Bug 2150752
| Summary: | ocs_advanced_usage metric is 0 even when storageclass/PV encryption is enabled | |||
|---|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat OpenShift Data Foundation | Reporter: | Rachael <rgeorge> | |
| Component: | ocs-operator | Assignee: | umanga <uchapaga> | |
| Status: | CLOSED ERRATA | QA Contact: | Parag Kamble <pakamble> | |
| Severity: | medium | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 4.12 | CC: | ebenahar, kramdoss, muagarwa, odf-bz-bot, sostapov, uchapaga | |
| Target Milestone: | --- | |||
| Target Release: | ODF 4.14.0 | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | 4.14.0-115 | Doc Type: | No Doc Update | |
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 2233023 2233025 (view as bug list) | Environment: | ||
| Last Closed: | 2023-11-08 18:49:51 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2233023, 2233025 | |||
|
Description
Rachael
2022-12-05 08:36:29 UTC
We already had this PR: https://github.com/red-hat-storage/ocs-operator/pull/1826 , which was supposed to fix the issue. As StorageClass is a cluster wide resource (and not a namespace constrained resource), may have to take a different approach. Taking a look Umanga has created a PR for this: https://github.com/red-hat-storage/ocs-operator/pull/2032 This is now backported to 4.13 branch as well: https://github.com/red-hat-storage/ocs-operator/pull/2033 Added an encrypted storageclass checked the metric and it still 0. Moving to assigned. Not a blocker for 4.13 When PV encryption storage class exists, ocs_advanced_feature_usage metric's value is set to 1.
Tested with:
ODF 4.14.0-161
OCP 4.14.0-0.nightly-2023-11-05-194730
===================================================================
Storage class:
kind: StorageClass
apiVersion: storage.k8s.io/v1
metadata:
name: storageclass-test-rbd-bc233ca580c64361aa
uid: 82bf856a-d383-4b05-9700-c4251aefd09e
resourceVersion: '239098'
creationTimestamp: '2023-11-06T21:25:15Z'
managedFields:
- manager: kubectl-create
operation: Update
apiVersion: storage.k8s.io/v1
time: '2023-11-06T21:25:15Z'
fieldsType: FieldsV1
fieldsV1:
'f:allowVolumeExpansion': {}
'f:parameters':
'f:csi.storage.k8s.io/controller-expand-secret-name': {}
'f:clusterID': {}
'f:imageFeatures': {}
'f:csi.storage.k8s.io/controller-expand-secret-namespace': {}
.: {}
'f:csi.storage.k8s.io/provisioner-secret-namespace': {}
'f:pool': {}
'f:encrypted': {}
'f:csi.storage.k8s.io/node-stage-secret-name': {}
'f:csi.storage.k8s.io/node-stage-secret-namespace': {}
'f:encryptionKMSID': {}
'f:csi.storage.k8s.io/provisioner-secret-name': {}
'f:imageFormat': {}
'f:provisioner': {}
'f:reclaimPolicy': {}
'f:volumeBindingMode': {}
provisioner: openshift-storage.rbd.csi.ceph.com
parameters:
csi.storage.k8s.io/provisioner-secret-namespace: openshift-storage
encrypted: 'true'
csi.storage.k8s.io/provisioner-secret-name: secret-test-rbd-ca5e8fb37b00464ca4397925
csi.storage.k8s.io/node-stage-secret-name: secret-test-rbd-ca5e8fb37b00464ca4397925
encryptionKMSID: vault-test-4ad7372ca055403a959db023b38be
csi.storage.k8s.io/controller-expand-secret-name: secret-test-rbd-ca5e8fb37b00464ca4397925
imageFormat: '2'
clusterID: openshift-storage
imageFeatures: layering
csi.storage.k8s.io/controller-expand-secret-namespace: openshift-storage
pool: ocs-storagecluster-cephblockpool
csi.storage.k8s.io/node-stage-secret-namespace: openshift-storage
reclaimPolicy: Delete
allowVolumeExpansion: true
volumeBindingMode: Immediate
ocs_advanced_usage Metric:
Name
container
endpoint
instance
job
managedBy
namespace
pod
prometheus
service
Value
ocs_advanced_feature_usage ocs-metrics-exporter metrics 10.128.2.22:8080 ocs-metrics-exporter ocs-storagecluster openshift-storage ocs-metrics-exporter-65c7d9bbbb-kgr67 openshift-monitoring/k8s ocs-metrics-exporter 1
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: Red Hat OpenShift Data Foundation 4.14.0 security, enhancement & bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:6832 |