Description of problem: CVO already is responsible for alerting on whether its operands are unhealthy. No need for CCO to have its own alert. Version-Release number of selected component (if applicable): 4.7 How reproducible: 100% Steps to Reproduce: 1. Put CCO into an unhealthy state. Actual results: Witness CVO and CCO alerts reporting the same information. Expected results: Only need a single alert. Additional info:
Hi, Joel I checked the CloudCredentialOperatorDown alert has removed from cco, and when I create a wrong credentialsrequest, co cloud-credential will be degraded, then cvo will show CloudCredentialOperatorDown and ClusterOperatorDegraded alerts. Before,I through scaling down cco and cvo deployments replicas to 0, cco will show the CloudCredentialOperatorDown alert to reflect the pod is not running. But now, the CloudCredentialOperatorDown alert is owned by cvo, I am not sure if cvo will show CloudCredentialOperatorDown when cco pod crash, because I can't reproduce a cco pod crash scenario. if I only scale down cco deployment replica to 0, cvo will reset it.
sorry, I write the wrong content above, when co cloud-credential will be degraded, cvo will show ClusterOperatorDown and ClusterOperatorDegraded alerts.
Ok, so it sounds like CVO is handling the alerting instead of CCO also having its own alert.
ok, thanks joel. verified on 4.8.0-0.nightly-2021-04-09-222447.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.8.2 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:2438