Replies: 1 comment
-
Is it because the alert's focus is not to determine whether there is an issue with the pod or not after serving the traffic, but rather to ensure that the deployment itself is not experiencing any problems? Means this alert is focusing state before -> deployed state instead of after deployment success? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I have a question regarding a specific rule in the kube-prometheus repository and would like to initiate a discussion to gain more insights.
The rule in question can be found here:
kube-prometheus/manifests/kubernetesControlPlane-prometheusRule.yaml
Lines 53 to 70 in d388980
My question is why are we comparing
kube_deployment_spec_replicas
withkube_deployment_status_replicas_available
in this alert rule?Based on the information provided in the Kubernetes API documentation:
If I understand correctly, comparing
kube_deployment_spec_replicas
withkube_deployment_status_replicas_available
could potentially lead to false alarms, as the alert would trigger even if pods have been scheduled on nodes but have not yet passed their readiness checks. Wouldn't it be more appropriate to comparekube_deployment_spec_replicas
withkube_deployment_status_replicas_ready
instead?For context: I need an alert to make sure there's no performance degradation (or down) of my application while the pod is already have traffic. Currently, i have a prober in blackbox exporter which also hit to the application health check. Since our deployment
readinessProbe
is also hitting to the same health check, i'm thinking about removing the blackbox exporter probe and only using state from deployment.Thank you.
Beta Was this translation helpful? Give feedback.
All reactions