otelcol-config
mountPath: /etc/config
additionalVolumes:
- name: otelcol-config
configMap:
name: ${otelcol_config_map_name}

concourse:
web:
auth:
Expand Down Expand Up @@ -78,10 +66,6 @@ concourse:
createTeamNamespaces: false
prometheus:
enabled: true
tracing:
serviceName: web
otlpAddress: 127.0.0.1:55680
otlpUseTls: false
vault:
enabled: true
url: https://vault.vault.svc.cluster.local:8200
Expand Down
2 changes: 0 additions & 2 deletions terraform/environments/production/ci.tf
Original file line number Diff line number Diff line change
Expand Up @@ -100,8 +100,6 @@ data "template_file" "ci_values" {
vault_ca_cert = jsonencode(module.vault.ca_pem)
vault_client_cert = jsonencode(module.vault.client_cert_pem)
vault_client_private_key = jsonencode(module.vault.client_private_key_pem)

otelcol_config_map_name = jsonencode(kubernetes_config_map.otel_collector.metadata[0].name)
}
}

Expand Down
Loading

0 comments on commit b307a99

Please sign in to comment.