-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
4.16
-
None
-
Quality / Stability / Reliability
-
False
-
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
metrics can be accessed from, for instance, an application pod insecurely. See below: oc get pods -n openshift-multus -o wide | grep network-metrics | head -1 network-metrics-daemon-2zggs 2/2 Running 0 3d4h 10.128.0.3 master-0.shrocp4upi416ovn.lab.upshift.rdu2.redhat.com <none> <none> oc -n openshift-monitoring exec prometheus-k8s-0 -- curl http://10.128.0.3:9091/metrics % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 13615 0 13615 0 # HELP pod_network_name_info Metric to identify network names of networks added to pods. # TYPE pod_network_name_info gauge pod_network_name_info{interface="eth0",namespace="openshift-apiserver",network_name="ovn-kubernetes",pod="apiserver-5b9cf4b94c-jbw2j"} 0 pod_network_name_info{interface="eth0",namespace="openshift-apiserver-operator",network_name="ovn-kubernetes",pod="openshift-apiserver-operator-84fc88fd69-hr9mq"} 0 ....
Version-Release number of selected component (if applicable):
4.16
How reproducible:
Steps to Reproduce:
1. 2. 3.
Actual results:
Expected results:
Additional info: