Bug 1838297
Summary: | OLM: Console is not creating role binding when enabling monitoring for an operator | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Samuel Padgett <spadgett> |
Component: | Management Console | Assignee: | Jakub Hadvig <jhadvig> |
Status: | CLOSED ERRATA | QA Contact: | Yadan Pei <yapei> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 4.5 | CC: | aos-bugs, hasha, jhadvig, jokerman |
Target Milestone: | --- | ||
Target Release: | 4.5.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
Cause: Role and RoleBinding for let monitoring scrape metrics for operators when the `operatorframework.io/cluster-monitoring=true` is set, are not created when creating suggested-namespace
Consequence: Monitoring metrics scraping fails
Fix: Create Role and RoleBinding for let monitoring scrape metrics for operators when the `operatorframework.io/cluster-monitoring=true` is set
Result: Monitoring metrics scraping succeeds
|
Story Points: | --- |
Clone Of: | Environment: |
Version: 4.5.0-0.ci-2020-05-20-085335
Cluster ID: 5e1d119a-f4dd-41f6-bdbb-a8f12f65b250
Browser: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:76.0) Gecko/20100101 Firefox/76.0
|
|
Last Closed: | 2020-07-13 17:40:29 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1841149 |
Description
Samuel Padgett
2020-05-20 19:55:55 UTC
install logging enabled monitoring on console. [hasha@localhost ~]$ oc get role openshift-logging-prometheus -n openshift-logging -oyaml apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: creationTimestamp: "2020-05-28T01:47:59Z" managedFields: - apiVersion: rbac.authorization.k8s.io/v1 fieldsType: FieldsV1 fieldsV1: f:rules: {} manager: Mozilla operation: Update time: "2020-05-28T01:47:59Z" name: openshift-logging-prometheus namespace: openshift-logging resourceVersion: "67233" selfLink: /apis/rbac.authorization.k8s.io/v1/namespaces/openshift-logging/roles/openshift-logging-prometheus uid: fa021303-f1ff-48d5-8308-418aaa142b28 rules: - apiGroups: - "" resources: - services - endpoints - pods verbs: - get - list - watch [hasha@localhost ~]$ oc get rolebinding openshift-logging-prometheus -n openshift-logging -oyaml apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: creationTimestamp: "2020-05-28T01:48:00Z" managedFields: - apiVersion: rbac.authorization.k8s.io/v1 fieldsType: FieldsV1 fieldsV1: f:roleRef: f:apiGroup: {} f:kind: {} f:name: {} f:subjects: {} manager: Mozilla operation: Update time: "2020-05-28T01:48:00Z" name: openshift-logging-prometheus namespace: openshift-logging resourceVersion: "67238" selfLink: /apis/rbac.authorization.k8s.io/v1/namespaces/openshift-logging/rolebindings/openshift-logging-prometheus uid: e7532b0e-542a-4abc-9f4b-320418677f8a roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: openshift-logging-prometheus subjects: - kind: ServiceAccount name: prometheus-operator namespace: openshift-monitoring 4.5.0-0.nightly-2020-05-27-174108 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:2409 |