Skip to content

Commit 374d34f

Browse files
HCCDOC-3084 Add release note about the new Rapid Recommendations feature
Further notes added and eng references fix
1 parent 1742a41 commit 374d34f

File tree

1 file changed

+35
-2
lines changed

1 file changed

+35
-2
lines changed

release_notes/ocp-4-17-release-notes.adoc

Lines changed: 35 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -538,9 +538,42 @@ Starting in {product-title} 4.14, Extended Update Support (EUS) is extended to t
538538
[id="ocp-4-17-insights-operator-enhancements_{context}"]
539539
=== Insights Operator
540540

541-
* The Insights Operator now collects the `haproxy_exporter_server_threshold` metric. (link:https://issues.redhat.com/browse/OCPBUGS-36687[*OCPBUGS-36687*])
541+
// Engineering reference CCXDEV-12582
542542

543-
* Previously, the Insights Operator gathered information about all Ingress Controller certificates, including their `NotBefore` and `NotAfter` dates. This data is now compiled into a `JSON` file located at `aggregated/ingress_controllers_certs.json` for easier monitoring of certificate validity across the cluster. (link:https://issues.redhat.com/browse/OCPBUGS-35727[*OCPBUGS-35727*])
543+
The Insights Operator can now collect more of your {product-title} data and generate recommendations much faster.
544+
Enhancements have also been made to give you more flexibility in how the data to be collected gets defined for your service.
545+
546+
==== Rapid Recommendations
547+
548+
This release introduces a new feature called Rapid Recommendations, which provides a more dynamic and version-independent mechanism for remotely configuring the rules that determine which data the Insights Operator collects.
549+
550+
Rapid Recommendations builds on the existing conditional data gathering mechanism, whereby the Insights Operator connects to a secure remote endpoint service running on `/console.redhat.com` to retrieve definitions of the data to collect.
551+
552+
The conditional data-gathering definitions, also referred to as rules, get configured through an attribute named `conditionalGathererEndpoint` in the link:https://github.com/openshift/insights-operator/blob/master/config/pod.yaml[`pod.yml`] configuration file.
553+
554+
```bash
555+
conditionalGathererEndpoint: https://console.redhat.com/api/gathering/v2/%s/gathering_rules
556+
```
557+
558+
NOTE: Previously, the rules for determining the data that the Insights Operator collects were hard-coded and tied to the corresponding {product-title} version.
559+
The preconfigured endpoint URL now provides a placeholder (`%s`) for defining a target version of {product-title}.
560+
561+
==== More data collected and recommendations added
562+
563+
The Insights Operator now gathers more data to detect the following scenarios and offer remedial recommendations to help you proactively manage your {product-title} deployments:
564+
565+
// Engineering reference: CCXDEV-12899
566+
* Detection of pods and namespaces for deployments that use the link:https://access.redhat.com/articles/7065170[deprecated OpenShiftSDN CNI plugin] and a recommendation of the actions to take depending on the data collected.
567+
// Engineering reference: OSPRH-5904
568+
* Collects custom resource definitions (CRD) from {rh-openstack}.
569+
// Engineering reference: CCXDEV-13001
570+
* Collects the `haproxy_exporter_server_threshold` metric to detect the problem and remediation reported in (link:https://issues.redhat.com/browse/OCPBUGS-36687[*OCPBUGS-36687*]).
571+
// Engineering reference: CCXDEV-12758
572+
* Collects data to detect custom Prometheus Alertmanager instances that are not in the "openshift-monitoring" namespace because they could potentially impact the management of corresponding resources.
573+
// Engineering reference: CCXDEV-12503
574+
* Detects the upcoming expiry of the default ingress controller expiration certificate and generates a recommendation to renew the certificate before the expiry date.
575+
// Engineering reference: OCPBUGS-35727
576+
** Before this update, the Insights Operator gathered information about all Ingress Controller certificates, including their `NotBefore` and `NotAfter` dates. This data is now compiled into a `JSON` file located at `aggregated/ingress_controllers_certs.json` for easier monitoring of certificate validity across the cluster. (link:https://issues.redhat.com/browse/OCPBUGS-35727[*OCPBUGS-35727*])
544577

545578
[id="ocp-4-17-installation-and-update_{context}"]
546579
=== Installation and update

0 commit comments

Comments
 (0)