-
Feature Request
-
Resolution: Unresolved
-
Normal
-
None
-
None
-
None
-
False
-
None
-
False
-
Not Selected
-
-
1. Proposed title of this feature request
Cover initContainers waiting reasons with alerts
2. What is the nature and description of the request?
Current KubePodCrashLooping and KubeContainerWaiting alerting consumes kube_pod_container_status_waiting_reason which is based on containerStatuses. But we have no alerting today that consumes kube_pod_init_container_status_waiting_reason to cover initContainerStatuses. This RFE proposes we grow alert coverage there, whether that's expanding the expr in the existing alerts, or adding new alerts like KubeInitContainerWaiting.
3. Why does the customer need this? (List the business requirements here)
Currently there is no alert signal when a pod struggles with init containers, e.g. with the SignatureValidationFailed reason because it violates a ClusterImagePolicy. That can leave admins unaware that core cluster functionality is blocked because of signature validation issues.
4. List any affected packages or components.
Monitoring. Upstream alerts are here, but they don't cover initContainerStatuses yet either.
- is related to
-
OTA-1304 Cluster-update-keys should grow a manifest for ClusterImagePolicy
- Closed
- relates to
-
OCPSTRAT-1585 Installer enable/disable Sigstore policy, and version-pod failure accessability
- In Progress
-
OCPSTRAT-1245 [Tech Preview]Add sigstore signatures to core OCP payload and enable verification- phase 1
- Closed