This is a clone of issue OCPBUGS-41341. The following is the description of the original issue:
—
This is a clone of issue OCPBUGS-39126. The following is the description of the original issue:
—
Description of problem:
Difficult to detect in which component I should report this bug. The description is the following. Today we can install RH operators using one precise namespace or just all namepaces that will install the operator in "openshift-operators" namespace. if this operator creates a serviceMonitor that should be scrapped by platform prometheus, this will have a token authentication and security configured in its definition. But if the operator is installed in "openshift-operators" namespace, it's user workload monitoring that will try to scrappe it since this mentioned namespace has not the corresponding label to be scrapped by platform monitoring and we don't want it to have it because in this namespace we can also install community operators. The result is that user workload monitoring will scrap this namespace and the service monitors will be skipped since they are configured with security against platform monitoring and UWM will not hande this. A possible workaround is to do: oc label namespace openshift-operators openshift.io/user-monitoring=false losing functionality since some RH operators will not be monitored if installed in openshift-operators.
Version-Release number of selected component (if applicable):
4.16
- clones
-
OCPBUGS-41341 user workload monitoring is trying to scrap RH operators which have been installed in openshift-operators namespace
- Closed
- is blocked by
-
OCPBUGS-41341 user workload monitoring is trying to scrap RH operators which have been installed in openshift-operators namespace
- Closed
- links to
-
RHBA-2024:7174 OpenShift Container Platform 4.16.z bug fix update