-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update verify connection API call #42
Update verify connection API call #42
Conversation
Signed-off-by: Raul Sevilla <[email protected]>
Signed-off-by: Raul Sevilla <[email protected]>
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #42 +/- ##
==========================================
- Coverage 84.79% 84.66% -0.14%
==========================================
Files 6 6
Lines 342 339 -3
==========================================
- Hits 290 287 -3
Misses 38 38
Partials 14 14 ☔ View full report in Codecov by Sentry. |
return err | ||
} | ||
return nil | ||
_, err := p.Query("up{}", time.Now().UTC().UTC()) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes this works, but on a large scale cluster it returns a bulk of data as it checks all target endpoints, hope that is fine.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
## Type of change - [ ] Refactor - [ ] New feature - [ ] Bug fix - [x] Optimization - [ ] Documentation Update ## Description Includes fix cloud-bulldozer/go-commons#42 cc: @mukrishn ## Related Tickets & Documents - Related Issue # - Closes # Signed-off-by: Raul Sevilla <[email protected]>
Type of change
Description
The previous API call doesn't work in AKS's prometheus instances. Seems like endpoints from the /status path are not exposed
Related Tickets & Documents
Checklist before requesting a review