-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Istio prometheusMerge #1468
Comments
After the concept is sorted out, we will re-use the ticket to realize the feature |
Hi @a-thaler, got two questions about this issue.
|
Hi @weinanwangsap, at the moment Istio/Envoy does not support metric exposure via OTLP, you need to pull the metrics. Hereby, the kyma metric agent does support mTLS already, however, Istio/Envoy seem to not support exposing envoy metrics behind a mTLS port. So I don't see a possibility. Let me know if you see a solution to it. Currently, you cannot enable the prometheusMerge by yourself. We will do a PR to the Istio module to enable it by default. |
Re-opening to include also the Istio changes in this story |
Unfortunetaly, the istio change must be treated as a breaking change and cannot be rolled out without configuration option. So the config change got reverted and will be introduced properly with a flag which in the beginning will be disabled. |
Description
Dynatrace metric integration is cumbersome with metrics as there is not the best fitting solution available. Either the user disabled istio mTLS for the metric ports and uses dynatrace annotations, or he uses the telemetry module to push data via OTLP to Dynatrace, but hear so many conversion is needed that it is troublefull as well, also see https://kyma-project.io/#/telemetry-manager/user/integration/dynatrace/README?id=ingest-metrics
It turned out that there is another alternative to the direct Dynatrace integration scenario which does not require an explicit disabling of the TLS mode for the whole port. By enabling the prometheusMerge feature of Istio, the envoys will expose a new port which serves the envoy metrics plus the business metrics (configured via prometheus pod annotation). With that, Dynatrace can scrape all the metrics directly without reducing the TLS setting on the original port. However, the metric data will be transported plain text.
While that solution sounds better then the current integration scenario, it will affect the current telemetry functionality heavily, as suddenly all pods will have prometheus annotations and will be detected by the telemetry prometheus input. And all this pods will mainly return envoy metrics.
Goal
Criterias
The text was updated successfully, but these errors were encountered: