{"level":"info","ts":"2025-10-06T00:28:56Z","logger":"cmd","msg":"Version","Go Version":"go1.22.5","GOOS":"linux","GOARCH":"amd64","ansible-operator":"v1.36.1","commit":"60db7ce358a45ffb3ec8303944aaeb1a601aa560"} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"cmd","msg":"Environment variable OPERATOR_NAME has been deprecated, use --leader-election-id instead."} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"cmd","msg":"Watching namespaces","namespaces":["service-telemetry"]} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"watches","msg":"Environment variable not set; using default value","envVar":"ANSIBLE_VERBOSITY_SERVICETELEMETRY_INFRA_WATCH","default":2} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"cmd","msg":"Environment variable not set; using default value","envVar":"ANSIBLE_DEBUG_LOGS","ANSIBLE_DEBUG_LOGS":false} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"ansible-controller","msg":"Watching resource","Options.Group":"infra.watch","Options.Version":"v1beta1","Options.Kind":"ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"proxy","msg":"Starting to serve","Address":"127.0.0.1:8888"} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"apiserver","msg":"Starting to serve metrics listener","Address":"localhost:5050"} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"controller-runtime.metrics","msg":"Starting metrics server"} {"level":"info","ts":"2025-10-06T00:28:56Z","msg":"starting server","name":"health probe","addr":"[::]:6789"} {"level":"info","ts":"2025-10-06T00:28:56Z","logger":"controller-runtime.metrics","msg":"Serving metrics server","bindAddress":":8443","secure":false} {"level":"info","ts":"2025-10-06T00:28:56Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} {"level":"info","ts":"2025-10-06T00:28:56Z","msg":"Starting Controller","controller":"servicetelemetry-controller"} {"level":"info","ts":"2025-10-06T00:28:57Z","msg":"Starting workers","controller":"servicetelemetry-controller","worker count":12} {"level":"info","ts":"2025-10-06T00:29:02Z","logger":"KubeAPIWarningLogger","msg":"unknown field \"status.conditions[0].message\""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Installing service telemetry] ******************************** ok: [localhost] => {  "msg": "INSTALLING SERVICE TELEMETRY" } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:03Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Pre-setup] ******************************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:7 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:03Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Pre-setup"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Clear the fact cache before looking up cluster information] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:03Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Clear the fact cache before looking up cluster information"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Show existing API groups available to us] ******************************** ok: [localhost] => {  "api_groups": [  "",  "apiregistration.k8s.io",  "apps",  "events.k8s.io",  "authentication.k8s.io",  "authorization.k8s.io",  "autoscaling",  "batch",  "certificates.k8s.io",  "networking.k8s.io",  "policy",  "rbac.authorization.k8s.io",  "storage.k8s.io",  "admissionregistration.k8s.io",  "apiextensions.k8s.io",  "scheduling.k8s.io",  "coordination.k8s.io",  "node.k8s.io",  "discovery.k8s.io",  "flowcontrol.apiserver.k8s.io",  "apps.openshift.io",  "authorization.openshift.io",  "build.openshift.io",  "image.openshift.io",  "oauth.openshift.io",  "project.openshift.io",  "quota.openshift.io",  "route.openshift.io",  "security.openshift.io",  "template.openshift.io",  "user.openshift.io",  "packages.operators.coreos.com",  "config.openshift.io",  "operator.openshift.io",  "acme.cert-manager.io",  "apiserver.openshift.io",  "apm.k8s.elastic.co",  "autoscaling.openshift.io",  "cert-manager.io",  "console.openshift.io",  "elasticsearch.k8s.elastic.co",  "enterprisesearch.k8s.elastic.co",  "imageregistry.operator.openshift.io",  "ingress.operator.openshift.io",  "k8s.cni.cncf.io",  "k8s.ovn.org",  "kibana.k8s.elastic.co",  "machine.openshift.io",  "machineconfiguration.openshift.io",  "monitoring.coreos.com",  "monitoring.openshift.io",  "monitoring.rhobs",  "network.operator.openshift.io",  "operators.coreos.com",  "samples.operator.openshift.io",  "security.internal.openshift.io",  "agent.k8s.elastic.co",  "autoscaling.k8s.elastic.co",  "controlplane.operator.openshift.io",  "interconnectedcloud.github.io",  "ipam.cluster.x-k8s.io",  "logstash.k8s.elastic.co",  "maps.k8s.elastic.co",  "migration.k8s.io",  "observability.openshift.io",  "perses.dev",  "policy.networking.k8s.io",  "stackconfigpolicy.k8s.elastic.co",  "whereabouts.cni.cncf.io",  "infrastructure.cluster.x-k8s.io",  "beat.k8s.elastic.co",  "helm.openshift.io",  "infra.watch",  "smartgateway.infra.watch"  ] } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:04Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Indicate what kind of cluster we are in (OpenShift or Kubernetes).] ******************************** ok: [localhost] => {  "msg": "CLUSTER TYPE: is_openshift=True; is_k8s=False" } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:04Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Fail when can't determine type of cluster] ************ task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:27 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:04Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Fail when can't determine type of cluster"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Print some debug information] ******************************** ok: [localhost] => {  "msg": [  "ServiceTelemetry Variables",  "--------------------------------------------",  "alerting:",  " alertmanager:",  " deployment_size: 1",  " receivers:",  " snmp_traps:",  " alert_oid_label: oid",  " community: public",  " enabled: true",  " port: 162",  " retries: 5",  " target: 192.168.24.254",  " timeout: 1",  " trap_default_oid: 1.3.6.1.4.1.50495.15.1.2.1",  " trap_default_severity: ''",  " trap_oid_prefix: 1.3.6.1.4.1.50495.15",  " storage:",  " persistent:",  " pvc_storage_request: 20G",  " storage_class: crc-csi-hostpath-provisioner",  " strategy: persistent",  " enabled: true",  "backends:",  " events:",  " elasticsearch:",  " certificates:",  " ca_cert_duration: 70080h",  " endpoint_cert_duration: 70080h",  " enabled: true",  " forwarding:",  " host_url: https://elasticsearch-es-http:9200",  " tls_secret_name: elasticsearch-es-cert",  " tls_server_name: ''",  " use_basic_auth: true",  " use_tls: true",  " user_secret_name: elasticsearch-es-elastic-user",  " node_count: 1",  " storage:",  " persistent:",  " pvc_storage_request: 20Gi",  " storage_class: ''",  " strategy: persistent",  " version: 7.16.1",  " metrics:",  " prometheus:",  " deployment_size: 1",  " enabled: true",  " scrape_interval: 30s",  " storage:",  " persistent:",  " pvc_storage_request: 20G",  " storage_class: crc-csi-hostpath-provisioner",  " retention: 24h",  " strategy: persistent",  "clouds:",  "- events:",  " collectors:",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: collectd",  " debug_enabled: false",  " subscription_address: collectd/cloud1-notify",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: ceilometer",  " debug_enabled: false",  " subscription_address: anycast/ceilometer/cloud1-event.sample",  " metrics:",  " collectors:",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: collectd",  " debug_enabled: false",  " subscription_address: collectd/cloud1-telemetry",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: ceilometer",  " debug_enabled: false",  " subscription_address: anycast/ceilometer/cloud1-metering.sample",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 65535",  " verbose: false",  " collector_type: sensubility",  " debug_enabled: false",  " subscription_address: sensubility/cloud1-telemetry",  " name: cloud1",  "graphing:",  " enabled: false",  " grafana:",  " base_image: registry.redhat.io/rhel8/grafana:9",  " dashboards:",  " enabled: true",  " disable_signout_menu: false",  " ingress_enabled: true",  "high_availability:",  " enabled: false",  "transports:",  " qdr:",  " auth: basic",  " certificates:",  " ca_cert_duration: 70080h",  " endpoint_cert_duration: 70080h",  " deployment_size: 1",  " enabled: true",  " web:",  " enabled: false",  ""  ] } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:04Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get current Smart Gateways loaded] ******************** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:04Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Get current Smart Gateways loaded"} {"level":"info","ts":"2025-10-06T00:29:05Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/smartgateway.infra.watch/v2/namespaces/service-telemetry/smartgateways","Verb":"list","APIPrefix":"apis","APIGroup":"smartgateway.infra.watch","APIVersion":"v2","Namespace":"service-telemetry","Resource":"smartgateways","Subresource":"","Name":"","Parts":["smartgateways"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get current STF object] ******************************* task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:05Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Get current STF object"} {"level":"info","ts":"2025-10-06T00:29:06Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/infra.watch/v1beta1/namespaces/service-telemetry/servicetelemetrys/default","Verb":"get","APIPrefix":"apis","APIGroup":"infra.watch","APIVersion":"v1beta1","Namespace":"service-telemetry","Resource":"servicetelemetrys","Subresource":"","Name":"default","Parts":["servicetelemetrys","default"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get community Prometheus objects] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:92 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:06Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Get community Prometheus objects"} {"level":"info","ts":"2025-10-06T00:29:07Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Prometheus, service-telemetry/default"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply community observabilityStrategy if missing on an STF object with an existing community prometheus] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:101 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:07Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Apply community observabilityStrategy if missing on an STF object with an existing community prometheus"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply default observabilityStrategy if missing on a new STF object with no associated community prometheus] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:118 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:07Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Apply default observabilityStrategy if missing on a new STF object with no associated community prometheus"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get QDR objects] ************************************** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:132 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:07Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Get QDR objects"} {"level":"info","ts":"2025-10-06T00:29:08Z","logger":"proxy","msg":"Cache miss: interconnectedcloud.github.io/v1alpha1, Kind=Interconnect, service-telemetry/default-interconnect"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply legacy auth=none for QDR if missing on the STF object and it's currently deployed that way] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:141 