Monitoring the External Secrets Operator for Red Hat OpenShift
By default, the External Secrets Operator for Red Hat OpenShift exposes metrics for the Operator and the operands. You can configure OpenShift Monitoring to collect these metrics by using the Prometheus Operator format.
Enabling user workload monitoring
To enable metrics collection for user-defined projects, configure user workload monitoring in the OpenShift Container Platform cluster. With this configuration, you can maintain visibility into the performance and status of your specific project workloads.
For more information, see "Setting up metrics collection for user-defined projects".
-
You have access to the cluster as a user with the
cluster-adminrole.
-
Create the
cluster-monitoring-config.yamlYAML file:apiVersion: v1 kind: ConfigMap metadata: name: cluster-monitoring-config namespace: openshift-monitoring data: config.yaml: | enableUserWorkload: true -
Apply the
ConfigMapby running the following command:$ oc apply -f cluster-monitoring-config.yaml
-
Verify that the monitoring components for user workloads are running in the
openshift-user-workload-monitoringnamespace by running the following command:$ oc -n openshift-user-workload-monitoring get podExample outputNAME READY STATUS RESTARTS AGE prometheus-operator-5f79cff9c9-67pjb 2/2 Running 0 25h prometheus-user-workload-0 6/6 Running 0 25h thanos-ruler-user-workload-0 4/4 Running 0 25hThe status of the pods such as
prometheus-operator,prometheus-user-workload, andthanos-ruler-user-workloadmust beRunning.
Configuring metrics collection for External Secrets Operator for Red Hat OpenShift by using a ServiceMonitor
The External Secrets Operator for Red Hat OpenShift exposes metrics by default on port 8443 at the /metrics service endpoint. You can configure metrics collection for the Operator by creating a ServiceMonitor custom resource (CR) that enables the Prometheus Operator to collect custom metrics. For more information, see "Configuring user workload monitoring".
-
You have access to the cluster as a user with the
cluster-adminrole. -
You have installed the External Secrets Operator for Red Hat OpenShift.
-
You have enabled the user workload monitoring.
-
Configure the Operator to use
HTTPfor the metrics server.HTTPSis enabled by default.-
Update the subscription object for External Secrets Operator for Red Hat OpenShift to configure the
HTTPprotocol by running the following command:$ oc -n external-secrets-operator patch subscription openshift-external-secrets-operator --type='merge' -p '{"spec":{"config":{"env":[{"name":"METRICS_BIND_ADDRESS","value":":8080"}, {"name": "METRICS_SECURE", "value": "false"}]}}}' -
To verify that the External Secrets Operator pod is redeployed and that the configured values for
METRICS_BIND_ADDRESSandMETRICS_SECUREare updated, run the following command:$ oc set env --list deployment/external-secrets-operator-controller-manager -n external-secrets-operator | grep -e METRICS_BIND_ADDRESS -e METRICS_SECURE -e containerThe following example shows that the
METRICS_BIND_ADDRESSandMETRICS_SECUREhave been updated:# deployments/external-secrets-operator-controller-manager, container manager METRICS_BIND_ADDRESS=:8080 METRICS_SECURE=false
-
-
Create the
Secretresource with thekubernetes.io/service-account.nameannotation to inject the token required for authenticating with the metrics server.-
Create the
secret-external-secrets-operator.yamlYAML file:apiVersion: v1 kind: Secret metadata: labels: app: external-secrets-operator name: external-secrets-operator-metrics-auth namespace: external-secrets-operator annotations: kubernetes.io/service-account.name: external-secrets-operator-controller-manager type: kubernetes.io/service-account-token -
Create the
Secretresource by running the following command:$ oc apply -f secret-external-secrets-operator.yaml
-
-
Create the
ClusterRoleBindingresource required for granting permissions to access metrics:-
Create the
clusterrolebinding-external-secrets.yamlYAML file:The following example shows a
clusterrolebinding-external-secrets.yamlfile.apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: external-secrets-operator name: external-secrets-allow-metrics-access roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: external-secrets-operator-metrics-reader subjects: - kind: ServiceAccount name: external-secrets-operator-controller-manager namespace: external-secrets-operator -
Create the
ClusterRoldeBindingcustom resource by running the following command:$ oc apply -f clusterrolebinding-external-secrets.yaml
-
-
Create the
ServiceMonitorCR if using the defaultHTTPS:-
Create the
servicemonitor-external-secrets-operator-https.yamlYAML file:apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: app: external-secrets-operator name: external-secrets-operator-metrics-monitor namespace: external-secrets-operator spec: endpoints: - authorization: credentials: name: external-secrets-operator-metrics-auth key: token type: Bearer interval: 60s path: /metrics port: metrics-https scheme: https scrapeTimeout: 30s tlsConfig: ca: configMap: name: openshift-service-ca.crt key: service-ca.crt serverName: external-secrets-operator-controller-manager-metrics-service.external-secrets-operator.svc.cluster.local namespaceSelector: matchNames: - external-secrets-operator selector: matchLabels: app: external-secrets-operator svc: external-secrets-operator-controller-manager-metrics-service -
Create the
ServiceMonitorCR by running the following command:$ oc apply -f servicemonitor-external-secrets-operator-https.yaml
-
-
Create the
ServiceMonitorCR if configured to useHTTP:-
Create the
servicemonitor-external-secrets-operator-http.yamlYAML file:apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: app: external-secrets-operator name: external-secrets-operator-metrics-monitor namespace: external-secrets-operator spec: endpoints: - authorization: credentials: name: external-secrets-operator-metrics-auth key: token type: Bearer interval: 60s path: /metrics port: metrics-http scheme: http scrapeTimeout: 30s namespaceSelector: matchNames: - external-secrets-operator selector: matchLabels: app: external-secrets-operator svc: external-secrets-operator-controller-manager-metrics-service -
Create the
ServiceMonitorCR by running the following command:$ oc apply -f servicemonitor-external-secrets-operator-http.yamlAfter the
ServiceMonitorCR is created, the user workload Prometheus instance begins metrics collection from the Operator. The collected metrics are labeled withjob="external-secrets-operator-controller-manager-metrics-service".
