-
Feature Request
-
Resolution: Unresolved
-
Normal
-
None
-
None
-
None
-
None
-
Product / Portfolio Work
-
None
-
False
-
-
None
-
None
-
None
-
-
None
-
None
-
None
-
None
-
None
Introduce a supported, namespace-scoped alerting and visibility model for User Workload Monitoring that allows:
- Namespace-level alert rules
-
- Users can define PrometheusRules scoped to their namespace
-
- Rules evaluate only metrics relevant to that namespace
- Namespace-level alert visibility
-
- Users can see:
-
-
- Alert firing state
-
-
-
- Alert history
-
-
-
- Alert labels and annotations
-
-
- Without access to cluster-wide monitoring data
- Web Console support
-
- Enable Observe → Metrics / Alerts UI for namespace-scoped users
-
- Limited to User Workload Monitoring data only
- Least-privilege RBAC
-
- New or enhanced roles enabling:
-
-
- Alert creation
-
-
-
- Alert viewing
-
-
-
- Alert querying
-
-
- Without requiring cluster-monitoring-view
Current Behavior{}
- cert-manager exposes certificate expiration metrics (for example:
certmanager_certificate_expiration_timestamp_seconds)
- These metrics can be scraped by User Workload Monitoring
- However:
-
- Namespace-scoped users cannot view alert firing state
-
- Namespace-scoped users cannot see Observe → Metrics / Alerts UI
-
- Alert evaluation and visibility remain effectively cluster-scoped
- Granting cluster-monitoring-view exposes all cluster metrics, which violates least-privilege requirements
Business Impact
- Security risk: Delayed certificate expiration awareness
- Operational overhead: Cluster admins must manage alerts for all teams
- Scalability limitation: Centralized alerting does not scale in multi-tenant clusters
- Least-privilege violation: Teams must be granted cluster-wide monitoring access to perform basic observability tasks
Why Existing Workarounds Are Insufficient
- Centralized alert routing removes self-service ownership
- External Grafana requires additional infrastructure and manual access control
- cluster-monitoring-view exposes sensitive cluster metrics
- CLI / Prometheus API access lacks UI visibility and alert state awareness
Expected Benefits
- Improved multi-tenancy support
- Stronger security posture (least privilege)
- Reduced operational burden on platform teams
- Better alignment with Kubernetes namespace ownership model
- Improved customer adoption of cert-manager and UWM
- relates to
-
RFE-7561 [RFE] links generated in receiver notifications cannot be accessed by users without cluster-role rights.
-
- Refinement
-