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:08Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Apply legacy auth=none for QDR if missing on the STF object and it's currently deployed that way"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply default auth for QDR if missing on a new STF object with no associated auth=none QDR] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:161 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:08Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Apply default auth for QDR if missing on a new STF object with no associated auth=none QDR"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Set ServiceTelemetry object status to have ephemeralStorageEnabled status] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:185 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:08Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Set ServiceTelemetry object status to have ephemeralStorageEnabled status"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create QDR instance] ********************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:09Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create QDR instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create self-signed interconnect issuer] *************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:6 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:09Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create self-signed interconnect issuer"} {"level":"info","ts":"2025-10-06T00:29:10Z","logger":"proxy","msg":"Cache miss: cert-manager.io/v1, Kind=Issuer, service-telemetry/default-interconnect-selfsigned"} {"level":"info","ts":"2025-10-06T00:29:10Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:10Z","logger":"proxy","msg":"Watching child resource","kind":"cert-manager.io/v1, Kind=Issuer","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:10Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create self-signed interconnect certificate] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:10Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:29:11Z","logger":"proxy","msg":"Cache miss: cert-manager.io/v1, Kind=Certificate, service-telemetry/default-interconnect-selfsigned"} {"level":"info","ts":"2025-10-06T00:29:11Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:11Z","logger":"proxy","msg":"Watching child resource","kind":"cert-manager.io/v1, Kind=Certificate","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:11Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create default CA interconnect issuer using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:37 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:11Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create default CA interconnect issuer using self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:29:12Z","logger":"proxy","msg":"Cache miss: cert-manager.io/v1, Kind=Issuer, service-telemetry/default-interconnect-ca"} {"level":"info","ts":"2025-10-06T00:29:12Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create OpenStack CA certificate using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:51 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:12Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create OpenStack CA certificate using self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:29:13Z","logger":"proxy","msg":"Cache miss: cert-manager.io/v1, Kind=Certificate, service-telemetry/default-interconnect-openstack-ca"} {"level":"info","ts":"2025-10-06T00:29:13Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create OpenStack credentials certificate using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:68 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:13Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create OpenStack credentials certificate using self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:29:14Z","logger":"proxy","msg":"Cache miss: cert-manager.io/v1, Kind=Certificate, service-telemetry/default-interconnect-openstack-credentials"} {"level":"info","ts":"2025-10-06T00:29:14Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router CA issuer] ************************ task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:86 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:14Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create inter-router CA issuer"} {"level":"info","ts":"2025-10-06T00:29:15Z","logger":"proxy","msg":"Cache miss: cert-manager.io/v1, Kind=Issuer, service-telemetry/default-interconnect-inter-router-ca"} {"level":"info","ts":"2025-10-06T00:29:15Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router CA certificate] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:100 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:15Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create inter-router CA certificate"} {"level":"info","ts":"2025-10-06T00:29:16Z","logger":"proxy","msg":"Cache miss: cert-manager.io/v1, Kind=Certificate, service-telemetry/default-interconnect-inter-router-ca"} {"level":"info","ts":"2025-10-06T00:29:16Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router credentials certificate] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:117 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:16Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create inter-router credentials certificate"} {"level":"info","ts":"2025-10-06T00:29:17Z","logger":"proxy","msg":"Cache miss: cert-manager.io/v1, Kind=Certificate, service-telemetry/default-interconnect-inter-router-credentials"} {"level":"info","ts":"2025-10-06T00:29:17Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Interconnect SASL ConfigMap] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:136 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:17Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create Interconnect SASL ConfigMap"} {"level":"info","ts":"2025-10-06T00:29:18Z","logger":"proxy","msg":"Cache miss: /v1, Kind=ConfigMap, service-telemetry/default-interconnect-sasl-config"} {"level":"info","ts":"2025-10-06T00:29:18Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:18Z","logger":"proxy","msg":"Watching child resource","kind":"/v1, Kind=ConfigMap","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:18Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get QDR BasicAuth secret] ***************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:158 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:18Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Get QDR BasicAuth secret"} {"level":"info","ts":"2025-10-06T00:29:19Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Secret, service-telemetry/default-interconnect-users"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Perform a one-time upgrade to the default generated password for QDR BasicAuth] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:170 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:19Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Perform a one-time upgrade to the default generated password for QDR BasicAuth"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get the list of QDR pods] ***************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:184 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:19Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Get the list of QDR pods"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Restart QDR pods to pick up new password] ************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:193 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:19Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Restart QDR pods to pick up new password"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create QDR instance] ********************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:271 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:19Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create QDR instance"} {"level":"info","ts":"2025-10-06T00:29:20Z","logger":"proxy","msg":"Cache miss: interconnectedcloud.github.io/v1alpha1, Kind=Interconnect, service-telemetry/default-interconnect"} {"level":"info","ts":"2025-10-06T00:29:20Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:20Z","logger":"proxy","msg":"Watching child resource","kind":"interconnectedcloud.github.io/v1alpha1, Kind=Interconnect","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:20Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Setup Certificates for metrics components] ************ task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:26 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:20Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Setup Certificates for metrics components"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create configmap for OAUTH CA certs] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:20Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create configmap for OAUTH CA certs"} {"level":"info","ts":"2025-10-06T00:29:21Z","logger":"proxy","msg":"Cache miss: /v1, Kind=ConfigMap, service-telemetry/serving-certs-ca-bundle"} {"level":"info","ts":"2025-10-06T00:29:21Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Check for existing cookie secret] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:12 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:21Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Check for existing cookie secret"} {"level":"info","ts":"2025-10-06T00:29:22Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Secret, service-telemetry/default-session-secret"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create cookie secret] ********************************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:20 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:22Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create cookie secret"} {"level":"info","ts":"2025-10-06T00:29:23Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Secret, service-telemetry/default-session-secret"} {"level":"info","ts":"2025-10-06T00:29:23Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:23Z","logger":"proxy","msg":"Watching child resource","kind":"/v1, Kind=Secret","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:23Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Prometheus instance] *************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:48 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:23Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create Prometheus instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/prometheus-stf with oauth redirect annotation] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:10 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:23Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ServiceAccount/prometheus-stf with oauth redirect annotation"} {"level":"info","ts":"2025-10-06T00:29:24Z","logger":"proxy","msg":"Cache miss: /v1, Kind=ServiceAccount, service-telemetry/prometheus-stf"} {"level":"info","ts":"2025-10-06T00:29:24Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:24Z","logger":"proxy","msg":"Watching child resource","kind":"/v1, Kind=ServiceAccount","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:24Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRole/prometheus-stf for non-resource URL /metrics access] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:21 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:25Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ClusterRole/prometheus-stf for non-resource URL /metrics access"} {"level":"info","ts":"2025-10-06T00:29:25Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRoleBinding/prometheus-stf] ************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:64 