-
-
In the OpenShift Container Platform web console, navigate to Observe → Targets.
-
In the Label filter field, enter the following labels to filter the metrics targets for each operand:
$ service=external-secrets-operator-controller-manager-metrics-service -
Confirm that the Status column shows
Upfor theexternal-secrets-operator.
Querying metrics for the External Secrets Operator for Red Hat OpenShift
As a cluster administrator, or as a user with view access to all namespaces, you can query the Operator metrics by using the OpenShift Container Platform web console or the command-line interface (CLI). For more information, see "Accessing metrics".
-
You have access to the cluster as a user with the
cluster-adminrole. -
You have installed the External Secrets Operator for Red Hat OpenShift.
-
You have enabled monitoring and metrics collection by creating a
ServiceMonitorobject.
-
In the OpenShift Container Platform web console, navigate to Observe → Metrics.
-
In the query field, enter the following PromQL expressions to query the External Secrets Operator for Red Hat OpenShift metric:
{job="external-secrets-operator-controller-manager-metrics-service"}
Configuring metrics collection for External Secrets Operator for Red Hat OpenShift operands by using a ServiceMonitor
The External Secrets Operator for Red Hat OpenShift operands exposes metrics by default on port 8080 at the /metrics service endpoint for all three components (external-secrets, external-secrets-cert-controll, and external-secrets-webhook). You can configure metrics collection for the external-secrets operands by creating a ServiceMonitor custom resource (CR) that enables the Prometheus Operator to collect custom metrics. For more information, see "Configuring user workload monitoring".
-
You have access to the cluster as a user with the
cluster-adminrole. -
You have installed the External Secrets Operator for Red Hat OpenShift.
-
You have enabled the user workload monitoring.
-
Create the
ClusterRoleBindingresource required for granting permissions to access metrics:-
Create the
clusterrolebinding-external-secrets.yamlYAML file:The following example shows a
clusterrolebinding-external-secrets.yamlfile.apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: app: external-secrets name: external-secrets-allow-metrics-access roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: external-secrets-operator-metrics-reader subjects: - kind: ServiceAccount name: external-secrets namespace: external-secrets - kind: ServiceAccount name: external-secrets-cert-controller namespace: external-secrets - kind: ServiceAccount name: external-secrets-webhook namespace: external-secrets -
Create the
ClusterRoldeBindingcustom resource by running the following command:$ oc apply -f clusterrolebinding-external-secrets.yaml
-
-
Create the
ServiceMonitorCR:-
Create the
servicemonitor-external-secrets.yamlYAML file:apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor metadata: labels: app: external-secrets name: external-secrets-metrics-monitor namespace: external-secrets spec: endpoints: - interval: 60s path: /metrics port: metrics scheme: http scrapeTimeout: 30s namespaceSelector: matchNames: - external-secrets selector: matchExpressions: - key: app.kubernetes.io/name operator: In values: - external-secrets - external-secrets-cert-controller - external-secrets-webhook - key: app.kubernetes.io/instance operator: In values: - external-secrets - key: app.kubernetes.io/managed-by operator: In values: - external-secrets-operator -
Create the
ServiceMonitorCR by running the following command:$ oc apply -f servicemonitor-external-secrets.yamlAfter the
ServiceMonitorCR is created, the user workload Prometheus instance begins metrics collection from the External Secrets Operator for Red Hat OpenShift operands. The collected metrics are labeled withjob="external-secrets",job="external-secrets-cainjector", andjob="external-secrets-webhook".
-
-
In the OpenShift Container Platform web console, navigate to Observe → Targets.
-
In the Label filter field, enter the following labels to filter the metrics targets for each operand:
$ service=external-secrets$ service=external-secrets-cert-controller-metrics$ service=external-secrets-webhook -
Confirm that the Status column shows
Upfor theexternal-secrets,external-secrets-cert-controllerandexternal-secrets-webhook.
Querying metrics for the external-secrets operand
As a cluster administrator, or as a user with view access to all namespaces, you can query external-secrets operand metrics by using the OpenShift Container Platform web console or the command-line interface (CLI). For more information, see "Accessing metrics".
-
You have access to the cluster as a user with the
cluster-adminrole. -
You have installed the External Secrets Operator for Red Hat OpenShift.
-
You have enabled monitoring and metrics collection by creating a
ServiceMonitorobject.
-
In the OpenShift Container Platform web console, navigate to Observe → Metrics.
-
In the query field, enter the following PromQL expressions to query the External Secrets Operator for Red Hat OpenShift operands metric for each operand:
{job="external-secrets"}{job="external-secrets-webhook"}{job="external-secrets-cert-controller-metrics"}