Skip to content

RFE-7406: Include the K8s ingress resource in namespace inspect collection#2004

Open
oarribas wants to merge 5 commits intoopenshift:mainfrom
oarribas:gather-k8s-ingress
Open

RFE-7406: Include the K8s ingress resource in namespace inspect collection#2004
oarribas wants to merge 5 commits intoopenshift:mainfrom
oarribas:gather-k8s-ingress

Conversation

@oarribas
Copy link
Contributor

@oarribas oarribas commented Apr 9, 2025

Including the K8s ingress.networking.k8s.io resource in namespace inspect collections could help to identify if the K8s ingress is in use.
It shouldn't increase the size of the inspect or must-gather a lot, as the resource shouldn't be too big.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Apr 9, 2025
@openshift-ci-robot
Copy link

openshift-ci-robot commented Apr 9, 2025

@oarribas: This pull request references RFE-7406 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the feature request to target the "4.19.0" version, but no target version was set.

Details

In response to this:

Including the K8s ingress.networking.k8s.io resource in namespace inspect collections could help to identify the K8s ingress is in use.
It shouldn't increase the size of the inspect or must-gather a lot, as the resource shouldn't be too big.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot requested review from atiratree and deads2k April 9, 2025 16:01
@openshift-ci-robot
Copy link

openshift-ci-robot commented Apr 9, 2025

@oarribas: This pull request references RFE-7406 which is a valid jira issue.

Details

In response to this:

Including the K8s ingress.networking.k8s.io resource in namespace inspect collections could help to identify if the K8s ingress is in use.
It shouldn't increase the size of the inspect or must-gather a lot, as the resource shouldn't be too big.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@oarribas
Copy link
Contributor Author

/retest

1 similar comment
@oarribas
Copy link
Contributor Author

/retest

@ardaguclu
Copy link
Member

I think, we can't merge anything without having concrete metrics about how the change will impact the logs size and duration -- Especially after trying to fix and lower the logs sizes due to some issues.

I'd prefer waiting for the acceptance of the RFE by the workloads team first.
/hold

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Apr 10, 2025
@oarribas
Copy link
Contributor Author

/retest

@palonsoro
Copy link

@ardaguclu bear in mind that this resource is used only in user application namespaces. This means that must-gather should not collect it and should hence not see a difference in size by default.

The difference in size would happen only when the customer runs the inspect on their own application namespaces (something we need quite often to provide good support). And in that case:

  • Inspects of concrete namespaces are usually not that big.
  • Users have higher control in the size of the inspects (e.g. inspect only one namespace instead of all the impacted ones, setting the pod log sizes...)
  • Increase would be of very few KBs in most cases.

@oarribas
Copy link
Contributor Author

/retest

3 similar comments
@oarribas
Copy link
Contributor Author

/retest

@oarribas
Copy link
Contributor Author

/retest

@oarribas
Copy link
Contributor Author

/retest

@oarribas
Copy link
Contributor Author

it's not clear the test is really failing because the changes in this PR

/retest

@oarribas
Copy link
Contributor Author

/retest

1 similar comment
@oarribas
Copy link
Contributor Author

/retest

@oarribas
Copy link
Contributor Author

Checking the failing job [1], I cannot identify where the error with the check is. Not clear if caused by the changes in this PR, or any issue with the check.

/retest

[1] https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/openshift_oc/2004/pull-ci-openshift-oc-master-verify/1916749485623480320

@oarribas
Copy link
Contributor Author

/retest

2 similar comments
@oarribas
Copy link
Contributor Author

/retest

@oarribas
Copy link
Contributor Author

oarribas commented May 8, 2025

/retest

@oarribas
Copy link
Contributor Author

oarribas commented May 13, 2025

Changed spaces to tabs

@oarribas
Copy link
Contributor Author

/retest

@oarribas
Copy link
Contributor Author

/retest-required

3 similar comments
@oarribas
Copy link
Contributor Author

/retest-required

@oarribas
Copy link
Contributor Author

/retest-required

@oarribas
Copy link
Contributor Author

/retest-required

@oarribas
Copy link
Contributor Author

/retest

@openshift-bot
Copy link
Contributor

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

@openshift-ci openshift-ci bot closed this Dec 22, 2025
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 22, 2025

@openshift-bot: Closed this PR.

Details

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@palonsoro
Copy link

/reopen

@openshift-ci openshift-ci bot reopened this Jan 2, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 2, 2026

@palonsoro: Reopened this PR.