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:26Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ClusterRoleBinding/prometheus-stf"} {"level":"info","ts":"2025-10-06T00:29:26Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Role/prometheus-stf for Prometheus operations] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:83 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:27Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create Role/prometheus-stf for Prometheus operations"} {"level":"info","ts":"2025-10-06T00:29:27Z","logger":"proxy","msg":"Cache miss: rbac.authorization.k8s.io/v1, Kind=Role, service-telemetry/prometheus-stf"} {"level":"info","ts":"2025-10-06T00:29:27Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:27Z","logger":"proxy","msg":"Watching child resource","kind":"rbac.authorization.k8s.io/v1, Kind=Role","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:27Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create RoleBinding/prometheus-stf] ******************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:152 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:28Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create RoleBinding/prometheus-stf"} {"level":"info","ts":"2025-10-06T00:29:29Z","logger":"proxy","msg":"Cache miss: rbac.authorization.k8s.io/v1, Kind=RoleBinding, service-telemetry/prometheus-stf"} {"level":"info","ts":"2025-10-06T00:29:29Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:29Z","logger":"proxy","msg":"Watching child resource","kind":"rbac.authorization.k8s.io/v1, Kind=RoleBinding","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:29Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove old ClusterRoleBinding for prometheus-k8s using CMO roleRef] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:172 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:29Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Remove old ClusterRoleBinding for prometheus-k8s using CMO roleRef"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "monitoring.rhobs/v1",  "kind": "Prometheus",  "metadata": {  "labels": {  "app.kubernetes.io/managed-by": "observability-operator",  "prometheus": "default"  },  "name": "default",  "namespace": "service-telemetry"  },  "spec": {  "alerting": {  "alertmanagers": [  {  "bearerTokenFile": "/var/run/secrets/kubernetes.io/serviceaccount/token",  "name": "default-alertmanager-proxy",  "namespace": "service-telemetry",  "port": "web",  "scheme": "https",  "tlsConfig": {  "caFile": "/etc/prometheus/configmaps/serving-certs-ca-bundle/service-ca.crt",  "serverName": "default-alertmanager-proxy.service-telemetry.svc"  }  }  ]  },  "configMaps": [  "serving-certs-ca-bundle"  ],  "containers": [  {  "args": [  "-https-address=:9092",  "-tls-cert=/etc/tls/private/tls.crt",  "-tls-key=/etc/tls/private/tls.key",  "-upstream=http://localhost:9090/",  "-cookie-secret-file=/etc/proxy/secrets/session_secret",  "-openshift-service-account=prometheus-stf",  "-openshift-sar={\"namespace\":\"service-telemetry\",\"resource\": \"prometheuses\", \"resourceAPIGroup\":\"monitoring.rhobs\", \"verb\":\"get\"}",  "-openshift-delegate-urls={\"/\":{\"namespace\":\"service-telemetry\",\"resource\": \"prometheuses\", \"group\":\"monitoring.rhobs\", \"verb\":\"get\"}}"  ],  "image": "quay.io/openshift/origin-oauth-proxy:latest",  "name": "oauth-proxy",  "ports": [  {  "containerPort": 9092,  "name": "https",  "protocol": "TCP"  }  ],  "volumeMounts": [  {  "mountPath": "/etc/tls/private",  "name": "secret-default-prometheus-proxy-tls"  },  {  "mountPath": "/etc/proxy/secrets",  "name": "secret-default-session-secret"  }  ]  }  ],  "image": "quay.io/prometheus/prometheus:latest",  "listenLocal": true,  "podMetadata": {  "annotations": null,  "labels": {  "prometheus": "default"  }  },  "replicas": 1,  "retention": "24h",  "ruleSelector": {},  "scrapeConfigSelector": {  "matchLabels": {  "app": "smart-gateway"  }  },  "secrets": [  "default-prometheus-proxy-tls",  "default-session-secret"  ],  "securityContext": {},  "serviceAccountName": "prometheus-stf",  "storage": {  "volumeClaimTemplate": {  "spec": {  "resources": {  "requests": {  "storage": "20G"  }  },  "storageClassName": "crc-csi-hostpath-provisioner"  }  }  },  "version": null  }  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:30Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of Prometheus] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:191 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:30Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an instance of Prometheus"} {"level":"info","ts":"2025-10-06T00:29:31Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1, Kind=Prometheus, service-telemetry/default"} {"level":"info","ts":"2025-10-06T00:29:31Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:31Z","logger":"proxy","msg":"Watching child resource","kind":"monitoring.rhobs/v1, Kind=Prometheus","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:31Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no community Prometheus is installed if not using community operator] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:197 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:31Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Ensure no community Prometheus is installed if not using community operator"} {"level":"info","ts":"2025-10-06T00:29:32Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Prometheus, service-telemetry/default"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no rhobs Prometheus is installed if not using it] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:207 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:32Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Ensure no rhobs Prometheus is installed if not using it"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create service to access the prometheus proxy] ******** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:223 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:33Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create service to access the prometheus proxy"} {"level":"info","ts":"2025-10-06T00:29:34Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Service, service-telemetry/default-prometheus-proxy"} {"level":"info","ts":"2025-10-06T00:29:34Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:34Z","logger":"proxy","msg":"Watching child resource","kind":"/v1, Kind=Service","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:34Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create route to access the prometheus proxy] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:234 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:34Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create route to access the prometheus proxy"} {"level":"info","ts":"2025-10-06T00:29:35Z","logger":"proxy","msg":"Cache miss: route.openshift.io/v1, Kind=Route, service-telemetry/default-prometheus-proxy"} {"level":"info","ts":"2025-10-06T00:29:35Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:35Z","logger":"proxy","msg":"Watching child resource","kind":"route.openshift.io/v1, Kind=Route","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:35Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Prometheus read-only user] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:50 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:35Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create Prometheus read-only user"} {"level":"info","ts":"2025-10-06T00:29:35Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ServiceAccount/stf-prometheus-reader"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/stf-prometheus-reader] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:36Z","logger":"proxy","msg":"Cache miss: /v1, Kind=ServiceAccount, service-telemetry/stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:29:36Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create prometheus-reader Role] ************************ task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:11 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:36Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create prometheus-reader Role"} {"level":"info","ts":"2025-10-06T00:29:37Z","logger":"proxy","msg":"Cache miss: rbac.authorization.k8s.io/v1, Kind=Role, service-telemetry/prometheus-reader"} {"level":"info","ts":"2025-10-06T00:29:37Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create prometheus-reader RoleBinding for stf-prometheus-reader] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:30 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:37Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create prometheus-reader RoleBinding for stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:29:38Z","logger":"proxy","msg":"Cache miss: rbac.authorization.k8s.io/v1, Kind=RoleBinding, service-telemetry/stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:29:38Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for stf-prometheus-reader] ***** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:47 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:38Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an access token for stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:29:39Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Secret, service-telemetry/stf-prometheus-reader-token"} {"level":"info","ts":"2025-10-06T00:29:39Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Alertmanager instance] ************************* task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:54 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:39Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create Alertmanager instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "monitoring.rhobs/v1",  "kind": "Alertmanager",  "metadata": {  "labels": {  "alertmanager": "default",  "app.kubernetes.io/managed-by": "observability-operator"  },  "name": "default",  "namespace": "service-telemetry"  },  "spec": {  "containers": [  {  "args": [  "-https-address=:9095",  "-tls-cert=/etc/tls/private/tls.crt",  "-tls-key=/etc/tls/private/tls.key",  "-upstream=http://localhost:9093/",  "-cookie-secret-file=/etc/proxy/secrets/session_secret",  "-openshift-service-account=alertmanager-stf",  "-openshift-sar={\"namespace\":\"service-telemetry\", \"resource\": \"alertmanagers\", \"resourceAPIGroup\":\"monitoring.rhobs\", \"verb\":\"get\"}",  "-openshift-delegate-urls={\"/\": {\"namespace\":\"service-telemetry\", \"resource\": \"alertmanagers\", \"group\":\"monitoring.rhobs\", \"verb\":\"get\"}}"  ],  "image": "quay.io/openshift/origin-oauth-proxy:latest",  "name": "oauth-proxy",  "ports": [  {  "containerPort": 9095,  "name": "https",  "protocol": "TCP"  }  ],  "volumeMounts": [  {  "mountPath": "/etc/tls/private",  "name": "secret-default-alertmanager-proxy-tls"  },  {  "mountPath": "/etc/proxy/secrets",  "name": "secret-default-session-secret"  }  ]  }  ],  "image": "quay.io/prometheus/alertmanager:latest",  "listenLocal": true,  "podMetadata": {  "labels": {  "alertmanager": "default"  }  },  "replicas": 1,  "scrapeConfigSelector": {  "matchLabels": {  "app": "smart-gateway"  }  },  "secrets": [  "default-alertmanager-proxy-tls",  "default-session-secret"  ],  "serviceAccountName": "alertmanager-stf",  "storage": {  "volumeClaimTemplate": {  "spec": {  "resources": {  "requests": {  "storage": "20G"  }  },  "storageClassName": "crc-csi-hostpath-provisioner"  }  }  }  }  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:40Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup alertmanager configuration template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "v1",  "kind": "Secret",  "metadata": {  "name": "alertmanager-default",  "namespace": "service-telemetry"  },  "stringData": {  "alertmanager.yaml": "global:\n resolve_timeout: 5m\nroute:\n group_by: ['job']\n group_wait: 30s\n group_interval: 5m\n repeat_interval: 12h\n receiver: 'snmp_wh'\nreceivers:\n- name: 'snmp_wh'\n webhook_configs:\n - url: 'http://default-prometheus-webhook-snmp:9099'"  },  "type": "Opaque"  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:40Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an Alertmanager configuration secret] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:40Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an Alertmanager configuration secret"} {"level":"info","ts":"2025-10-06T00:29:41Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Secret, service-telemetry/alertmanager-default"} {"level":"info","ts":"2025-10-06T00:29:41Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of Alertmanager] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:25 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:41Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an instance of Alertmanager"} {"level":"info","ts":"2025-10-06T00:29:42Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1, Kind=Alertmanager, service-telemetry/default"} {"level":"info","ts":"2025-10-06T00:29:42Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:42Z","logger":"proxy","msg":"Watching child resource","kind":"monitoring.rhobs/v1, Kind=Alertmanager","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:42Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} {"level":"info","ts":"2025-10-06T00:29:42Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Ensure no community Alertmanager is installed if not using community operator"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no community Alertmanager is installed if not using community operator] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:31 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:43Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Alertmanager, service-telemetry/default"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no rhobs Alertmanager is installed if not using it] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:41 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:43Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Ensure no rhobs Alertmanager is installed if not using it"} {"level":"info","ts":"2025-10-06T00:29:43Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create SNMP traps instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create SNMP traps instance] *************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:54 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "apps/v1",  "kind": "Deployment",  "metadata": {  "name": "default-snmp-webhook",  "namespace": "service-telemetry"  },  "spec": {  "replicas": 1,  "selector": {  "matchLabels": {  "app": "default-snmp-webhook"  }  },  "template": {  "metadata": {  "labels": {  "app": "default-snmp-webhook"  }  },  "spec": {  "containers": [  {  "env": [  {  "name": "SNMP_COMMUNITY",  "value": "public"  },  {  "name": "SNMP_RETRIES",  "value": "5"  },  {  "name": "SNMP_HOST",  "value": "192.168.24.254"  },  {  "name": "SNMP_PORT",  "value": "162"  },  {  "name": "SNMP_TIMEOUT",  "value": "1"  },  {  "name": "ALERT_OID_LABEL",  "value": "oid"  },  {  "name": "TRAP_OID_PREFIX",  "value": "1.3.6.1.4.1.50495.15"  },  {  "name": "TRAP_DEFAULT_OID",  "value": "1.3.6.1.4.1.50495.15.1.2.1"  },  {  "name": "TRAP_DEFAULT_SEVERITY",  "value": ""  }  ],  "image": "image-registry.openshift-image-registry.svc:5000/service-telemetry/prometheus-webhook-snmp:latest",  "name": "prometheus-webhook-snmp",  "ports": [  {  "containerPort": 9099  }  ]  }  ]  }  }  }  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:43Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} {"level":"info","ts":"2025-10-06T00:29:44Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an instance of snmp webhook"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of snmp webhook] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_snmp_traps.yml:10 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:44Z","logger":"proxy","msg":"Cache miss: apps/v1, Kind=Deployment, service-telemetry/default-snmp-webhook"} {"level":"info","ts":"2025-10-06T00:29:44Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:44Z","logger":"proxy","msg":"Watching child resource","kind":"apps/v1, Kind=Deployment","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:44Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of snmp webhook service] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_snmp_traps.yml:20 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:45Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an instance of snmp webhook service"} {"level":"info","ts":"2025-10-06T00:29:46Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Service, service-telemetry/default-prometheus-webhook-snmp"} {"level":"info","ts":"2025-10-06T00:29:46Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/alertmanager-stf with oauth redirect annotation] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:46Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ServiceAccount/alertmanager-stf with oauth redirect annotation"} {"level":"info","ts":"2025-10-06T00:29:47Z","logger":"proxy","msg":"Cache miss: /v1, Kind=ServiceAccount, service-telemetry/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:29:47Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRole/alertmanager-stf] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:81 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:47Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ClusterRole/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:29:48Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRoleBinding/alertmanager-stf] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:120 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:48Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ClusterRoleBinding/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:29:50Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Role/alertmanager-stf] ************************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:139 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:50Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create Role/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:29:51Z","logger":"proxy","msg":"Cache miss: rbac.authorization.k8s.io/v1, Kind=Role, service-telemetry/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:29:51Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create RoleBinding/alertmanager-stf] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:177 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:51Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create RoleBinding/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:29:52Z","logger":"proxy","msg":"Cache miss: rbac.authorization.k8s.io/v1, Kind=RoleBinding, service-telemetry/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:29:52Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create service to access the Alertmanager proxy] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:202 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:52Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create service to access the Alertmanager proxy"} {"level":"info","ts":"2025-10-06T00:29:53Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Service, service-telemetry/default-alertmanager-proxy"} {"level":"info","ts":"2025-10-06T00:29:53Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:54Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create route to access the Alertmanager proxy"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create route to access the Alertmanager proxy] ******** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:213 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:55Z","logger":"proxy","msg":"Cache miss: route.openshift.io/v1, Kind=Route, service-telemetry/default-alertmanager-proxy"} {"level":"info","ts":"2025-10-06T00:29:55Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Setup Certificates for ElasticSearch] ***************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:67 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:56Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Setup Certificates for ElasticSearch"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Setup ElasticSearch] ********************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:56Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Setup ElasticSearch"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Get data about clouds] ******************************** ok: [localhost] => {  "servicetelemetry_vars.clouds": [  {  "events": {  "collectors": [  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 16384,  "verbose": false  },  "collector_type": "collectd",  "debug_enabled": false,  "subscription_address": "collectd/cloud1-notify"  },  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 16384,  "verbose": false  },  "collector_type": "ceilometer",  "debug_enabled": false,  "subscription_address": "anycast/ceilometer/cloud1-event.sample"  }  ]  },  "metrics": {  "collectors": [  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 16384,  "verbose": false  },  "collector_type": "collectd",  "debug_enabled": false,  "subscription_address": "collectd/cloud1-telemetry"  },  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 16384,  "verbose": false  },  "collector_type": "ceilometer",  "debug_enabled": false,  "subscription_address": "anycast/ceilometer/cloud1-metering.sample"  },  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 65535,  "verbose": false  },  "collector_type": "sensubility",  "debug_enabled": false,  "subscription_address": "sensubility/cloud1-telemetry"  }  ]  },  "name": "cloud1"  }  ] } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:56Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Loop through cloud instances to setup transport receivers] *** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:83 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:56Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Loop through cloud instances to setup transport receivers"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Cloud collector setup] ******************************** ok: [localhost] => {  "msg": "Working on cloud {'name': 'cloud1', 'metrics': {'collectors': [{'collector_type': 'collectd', 'subscription_address': 'collectd/cloud1-telemetry', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 16384, 'ring_buffer_count': 15000, 'verbose': False}}, {'collector_type': 'ceilometer', 'subscription_address': 'anycast/ceilometer/cloud1-metering.sample', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 16384, 'ring_buffer_count': 15000, 'verbose': False}}, {'collector_type': 'sensubility', 'subscription_address': 'sensubility/cloud1-telemetry', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 65535, 'ring_buffer_count': 15000, 'verbose': False}}]}, 'events': {'collectors': [{'collector_type': 'collectd', 'subscription_address': 'collectd/cloud1-notify', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 16384, 'ring_buffer_count': 15000, 'verbose': False}}, {'collector_type': 'ceilometer', 'subscription_address': 'anycast/ceilometer/cloud1-event.sample', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 16384, 'ring_buffer_count': 15000, 'verbose': False}}]}} to setup metrics and events Smart Gateways\n" } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:56Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"1960296431672887179","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy