-
Notifications
You must be signed in to change notification settings - Fork 166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve monitoring service controller #1688
base: main
Are you sure you want to change the base?
Improve monitoring service controller #1688
Conversation
Skipping CI for Draft Pull Request. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
63df2a3
to
353784f
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1688 +/- ##
==========================================
+ Coverage 23.60% 24.34% +0.74%
==========================================
Files 171 171
Lines 11646 11660 +14
==========================================
+ Hits 2749 2839 +90
+ Misses 8622 8525 -97
- Partials 275 296 +21 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
353784f
to
09bae79
Compare
s = s.Delete(rule) | ||
case operatorv1.Managed: | ||
ci := ch.NewCRObject(dsc) | ||
ready, err := cluster.IsReady(ctx, cli, ci) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not about this PR, but is the old logic correct:
if component X is enabled in DSC, but it never gets ready (crashloop) then promrule will never be added. so SRE will never get alerts?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
correct, I think the idea was to avoid having misfired alerts when the components is being enabled for the first time, hover we do lack other mechanisms and alerts to cover the case you mentioned. Maybe we should ask SRE which could eventually could lead to a much simpler implementation.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
to avoid having misfired alerts when the components is being enabled for the first time
And I still have the concern about unconditional deploying of scraping jobs even without the rules.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
everything is bad, thats why we need to get this #1676 out, one less headache in long term 😆
09bae79
to
f8d5cde
Compare
- avoid rewriting the prometheus config file for each reconciliation - add some basic unit tests
f8d5cde
to
5c81f8e
Compare
/test all |
/test opendatahub-operator-e2e |
/retest |
Description
Note
requires #1689
How Has This Been Tested?
Screenshot or short clip
Merge criteria