-
Bug
-
Resolution: Done-Errata
-
Undefined
-
4.13, 4.12, 4.14, 4.15.0, 4.16.0
This is a clone of issue OCPBUGS-25894. The following is the description of the original issue:
—
Description of problem:
Kube-apiserver operator is trying to delete prometheus rule that does not exists leading to huge amount of unwanted audit logs, With the introduction of the change as a part of BUG-2004585 kube-apiserver SLO rulesare split into 2 groups kube-apiserver-slos-basic and kube-apiserver-slos-extended kube-apiserver-operator is trying to delete /apis/monitoring.coreos.com/v1/namespaces/openshift-kube-apiserver/prometheusrules/kube-apiserver-slos which no longer exist in the cluster
Version-Release number of selected component (if applicable):
4.12 4.13 4.14
How reproducible:
Its easy to reproduce
Steps to Reproduce:
1. install a cluster with 4.12 2. enable cluster logging 3. forward the audit log to internal or external logstore using below config apiVersion: logging.openshift.io/v1 kind: ClusterLogForwarder metadata: name: instance namespace: openshift-logging spec: pipelines: - name: all-to-default inputRefs: - infrastructure - application - audit outputRefs: - default 4. Check the audit logs in kibana, it will show the logs like below image
Actual results:
Kube-apiserver-operator is trying to delete prometheus rule that does not exists in the cluster
Expected results:
if the rule is not there in the cluster it should not be searched for deletion
Additional info:
- clones
-
OCPBUGS-25894 Kube-apiserver operator is trying to delete prometheus rule that does not exists
- Closed
- is blocked by
-
OCPBUGS-25894 Kube-apiserver operator is trying to delete prometheus rule that does not exists
- Closed
- links to
-
RHBA-2024:3889 OpenShift Container Platform 4.15.z bug fix update