Metrics Smart Gateway instance for each collector] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:6 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:56Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy Metrics Smart Gateway instance for each collector"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:56Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} {"level":"info","ts":"2025-10-06T00:29:57Z","logger":"proxy","msg":"Cache miss: smartgateway.infra.watch/v2, Kind=SmartGateway, service-telemetry/default-cloud1-coll-meter"} {"level":"info","ts":"2025-10-06T00:29:57Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:57Z","logger":"proxy","msg":"Watching child resource","kind":"smartgateway.infra.watch/v2, Kind=SmartGateway","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:57Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:57Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:58Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs"} {"level":"info","ts":"2025-10-06T00:29:58Z","logger":"proxy","msg":"Cache miss: /v1, Kind=Secret, service-telemetry/prometheus-stf-token"} {"level":"info","ts":"2025-10-06T00:29:58Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ScrapeConfig to scrape Smart Gateway] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:64 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:29:59Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ScrapeConfig to scrape Smart Gateway"} {"level":"info","ts":"2025-10-06T00:29:59Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1alpha1, Kind=ScrapeConfig, service-telemetry/default-cloud1-coll-meter"} {"level":"info","ts":"2025-10-06T00:29:59Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:29:59Z","logger":"proxy","msg":"Watching child resource","kind":"monitoring.rhobs/v1alpha1, Kind=ScrapeConfig","enqueue_kind":"infra.watch/v1beta1, Kind=ServiceTelemetry"} {"level":"info","ts":"2025-10-06T00:29:59Z","msg":"Starting EventSource","controller":"servicetelemetry-controller","source":"kind source: *unstructured.Unstructured"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ScrapeConfig if provided] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:00Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create additional ScrapeConfig if provided"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ServiceMonitor if provided (legacy)] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:00Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create additional ServiceMonitor if provided (legacy)"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove (legacy) default ServiceMonitors] ************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:00Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Remove (legacy) default ServiceMonitors"} {"level":"info","ts":"2025-10-06T00:30:01Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1, Kind=ServiceMonitor, service-telemetry/default-cloud1-coll-meter"} {"level":"info","ts":"2025-10-06T00:30:01Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:02Z","logger":"proxy","msg":"Cache miss: smartgateway.infra.watch/v2, Kind=SmartGateway, service-telemetry/default-cloud1-ceil-meter"} {"level":"info","ts":"2025-10-06T00:30:02Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:02Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:02Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs"} {"level":"info","ts":"2025-10-06T00:30:03Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/prometheus-stf-token","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"prometheus-stf-token","Parts":["secrets","prometheus-stf-token"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ScrapeConfig to scrape Smart Gateway] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:64 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:03Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ScrapeConfig to scrape Smart Gateway"} {"level":"info","ts":"2025-10-06T00:30:04Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1alpha1, Kind=ScrapeConfig, service-telemetry/default-cloud1-ceil-meter"} {"level":"info","ts":"2025-10-06T00:30:04Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ScrapeConfig if provided] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:04Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create additional ScrapeConfig if provided"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ServiceMonitor if provided (legacy)] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:05Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create additional ServiceMonitor if provided (legacy)"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove (legacy) default ServiceMonitors] ************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:05Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Remove (legacy) default ServiceMonitors"} {"level":"info","ts":"2025-10-06T00:30:05Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1, Kind=ServiceMonitor, service-telemetry/default-cloud1-ceil-meter"} {"level":"info","ts":"2025-10-06T00:30:06Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:06Z","logger":"proxy","msg":"Cache miss: smartgateway.infra.watch/v2, Kind=SmartGateway, service-telemetry/default-cloud1-sens-meter"} {"level":"info","ts":"2025-10-06T00:30:06Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 {"level":"info","ts":"2025-10-06T00:30:07Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:07Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs"} {"level":"info","ts":"2025-10-06T00:30:07Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/prometheus-stf-token","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"prometheus-stf-token","Parts":["secrets","prometheus-stf-token"]}} {"level":"info","ts":"2025-10-06T00:30:08Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create ScrapeConfig to scrape Smart Gateway"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ScrapeConfig to scrape Smart Gateway] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:64 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:09Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1alpha1, Kind=ScrapeConfig, service-telemetry/default-cloud1-sens-meter"} {"level":"info","ts":"2025-10-06T00:30:09Z","logger":"proxy","msg":"Injecting owner reference"} {"level":"info","ts":"2025-10-06T00:30:09Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create additional ScrapeConfig if provided"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ScrapeConfig if provided] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:70 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ServiceMonitor if provided (legacy)] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:09Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Create additional ServiceMonitor if provided (legacy)"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove (legacy) default ServiceMonitors] ************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:09Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Remove (legacy) default ServiceMonitors"} {"level":"info","ts":"2025-10-06T00:30:10Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1, Kind=ServiceMonitor, service-telemetry/default-cloud1-sens-meter"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Lookup Elasticsearch BasicAuth] *********************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:24 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:10Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Lookup Elasticsearch BasicAuth"} {"level":"info","ts":"2025-10-06T00:30:11Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/elasticsearch-es-elastic-user","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"elasticsearch-es-elastic-user","Parts":["secrets","elasticsearch-es-elastic-user"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get the Elasticsearch TLS materials secret] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:52 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:12Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Get the Elasticsearch TLS materials secret"} {"level":"info","ts":"2025-10-06T00:30:12Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/elasticsearch-es-cert","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"elasticsearch-es-cert","Parts":["secrets","elasticsearch-es-cert"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Load dummy certs] ************************************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:62 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:13Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Load dummy certs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Augment the secret with dummy TLS cert/key if no TLS user auth material provided] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:66 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:13Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Augment the secret with dummy TLS cert/key if no TLS user auth material provided"} {"level":"info","ts":"2025-10-06T00:30:14Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/elasticsearch-es-cert","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"elasticsearch-es-cert","Parts":["secrets","elasticsearch-es-cert"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy Events Smart Gateway instance for each collector] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:78 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:14Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy Events Smart Gateway instance for each collector"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:14Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} {"level":"info","ts":"2025-10-06T00:30:15Z","logger":"proxy","msg":"Cache miss: smartgateway.infra.watch/v2, Kind=SmartGateway, service-telemetry/default-cloud1-coll-event"} {"level":"info","ts":"2025-10-06T00:30:15Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:15Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:15Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} {"level":"info","ts":"2025-10-06T00:30:16Z","logger":"proxy","msg":"Cache miss: smartgateway.infra.watch/v2, Kind=SmartGateway, service-telemetry/default-cloud1-ceil-event"} {"level":"info","ts":"2025-10-06T00:30:16Z","logger":"proxy","msg":"Injecting owner reference"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:16Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} {"level":"info","ts":"2025-10-06T00:30:16Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Start graphing component plays"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Start graphing component plays] *********************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:98 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Post-setup] ******************************************* task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:104 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:16Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Post-setup"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove unlisted Smart Gateway] ************************ task path: /opt/ansible/roles/servicetelemetry/tasks/post.yml:20 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:17Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"1960296431672887179","EventData.Name":"servicetelemetry : Remove unlisted Smart Gateway"} {"level":"info","ts":"2025-10-06T00:30:17Z","logger":"runner","msg":"Ansible-runner exited successfully","job":"1960296431672887179","name":"default","namespace":"service-telemetry"} ----- Ansible Task Status Event StdOut (infra.watch/v1beta1, Kind=ServiceTelemetry, default/service-telemetry) ----- PLAY RECAP ********************************************************************* localhost : ok=127  changed=45  unreachable=0 failed=0 skipped=36  rescued=0 ignored=0 ---------- {"level":"info","ts":"2025-10-06T00:30:17Z","logger":"KubeAPIWarningLogger","msg":"unknown field \"status.conditions[0].ansibleResult\""} {"level":"info","ts":"2025-10-06T00:30:17Z","logger":"KubeAPIWarningLogger","msg":"unknown field \"status.conditions[1].message\""} {"level":"info","ts":"2025-10-06T00:30:17Z","logger":"KubeAPIWarningLogger","msg":"unknown field \"status.conditions[2].message\""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Installing service telemetry] ******************************** ok: [localhost] => {  "msg": "INSTALLING SERVICE TELEMETRY" } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:18Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Pre-setup] ******************************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:7 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:18Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Pre-setup"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Clear the fact cache before looking up cluster information] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:18Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Clear the fact cache before looking up cluster information"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Show existing API groups available to us] ******************************** ok: [localhost] => {  "api_groups": [  "",  "apiregistration.k8s.io",  "apps",  "events.k8s.io",  "authentication.k8s.io",  "authorization.k8s.io",  "autoscaling",  "batch",  "certificates.k8s.io",  "networking.k8s.io",  "policy",  "rbac.authorization.k8s.io",  "storage.k8s.io",  "admissionregistration.k8s.io",  "apiextensions.k8s.io",  "scheduling.k8s.io",  "coordination.k8s.io",  "node.k8s.io",  "discovery.k8s.io",  "flowcontrol.apiserver.k8s.io",  "apps.openshift.io",  "authorization.openshift.io",  "build.openshift.io",  "image.openshift.io",  "oauth.openshift.io",  "project.openshift.io",  "quota.openshift.io",  "route.openshift.io",  "security.openshift.io",  "template.openshift.io",  "user.openshift.io",  "packages.operators.coreos.com",  "config.openshift.io",  "operator.openshift.io",  "acme.cert-manager.io",  "apiserver.openshift.io",  "apm.k8s.elastic.co",  "autoscaling.openshift.io",  "cert-manager.io",  "console.openshift.io",  "elasticsearch.k8s.elastic.co",  "enterprisesearch.k8s.elastic.co",  "imageregistry.operator.openshift.io",  "ingress.operator.openshift.io",  "k8s.cni.cncf.io",  "k8s.ovn.org",  "kibana.k8s.elastic.co",  "machine.openshift.io",  "machineconfiguration.openshift.io",  "monitoring.coreos.com",  "monitoring.openshift.io",  "monitoring.rhobs",  "network.operator.openshift.io",  "operators.coreos.com",  "samples.operator.openshift.io",  "security.internal.openshift.io",  "agent.k8s.elastic.co",  "autoscaling.k8s.elastic.co",  "controlplane.operator.openshift.io",  "interconnectedcloud.github.io",  "ipam.cluster.x-k8s.io",  "logstash.k8s.elastic.co",  "maps.k8s.elastic.co",  "migration.k8s.io",  "observability.openshift.io",  "perses.dev",  "policy.networking.k8s.io",  "stackconfigpolicy.k8s.elastic.co",  "whereabouts.cni.cncf.io",  "infrastructure.cluster.x-k8s.io",  "beat.k8s.elastic.co",  "helm.openshift.io",  "infra.watch",  "smartgateway.infra.watch"  ] } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:19Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Indicate what kind of cluster we are in (OpenShift or Kubernetes).] ******************************** ok: [localhost] => {  "msg": "CLUSTER TYPE: is_openshift=True; is_k8s=False" } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:19Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Fail when can't determine type of cluster] ************ task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:27 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:19Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Fail when can't determine type of cluster"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Print some debug information] ******************************** ok: [localhost] => {  "msg": [  "ServiceTelemetry Variables",  "--------------------------------------------",  "alerting:",  " alertmanager:",  " deployment_size: 1",  " receivers:",  " snmp_traps:",  " alert_oid_label: oid",  " community: public",  " enabled: true",  " port: 162",  " retries: 5",  " target: 192.168.24.254",  " timeout: 1",  " trap_default_oid: 1.3.6.1.4.1.50495.15.1.2.1",  " trap_default_severity: ''",  " trap_oid_prefix: 1.3.6.1.4.1.50495.15",  " storage:",  " persistent:",  " pvc_storage_request: 20G",  " storage_class: crc-csi-hostpath-provisioner",  " strategy: persistent",  " enabled: true",  "backends:",  " events:",  " elasticsearch:",  " certificates:",  " ca_cert_duration: 70080h",  " endpoint_cert_duration: 70080h",  " enabled: true",  " forwarding:",  " host_url: https://elasticsearch-es-http:9200",  " tls_secret_name: elasticsearch-es-cert",  " tls_server_name: ''",  " use_basic_auth: true",  " use_tls: true",  " user_secret_name: elasticsearch-es-elastic-user",  " node_count: 1",  " storage:",  " persistent:",  " pvc_storage_request: 20Gi",  " storage_class: ''",  " strategy: persistent",  " version: 7.16.1",  " metrics:",  " prometheus:",  " deployment_size: 1",  " enabled: true",  " scrape_interval: 30s",  " storage:",  " persistent:",  " pvc_storage_request: 20G",  " storage_class: crc-csi-hostpath-provisioner",  " retention: 24h",  " strategy: persistent",  "clouds:",  "- events:",  " collectors:",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: collectd",  " debug_enabled: false",  " subscription_address: collectd/cloud1-notify",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: ceilometer",  " debug_enabled: false",  " subscription_address: anycast/ceilometer/cloud1-event.sample",  " metrics:",  " collectors:",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: collectd",  " debug_enabled: false",  " subscription_address: collectd/cloud1-telemetry",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: ceilometer",  " debug_enabled: false",  " subscription_address: anycast/ceilometer/cloud1-metering.sample",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 65535",  " verbose: false",  " collector_type: sensubility",  " debug_enabled: false",  " subscription_address: sensubility/cloud1-telemetry",  " name: cloud1",  "graphing:",  " enabled: false",  " grafana:",  " base_image: registry.redhat.io/rhel8/grafana:9",  " dashboards:",  " enabled: true",  " disable_signout_menu: false",  " ingress_enabled: true",  "high_availability:",  " enabled: false",  "transports:",  " qdr:",  " auth: basic",  " certificates:",  " ca_cert_duration: 70080h",  " endpoint_cert_duration: 70080h",  " deployment_size: 1",  " enabled: true",  " web:",  " enabled: false",  ""  ] } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:19Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get current Smart Gateways loaded] ******************** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:20Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Get current Smart Gateways loaded"} {"level":"info","ts":"2025-10-06T00:30:20Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/smartgateway.infra.watch/v2/namespaces/service-telemetry/smartgateways","Verb":"list","APIPrefix":"apis","APIGroup":"smartgateway.infra.watch","APIVersion":"v2","Namespace":"service-telemetry","Resource":"smartgateways","Subresource":"","Name":"","Parts":["smartgateways"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get current STF object] ******************************* task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:21Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Get current STF object"} {"level":"info","ts":"2025-10-06T00:30:21Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/infra.watch/v1beta1/namespaces/service-telemetry/servicetelemetrys/default","Verb":"get","APIPrefix":"apis","APIGroup":"infra.watch","APIVersion":"v1beta1","Namespace":"service-telemetry","Resource":"servicetelemetrys","Subresource":"","Name":"default","Parts":["servicetelemetrys","default"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get community Prometheus objects] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:92 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:22Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Get community Prometheus objects"} {"level":"info","ts":"2025-10-06T00:30:22Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Prometheus, service-telemetry/default"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply community observabilityStrategy if missing on an STF object with an existing community prometheus] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:101 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:23Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Apply community observabilityStrategy if missing on an STF object with an existing community prometheus"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply default observabilityStrategy if missing on a new STF object with no associated community prometheus] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:118 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:23Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Apply default observabilityStrategy if missing on a new STF object with no associated community prometheus"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get QDR objects] ************************************** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:132 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:23Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Get QDR objects"} {"level":"info","ts":"2025-10-06T00:30:24Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/interconnectedcloud.github.io/v1alpha1/namespaces/service-telemetry/interconnects/default-interconnect","Verb":"get","APIPrefix":"apis","APIGroup":"interconnectedcloud.github.io","APIVersion":"v1alpha1","Namespace":"service-telemetry","Resource":"interconnects","Subresource":"","Name":"default-interconnect","Parts":["interconnects","default-interconnect"]}} {"level":"info","ts":"2025-10-06T00:30:24Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Apply legacy auth=none for QDR if missing on the STF object and it's currently deployed that way"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply legacy auth=none for QDR if missing on the STF object and it's currently deployed that way] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:141 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply default auth for QDR if missing on a new STF object with no associated auth=none QDR] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:161 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:24Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Apply default auth for QDR if missing on a new STF object with no associated auth=none QDR"} {"level":"info","ts":"2025-10-06T00:30:25Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/infra.watch/v1beta1/namespaces/service-telemetry/servicetelemetrys/default","Verb":"get","APIPrefix":"apis","APIGroup":"infra.watch","APIVersion":"v1beta1","Namespace":"service-telemetry","Resource":"servicetelemetrys","Subresource":"","Name":"default","Parts":["servicetelemetrys","default"]}} {"level":"info","ts":"2025-10-06T00:30:25Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Set ServiceTelemetry object status to have ephemeralStorageEnabled status"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Set ServiceTelemetry object status to have ephemeralStorageEnabled status] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:185 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create