Details

In response to this:

/reopen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Jan 2, 2026

@oarribas: This pull request references RFE-7406 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the feature request to target either version "4.22." or "openshift-4.22.", but it targets "openshift-4.19" instead.

Details

In response to this:

Including the K8s ingress.networking.k8s.io resource in namespace inspect collections could help to identify if the K8s ingress is in use.
It shouldn't increase the size of the inspect or must-gather a lot, as the resource shouldn't be too big.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-bot
Copy link
Contributor

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

@openshift-ci openshift-ci bot closed this Feb 5, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 5, 2026

@openshift-bot: Closed this PR.

Details

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@palonsoro
Copy link

/reopen

@openshift-ci openshift-ci bot reopened this Feb 5, 2026
@openshift-ci-robot
Copy link

openshift-ci-robot commented Feb 5, 2026

@oarribas: This pull request references RFE-7406 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the feature request to target either version "4.22." or "openshift-4.22.", but it targets "openshift-4.19" instead.

Details

In response to this:

Including the K8s ingress.networking.k8s.io resource in namespace inspect collections could help to identify if the K8s ingress is in use.
It shouldn't increase the size of the inspect or must-gather a lot, as the resource shouldn't be too big.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 5, 2026

@palonsoro: Reopened this PR.

Details

In response to this:

/reopen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@oarribas
Copy link
Contributor Author

/hold

Using group resource type for the K8s ingress

Co-authored-by: Arda Güçlü <aguclu@redhat.com>
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Fix all issues with AI agents
In `@pkg/cli/admin/inspect/namespace.go`:
- Line 35: The composite literal for the resource entry {Group:
"networking.k8s.io", Resource: "ingresses"} is missing a trailing comma which
causes a compile error; update that literal by adding a trailing comma after the
last element so the multi-line composite literal is valid (locate the literal in
pkg/cli/admin/inspect/namespace.go and add the comma to the end of the line
containing Resource: "ingresses").

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 16, 2026

@oarribas: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-certrotation fe9e917 link false /test e2e-aws-certrotation

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@oarribas
Copy link
Contributor Author

oarribas commented Feb 16, 2026

Currently, trying to use any of the 2 following is not working:

                {Resource: "ingresses.networking"},
                {Group: "networking.k8s.io", Resource: "ingresses"},

Both fails with:

util.go:118] the server doesn't have a resource type ingresses.networking, skipping the inspection
util.go:118] the server doesn't have a resource type ingresses.networking.k8s.io, skipping the inspection

If trying wiht only {Resource: "ingresses"}, it works. Currently, ingresses uses the ingresses.networking.k8s.io, but I don't know if that could change in the future (as for example, there is ingresses.config.openshift.io in OCP).

@ardaguclu , should we use {Resource: "ingresses"} for this?

@ardaguclu
Copy link
Member

Currently, trying to use any of the 2 following is not working:

                {Resource: "ingresses.networking"},
                {Group: "networking.k8s.io", Resource: "ingresses"},

Both fails with:

util.go:118] the server doesn't have a resource type ingresses.networking, skipping the inspection
util.go:118] the server doesn't have a resource type ingresses.networking.k8s.io, skipping the inspection

If trying wiht only {Resource: "ingresses"}, it works. Currently, ingresses uses the ingresses.networking.k8s.io, but I don't know if that could change in the future (as for example, there is ingresses.config.openshift.io in OCP).

@ardaguclu , should we use {Resource: "ingresses"} for this?

If this {Group: "networking.k8s.io", Resource: "ingresses"} does not work as expected, I'd consider it as a bug to be fixed. Could you please file a Jira bug?. Once we fix it, we can merge this PR as {Group: "networking.k8s.io", Resource: "ingresses"}

@oarribas
Copy link
Contributor Author

oarribas commented Feb 16, 2026

@ardaguclu , bug OCPBUGS-76958 [1] has been created.

[1] https://issues.redhat.com/browse/OCPBUGS-76958

@ardaguclu
Copy link
Member

/label tide/merge-method-squash
/remove-lifecycle rotten

@openshift-ci openshift-ci bot added tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges. and removed lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. labels Feb 25, 2026
@ardaguclu
Copy link
Member

@oarribas could you please drop the results of this PR after #2204 has merged.

@ardaguclu
Copy link
Member

/hold cancel

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 25, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants