-
Bug
-
Resolution: Unresolved
-
Normal
-
4.13, 4.12, 4.14, 4.15, 4.16, 4.17, 4.18
Description of problem:
The current "description" annotation of the CoreDNSErrorsHigh alert doesn't provide much context about what's happening and what to do next.
Version-Release number of selected component (if applicable):
4.14.39
How reproducible:
always
Steps to Reproduce:
Deploy OCP and use unhealthy nameservers as upstream for CoreDNS ! Or control DNS pods placement without complying with the standard architecture...
Actual results:
CoreDNSErrorsHigh but the description annotation doesn't provide lots of information about what to do next.
Expected results:
Detailed instructions.
Additional info:
https://access.redhat.com/solutions/5917331
- blocks
-
OCPBUGS-52501 [release-4.13] Add runbook_url for CoreDNSErrorsHigh
-
- New
-
- impacts account
-
RFE-5643 [RFE][DNS METRICS] Split CoreDNSErrorsHigh alert rule
-
- Backlog
-
- relates to
-
OCPBUGS-52498 [release-4.16] Add runbook_url for CoreDNSErrorsHigh
-
- New
-
-
OCPBUGS-52499 [release-4.15] Add runbook_url for CoreDNSErrorsHigh
-
- New
-
-
OCPBUGS-52500 [release-4.14] Add runbook_url for CoreDNSErrorsHigh
-
- New
-
-
OCPBUGS-52501 [release-4.13] Add runbook_url for CoreDNSErrorsHigh
-
- New
-
-
OCPBUGS-52502 [release-4.12] Add runbook_url for CoreDNSErrorsHigh
-
- New
-
-
OCPBUGS-52497 [release-4.17] Add runbook_url for CoreDNSErrorsHigh
-
- ON_QA
-
-
OCPBUGS-52514 [release-4.18] Add runbook_url for CoreDNSErrorsHigh
-
- Verified
-
- links to