hybrid cloud 3 Red Hat Advanced Cluster Management for Kubernetes 2.11 Use enhanced Search to quickly see all virtual machines on your fleet. Gain deeper insights and visibility into your OpenShift Virtualization inventory with a ready-to-use dashboard. Generally Available (GA)
instances 8 Control the scale of ACM Observability without AdvancedConfig! With Instance Sizes, users can now configure a set of resource requests across all their Observability components, sized proportionally, using a single field in their MCO CR, InstanceSize (provided Hub cluster has enough resources). Supported sizes: default, minimal, small, medium, large, 2xlarge, 4xlarge More details in: https://github.com/stolostron/stolostron/tree/main/dev-preview -
spokes were not supported due to various issues. They are now partially supported: • All spoke components are running like any *KS spoke, including prometheus. • Some metrics like ETCD ones are not scraped yet. How to Enable/Use Import the cluster as any other cluster. -
By default, RBAC is enforced per managed cluster (all or none) - Large managed clusters shared by multiple teams / applications in the organization want metrics access restricted to just their application's metrics Fine-grain RBAC provides Namespace level granularity by limiting access to specific namespaces. How to Enable/Use 1. Define Cluster roles for granular metrics access, rules define - apiGroup: cluster.open-cluster-management.io # always - resources: managedclusters # always - resourceNames: <managed cluster names> - verbs: metrics/<namespaces> - metrics/* indicates all namespaces # special case - (no other wild cards allowed) 2. Define Cluster role bindings to bind users to groups Documentation link here kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: ocm-metrics-access rules: - verbs: - metrics/open-cluster-management-agent - metrics/open-cluster-management-agent-addon apiGroups: - cluster.open-cluster-management.io resources: - managedclusters resourceNames: - devcluster1 - devcluster2 kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: ocm-metrics-access-binding subjects: - kind: User apiGroup: rbac.authorization.k8s.io name: user1 roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: ocm-metrics-access
overwritten by ACM Observability (see https://issues.redhat.com/browse/ACM-11724 or https://github.com/stolostron/rhacm-docs/pull/6518 for more details). ・ Planned to be fixed in 2.12.
ACM ▸ User experience unified in Grafana ▸ One-click fleetwide monitoring stack configuration ▸ Integration with custom-tailored storage/forwarding systems What is OpenShift Observability today? 13 An All-In-One Solution with an Opinionated Design ACM Multi-Cluster Observability as of today
Standalone community Thanos Operator ▸ Native CRD driven configuration, distributed and managed via addon framework 14 “Observe a fleet like a single cluster” Future ACM Observability
Objectives • Customer flexibility ◦ Selecting only the most relevant signals ◦ Adapting to different infrastructure • Cost efficiency ◦ Maximizing single-cluster solutions • Single-pane control ◦ Providing a single pane-of-glass across the fleet
full lifecycle control of Thanos components ▸ Closely built with focus on compatibility with widely used Prometheus Operator (OCP CMO is based on this) ▸ Community-friendly, expecting more and more contributions from upstream users/adopters of Thanos ▸ No upstream widely-adopted operator for Thanos exists yet ▸ In ACM, benefits of opinionated Thanos Operator CRDs and Red Hat guided customisation capabilities