QDR instance] ********************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:25Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create QDR instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create self-signed interconnect issuer] *************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:6 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:25Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create self-signed interconnect issuer"} {"level":"info","ts":"2025-10-06T00:30:27Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/issuers/default-interconnect-selfsigned","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"issuers","Subresource":"","Name":"default-interconnect-selfsigned","Parts":["issuers","default-interconnect-selfsigned"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create self-signed interconnect certificate] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:27Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:30:28Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-selfsigned","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-selfsigned","Parts":["certificates","default-interconnect-selfsigned"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create default CA interconnect issuer using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:37 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:28Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create default CA interconnect issuer using self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:30:29Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/issuers/default-interconnect-ca","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"issuers","Subresource":"","Name":"default-interconnect-ca","Parts":["issuers","default-interconnect-ca"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create OpenStack CA certificate using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:51 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:29Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create OpenStack CA certificate using self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:30:30Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-openstack-ca","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-openstack-ca","Parts":["certificates","default-interconnect-openstack-ca"]}} --------------------------- Ansible Task StdOut ------------------------------- {"level":"info","ts":"2025-10-06T00:30:30Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create OpenStack credentials certificate using self-signed interconnect certificate"} TASK [servicetelemetry : Create OpenStack credentials certificate using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:68 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:31Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-openstack-credentials","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-openstack-credentials","Parts":["certificates","default-interconnect-openstack-credentials"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router CA issuer] ************************ task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:86 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:31Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create inter-router CA issuer"} {"level":"info","ts":"2025-10-06T00:30:32Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/issuers/default-interconnect-inter-router-ca","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"issuers","Subresource":"","Name":"default-interconnect-inter-router-ca","Parts":["issuers","default-interconnect-inter-router-ca"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router CA certificate] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:100 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:32Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create inter-router CA certificate"} {"level":"info","ts":"2025-10-06T00:30:33Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-inter-router-ca","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-inter-router-ca","Parts":["certificates","default-interconnect-inter-router-ca"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router credentials certificate] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:117 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:33Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create inter-router credentials certificate"} {"level":"info","ts":"2025-10-06T00:30:34Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-inter-router-credentials","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-inter-router-credentials","Parts":["certificates","default-interconnect-inter-router-credentials"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Interconnect SASL ConfigMap] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:136 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:34Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create Interconnect SASL ConfigMap"} {"level":"info","ts":"2025-10-06T00:30:35Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/configmaps/default-interconnect-sasl-config","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"configmaps","Subresource":"","Name":"default-interconnect-sasl-config","Parts":["configmaps","default-interconnect-sasl-config"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get QDR BasicAuth secret] ***************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:158 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:35Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Get QDR BasicAuth secret"} {"level":"info","ts":"2025-10-06T00:30:36Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/default-interconnect-users","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"default-interconnect-users","Parts":["secrets","default-interconnect-users"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Perform a one-time upgrade to the default generated password for QDR BasicAuth] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:170 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:36Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Perform a one-time upgrade to the default generated password for QDR BasicAuth"} {"level":"info","ts":"2025-10-06T00:30:37Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/default-interconnect-users","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"default-interconnect-users","Parts":["secrets","default-interconnect-users"]}} {"level":"info","ts":"2025-10-06T00:30:37Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Get the list of QDR pods"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get the list of QDR pods] ***************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:184 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:38Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/pods","Verb":"list","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"pods","Subresource":"","Name":"","Parts":["pods"]}} {"level":"info","ts":"2025-10-06T00:30:38Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Restart QDR pods to pick up new password"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Restart QDR pods to pick up new password] ************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:193 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:39Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/pods/default-interconnect-84dbc59cb8-k884q","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"pods","Subresource":"","Name":"default-interconnect-84dbc59cb8-k884q","Parts":["pods","default-interconnect-84dbc59cb8-k884q"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [Restart QDR pods to pick up new password] ******************************** changed: [localhost] => (item={'apiVersion': 'v1', 'kind': 'Pod', 'metadata': {'annotations': {'k8s.ovn.org/pod-networks': '{"default":{"ip_addresses":["10.217.0.80/23"],"mac_address":"0a:58:0a:d9:00:50","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0/22","nextHop":"10.217.0.1"},{"dest":"10.217.4.0/23","nextHop":"10.217.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.217.0.1"}],"ip_address":"10.217.0.80/23","gateway_ip":"10.217.0.1"}}', 'k8s.v1.cni.cncf.io/network-status': '[{\n "name": "ovn-kubernetes",\n "interface": "eth0",\n "ips": [\n "10.217.0.80"\n ],\n "mac": "0a:58:0a:d9:00:50",\n "default": true,\n "dns": {}\n}]', 'openshift.io/scc': 'restricted-v2', 'prometheus.io/port': '8888', 'prometheus.io/scrape': 'true', 'seccomp.security.alpha.kubernetes.io/pod': 'runtime/default'}, 'creationTimestamp': '2025-10-06T00:29:20Z', 'generateName': 'default-interconnect-84dbc59cb8-', 'labels': {'application': 'default-interconnect', 'com.company': 'Red_Hat', 'interconnect_cr': 'default-interconnect', 'pod-template-hash': '84dbc59cb8', 'rht.comp': 'Interconnect', 'rht.comp_t': 'application', 'rht.comp_ver': '1.10', 'rht.prod_name': 'Red_Hat_Integration', 'rht.prod_ver': '2021.Q4'}, 'managedFields': [{'apiVersion': 'v1', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'f:k8s.ovn.org/pod-networks': {}}}}, 'manager': 'crc', 'operation': 'Update', 'subresource': 'status', 'time': '2025-10-06T00:29:20Z'}, {'apiVersion': 'v1', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'.': {}, 'f:prometheus.io/port': {}, 'f:prometheus.io/scrape': {}}, 'f:generateName': {}, 'f:labels': {'.': {}, 'f:application': {}, 'f:com.company': {}, 'f:interconnect_cr': {}, 'f:pod-template-hash': {}, 'f:rht.comp': {}, 'f:rht.comp_t': {}, 'f:rht.comp_ver': {}, 'f:rht.prod_name': {}, 'f:rht.prod_ver': {}}, 'f:ownerReferences': {'.': {}, 'k:{"uid":"375d7478-001f-4869-af32-068f3be5f020"}': {}}}, 'f:spec': {'f:affinity': {'.': {}, 'f:podAntiAffinity': {'.': {}, 'f:requiredDuringSchedulingIgnoredDuringExecution': {}}}, 'f:containers': {'k:{"name":"default-interconnect"}': {'.': {}, 'f:env': {'.': {}, 'k:{"name":"APPLICATION_NAME"}': {'.': {}, 'f:name': {}, 'f:value': {}}, 'k:{"name":"POD_COUNT"}': {'.': {}, 'f:name': {}, 'f:value': {}}, 'k:{"name":"POD_IP"}': {'.': {}, 'f:name': {}, 'f:valueFrom': {'.': {}, 'f:fieldRef': {}}}, 'k:{"name":"POD_NAMESPACE"}': {'.': {}, 'f:name': {}, 'f:valueFrom': {'.': {}, 'f:fieldRef': {}}}, 'k:{"name":"QDROUTERD_AUTO_CREATE_SASLDB_PATH"}': {'.': {}, 'f:name': {}, 'f:value': {}}, 'k:{"name":"QDROUTERD_AUTO_CREATE_SASLDB_SOURCE"}': {'.': {}, 'f:name': {}, 'f:value': {}}, 'k:{"name":"QDROUTERD_AUTO_MESH_DISCOVERY"}': {'.': {}, 'f:name': {}, 'f:value': {}}, 'k:{"name":"QDROUTERD_CONF"}': {'.': {}, 'f:name': {}, 'f:value': {}}}, 'f:image': {}, 'f:imagePullPolicy': {}, 'f:livenessProbe': {'.': {}, 'f:failureThreshold': {}, 'f:httpGet': {'.': {}, 'f:path': {}, 'f:port': {}, 'f:scheme': {}}, 'f:initialDelaySeconds': {}, 'f:periodSeconds': {}, 'f:successThreshold': {}, 'f:timeoutSeconds': {}}, 'f:name': {}, 'f:ports': {'.': {}, 'k:{"containerPort":55671,"protocol":"TCP"}': {'.': {}, 'f:containerPort': {}, 'f:name': {}, 'f:protocol': {}}, 'k:{"containerPort":5672,"protocol":"TCP"}': {'.': {}, 'f:containerPort': {}, 'f:name': {}, 'f:protocol': {}}}, 'f:resources': {}, 'f:terminationMessagePath': {}, 'f:terminationMessagePolicy': {}, 'f:volumeMounts': {'.': {}, 'k:{"mountPath":"/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca"}': {'.': {}, 'f:mountPath': {}, 'f:name': {}}, 'k:{"mountPath":"/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials"}': {'.': {}, 'f:mountPath': {}, 'f:name': {}}, 'k:{"mountPath":"/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca"}': {'.': {}, 'f:mountPath': {}, 'f:name': {}}, 'k:{"mountPath":"/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials"}': {'.': {}, 'f:mountPath': {}, 'f:name': {}}, 'k:{"mountPath":"/etc/qpid-dispatch/sasl-users"}': {'.': {}, 