-
Notifications
You must be signed in to change notification settings - Fork 69
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable ingestion of the exposed metrics by openshift-montoring #410
Enable ingestion of the exposed metrics by openshift-montoring #410
Conversation
Skipping CI for Draft Pull Request. |
Codecov Report
@@ Coverage Diff @@
## master #410 +/- ##
==========================================
+ Coverage 37.51% 38.11% +0.60%
==========================================
Files 12 13 +1
Lines 2287 2571 +284
==========================================
+ Hits 858 980 +122
- Misses 1358 1514 +156
- Partials 71 77 +6
Continue to review full report at Codecov.
|
6a90d4c
to
d9b009e
Compare
ee2f6b9
to
5360d1e
Compare
/retest |
config/rbac/role.yaml
Outdated
- patch | ||
- watch | ||
- apiGroups: | ||
- rbac.authorization.k8s.io |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I worry about adding these permissions to the operator, is there any other way of achieving this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@shawn-hurley we need these permissions so that the operator creates the appropriate role/rolebindings needed for the prometheus operator to scrape the metrics from our ns.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm, isn't that already done by OLM when installing if you have the correct annotation?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@shawn-hurley PTAL I have removed the prometheus role/rolebinding creation by OADP operator.
Is this cardinality 13 or higher for series count planned to send to telemetry? |
@smarterclayton is the cardinality of 13 or lower for each metric, or in total for all metrics? |
@smarterclayton never mind you said series, not metrics sorry IIUC this means that that we can only send 13 series to monitoring. The key distinction here is going to be that when a label is added to the data, you increase the cardinality by 1. |
@smarterclayton After re-evaluating our telemetry needs, we have decided to use only two metrics to be ingested by openshift-monitoring: |
/retest |
1 similar comment
/retest |
/retest |
@shubham-pampattiwar: The following test failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
This PR enable the ingestion of the velero metrics by openshift monitoring. We are deploying the service and serviceMonitor required for the metrics to be scraped by prometheus. We propose the following metrics for the monitoring and telemetry purposes: