As seen here the ServiceMonitor uses basicAuth for prometheus metrics scraping. It uses the admin credentials - but these credentials (should) change after the admin logs into nexus the first time and the wizard requires establishing a new password.
I tested the current orchestration, and the prometheus target for nexus does go "down" after the credentials are modified.
Designs
Child items
0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items
0
Link issues together to show that they're related or that one is blocking others.
Learn more.
Related merge requests
1
When this merge request is accepted, this issue will be closed automatically.
Throwing this out there...Twistlock is the only other servicemonitor we use with authentication (to my knowledge). Twistlock is a bit different since we created everything to initialize it, but the way that one works:
Metrics user/password is created as a secret, this user has a randomized password
Admin user/password is created as part of init job OR supplied by end user configuration (to handle existing installs)
Init job calls api to create the metrics user with least privilege
Service monitor references the secret for auth
We could likely implement some job logic around things similar to this?
Handle initial password change based on user supplied values or accept user input for password
Create an additional least privilege metrics user
Change servicemonitor to reference ^ user account rather than admin
Would have to evaluate what API calls we have to use, but should be doable?