'f:mountPath': {}, 'f:name': {}}, 'k:{"mountPath":"/etc/sasl2"}': {'.': {}, 'f:mountPath': {}, 'f:name': {}}}}}, 'f:dnsPolicy': {}, 'f:enableServiceLinks': {}, 'f:restartPolicy': {}, 'f:schedulerName': {}, 'f:securityContext': {}, 'f:serviceAccount': {}, 'f:serviceAccountName': {}, 'f:terminationGracePeriodSeconds': {}, 'f:volumes': {'.': {}, 'k:{"name":"default-interconnect-inter-router-ca"}': {'.': {}, 'f:name': {}, 'f:secret': {'.': {}, 'f:defaultMode': {}, 'f:secretName': {}}}, 'k:{"name":"default-interconnect-inter-router-credentials"}': {'.': {}, 'f:name': {}, 'f:secret': {'.': {}, 'f:defaultMode': {}, 'f:secretName': {}}}, 'k:{"name":"default-interconnect-openstack-ca"}': {'.': {}, 'f:name': {}, 'f:secret': {'.': {}, 'f:defaultMode': {}, 'f:secretName': {}}}, 'k:{"name":"default-interconnect-openstack-credentials"}': {'.': {}, 'f:name': {}, 'f:secret': {'.': {}, 'f:defaultMode': {}, 'f:secretName': {}}}, 'k:{"name":"sasl-config"}': {'.': {}, 'f:configMap': {'.': {}, 'f:defaultMode': {}, 'f:name': {}}, 'f:name': {}}, 'k:{"name":"sasl-users"}': {'.': {}, 'f:name': {}, 'f:secret': {'.': {}, 'f:defaultMode': {}, 'f:secretName': {}}}}}}, 'manager': 'kube-controller-manager', 'operation': 'Update', 'time': '2025-10-06T00:29:20Z'}, {'apiVersion': 'v1', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:metadata': {'f:annotations': {'f:k8s.v1.cni.cncf.io/network-status': {}}}}, 'manager': 'multus-daemon', 'operation': 'Update', 'subresource': 'status', 'time': '2025-10-06T00:29:21Z'}, {'apiVersion': 'v1', 'fieldsType': 'FieldsV1', 'fieldsV1': {'f:status': {'f:conditions': {'k:{"type":"ContainersReady"}': {'.': {}, 'f:lastProbeTime': {}, 'f:lastTransitionTime': {}, 'f:status': {}, 'f:type': {}}, 'k:{"type":"Initialized"}': {'.': {}, 'f:lastProbeTime': {}, 'f:lastTransitionTime': {}, 'f:status': {}, 'f:type': {}}, 'k:{"type":"PodReadyToStartContainers"}': {'.': {}, 'f:lastProbeTime': {}, 'f:lastTransitionTime': {}, 'f:status': {}, 'f:type': {}}, 'k:{"type":"Ready"}': {'.': {}, 'f:lastProbeTime': {}, 'f:lastTransitionTime': {}, 'f:status': {}, 'f:type': {}}}, 'f:containerStatuses': {}, 'f:hostIP': {}, 'f:hostIPs': {}, 'f:phase': {}, 'f:podIP': {}, 'f:podIPs': {'.': {}, 'k:{"ip":"10.217.0.80"}': {'.': {}, 'f:ip': {}}}, 'f:startTime': {}}}, 'manager': 'kubelet', 'operation': 'Update', 'subresource': 'status', 'time': '2025-10-06T00:29:28Z'}], 'name': 'default-interconnect-84dbc59cb8-k884q', 'namespace': 'service-telemetry', 'ownerReferences': [{'apiVersion': 'apps/v1', 'blockOwnerDeletion': True, 'controller': True, 'kind': 'ReplicaSet', 'name': 'default-interconnect-84dbc59cb8', 'uid': '375d7478-001f-4869-af32-068f3be5f020'}], 'resourceVersion': '50530', 'uid': 'bce880f5-86a7-40d7-9b04-9ff0a63edf09'}, 'spec': {'affinity': {'podAntiAffinity': {'requiredDuringSchedulingIgnoredDuringExecution': [{'labelSelector': {'matchExpressions': [{'key': 'application', 'operator': 'In', 'values': ['default-interconnect']}]}, 'topologyKey': 'kubernetes.io/hostname'}]}}, 'containers': [{'env': [{'name': 'APPLICATION_NAME', 'value': 'default-interconnect'}, {'name': 'QDROUTERD_CONF', 'value': '\nrouter {\n mode: interior\n id: ${HOSTNAME}\n}\n\nlistener {\n host: 127.0.0.1\n port: 5672\n role: normal\n}\nlistener {\n name: health-and-stats\n port: 8888\n http: true\n healthz: true\n metrics: true\n websockets: false\n httpRootDir: invalid\n}\n\nlistener {\n role: inter-router\n port: 55671\n saslMechanisms: EXTERNAL\n authenticatePeer: true\n sslProfile: inter-router\n}\n\nlistener {\n role: edge\n port: 5671\n saslMechanisms: PLAIN\n authenticatePeer: true\n sslProfile: openstack\n}\nlistener {\n role: edge\n port: 5673\n linkCapacity: 25000\n}\n\nsslProfile {\n name: openstack\n certFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials/tls.crt\n privateKeyFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials/tls.key\n caCertFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca/tls.crt\n}\nsslProfile {\n name: inter-router\n certFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials/tls.crt\n privateKeyFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials/tls.key\n caCertFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca/tls.crt\n}\n\naddress {\n prefix: closest\n distribution: closest\n}\naddress {\n prefix: multicast\n distribution: multicast\n}\naddress {\n prefix: unicast\n distribution: closest\n}\naddress {\n prefix: exclusive\n distribution: closest\n}\naddress {\n prefix: broadcast\n distribution: multicast\n}\naddress {\n prefix: collectd\n distribution: multicast\n}\naddress {\n prefix: ceilometer\n distribution: multicast\n}\n\n\n\n\n'}, {'name': 'QDROUTERD_AUTO_CREATE_SASLDB_SOURCE', 'value': '/etc/qpid-dispatch/sasl-users/'}, {'name': 'QDROUTERD_AUTO_CREATE_SASLDB_PATH', 'value': '/tmp/qdrouterd.sasldb'}, {'name': 'POD_COUNT', 'value': '1'}, {'name': 'POD_NAMESPACE', 'valueFrom': {'fieldRef': {'apiVersion': 'v1', 'fieldPath': 'metadata.namespace'}}}, {'name': 'POD_IP', 'valueFrom': {'fieldRef': {'apiVersion': 'v1', 'fieldPath': 'status.podIP'}}}, {'name': 'QDROUTERD_AUTO_MESH_DISCOVERY', 'value': 'QUERY'}], 'image': 'registry.redhat.io/amq7/amq-interconnect@sha256:31d87473fa684178a694f9ee331d3c80f2653f9533cb65c2a325752166a077e9', 'imagePullPolicy': 'IfNotPresent', 'livenessProbe': {'failureThreshold': 3, 'httpGet': {'path': '/healthz', 'port': 8888, 'scheme': 'HTTP'}, 'initialDelaySeconds': 60, 'periodSeconds': 10, 'successThreshold': 1, 'timeoutSeconds': 1}, 'name': 'default-interconnect', 'ports': [{'containerPort': 5672, 'name': 'port-5672', 'protocol': 'TCP'}, {'containerPort': 55671, 'name': 'port-55671', 'protocol': 'TCP'}], 'resources': {}, 'securityContext': {'allowPrivilegeEscalation': False, 'capabilities': {'drop': ['ALL']}, 'runAsNonRoot': True, 'runAsUser': 1000660000}, 'terminationMessagePath': '/dev/termination-log', 'terminationMessagePolicy': 'File', 'volumeMounts': [{'mountPath': '/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials', 'name': 'default-interconnect-openstack-credentials'}, {'mountPath': '/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca', 'name': 'default-interconnect-openstack-ca'}, {'mountPath': '/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials', 'name': 'default-interconnect-inter-router-credentials'}, {'mountPath': '/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca', 'name': 'default-interconnect-inter-router-ca'}, {'mountPath': '/etc/qpid-dispatch/sasl-users', 'name': 'sasl-users'}, {'mountPath': '/etc/sasl2', 'name': 'sasl-config'}, {'mountPath': '/var/run/secrets/kubernetes.io/serviceaccount', 'name': 'kube-api-access-htb8z', 'readOnly': True}]}], 'dnsPolicy': 'ClusterFirst', 'enableServiceLinks': True, 'nodeName': 'crc', 'preemptionPolicy': 'PreemptLowerPriority', 'priority': 0, 'restartPolicy': 'Always', 'schedulerName': 'default-scheduler', 'securityContext': {'fsGroup': 1000660000, 'seLinuxOptions': {'level': 's0:c26,c5'}, 'seccompProfile': {'type': 'RuntimeDefault'}}, 'serviceAccount': 'default-interconnect', 'serviceAccountName': 'default-interconnect', 'terminationGracePeriodSeconds': 30, 'tolerations': [{'effect': 'NoExecute', 'key': 'node.kubernetes.io/not-ready', 'operator': 'Exists', 'tolerationSeconds': 300}, {'effect': 'NoExecute', 'key': 'node.kubernetes.io/unreachable', 'operator': 'Exists', 'tolerationSeconds': 300}], 'volumes': [{'name': 'default-interconnect-openstack-credentials', 'secret': {'defaultMode': 420, 'secretName': 'default-interconnect-openstack-credentials'}}, {'name': 'default-interconnect-openstack-ca', 'secret': {'defaultMode': 420, 'secretName': 'default-interconnect-openstack-ca'}}, {'name': 'default-interconnect-inter-router-credentials', 'secret': {'defaultMode': 420, 'secretName': 'default-interconnect-inter-router-credentials'}}, {'name': 'default-interconnect-inter-router-ca', 'secret': {'defaultMode': 420, 'secretName': 'default-interconnect-inter-router-ca'}}, {'name': 'sasl-users', 'secret': {'defaultMode': 420, 'secretName': 'default-interconnect-users'}}, {'configMap': {'defaultMode': 420, 'name': 'default-interconnect-sasl-config'}, 'name': 'sasl-config'}, {'name': 'kube-api-access-htb8z', 'projected': {'defaultMode': 420, 'sources': [{'serviceAccountToken': {'expirationSeconds': 3607, 'path': 'token'}}, {'configMap': {'items': [{'key': 'ca.crt', 'path': 'ca.crt'}], 'name': 'kube-root-ca.crt'}}, {'downwardAPI': {'items': [{'fieldRef': {'apiVersion': 'v1', 'fieldPath': 'metadata.namespace'}, 'path': 'namespace'}]}}, {'configMap': {'items': [{'key': 'service-ca.crt', 'path': 'service-ca.crt'}], 'name': 'openshift-service-ca.crt'}}]}}]}, 'status': {'conditions': [{'lastProbeTime': None, 'lastTransitionTime': '2025-10-06T00:29:28Z', 'status': 'True', 'type': 'PodReadyToStartContainers'}, {'lastProbeTime': None, 'lastTransitionTime': '2025-10-06T00:29:20Z', 'status': 'True', 'type': 'Initialized'}, {'lastProbeTime': None, 'lastTransitionTime': '2025-10-06T00:29:28Z', 'status': 'True', 'type': 'Ready'}, {'lastProbeTime': None, 'lastTransitionTime': '2025-10-06T00:29:28Z', 'status': 'True', 'type': 'ContainersReady'}, {'lastProbeTime': None, 'lastTransitionTime': '2025-10-06T00:29:20Z', 'status': 'True', 'type': 'PodScheduled'}], 'containerStatuses': [{'containerID': 'cri-o://e10be8b6749609a1ec4201b2736ade003b983f4449b615e4be4946ffde1f31c8', 'image': 'registry.redhat.io/amq7/amq-interconnect@sha256:31d87473fa684178a694f9ee331d3c80f2653f9533cb65c2a325752166a077e9', 'imageID': 'registry.redhat.io/amq7/amq-interconnect@sha256:06ac9dd1544cec3885a8362c7685d6c5bb22aab0e46d476480b463b699ebc192', 'lastState': {}, 'name': 'default-interconnect', 'ready': True, 'restartCount': 0, 'started': True, 'state': {'running': {'startedAt': '2025-10-06T00:29:28Z'}}}], 'hostIP': '192.168.126.11', 'hostIPs': [{'ip': '192.168.126.11'}], 'phase': 'Running', 'podIP': '10.217.0.80', 'podIPs': [{'ip': '10.217.0.80'}], 'qosClass': 'BestEffort', 'startTime': '2025-10-06T00:29:20Z'}}) => {"ansible_loop_var": "item", "changed": true, "item": {"apiVersion": "v1", "kind": "Pod", "metadata": {"annotations": {"k8s.ovn.org/pod-networks": "{\"default\":{\"ip_addresses\":[\"10.217.0.80/23\"],\"mac_address\":\"0a:58:0a:d9:00:50\",\"gateway_ips\":[\"10.217.0.1\"],\"routes\":[{\"dest\":\"10.217.0.0/22\",\"nextHop\":\"10.217.0.1\"},{\"dest\":\"10.217.4.0/23\",\"nextHop\":\"10.217.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.217.0.1\"}],\"ip_address\":\"10.217.0.80/23\",\"gateway_ip\":\"10.217.0.1\"}}", "k8s.v1.cni.cncf.io/network-status": "[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.217.0.80\"\n ],\n \"mac\": \"0a:58:0a:d9:00:50\",\n \"default\": true,\n \"dns\": {}\n}]", "openshift.io/scc": "restricted-v2", "prometheus.io/port": "8888", "prometheus.io/scrape": "true", "seccomp.security.alpha.kubernetes.io/pod": "runtime/default"}, "creationTimestamp": "2025-10-06T00:29:20Z", "generateName": "default-interconnect-84dbc59cb8-", "labels": {"application": "default-interconnect", "com.company": "Red_Hat", "interconnect_cr": "default-interconnect", "pod-template-hash": "84dbc59cb8", "rht.comp": "Interconnect", "rht.comp_t": "application", "rht.comp_ver": "1.10", "rht.prod_name": "Red_Hat_Integration", "rht.prod_ver": "2021.Q4"}, "managedFields": [{"apiVersion": "v1", "fieldsType": "FieldsV1", "fieldsV1": {"f:metadata": {"f:annotations": {"f:k8s.ovn.org/pod-networks": {}}}}, "manager": "crc", "operation": "Update", "subresource": "status", "time": "2025-10-06T00:29:20Z"}, {"apiVersion": "v1", "fieldsType": "FieldsV1", "fieldsV1": {"f:metadata": {"f:annotations": {".": {}, "f:prometheus.io/port": {}, "f:prometheus.io/scrape": {}}, "f:generateName": {}, "f:labels": {".": {}, "f:application": {}, "f:com.company": {}, "f:interconnect_cr": {}, "f:pod-template-hash": {}, "f:rht.comp": {}, "f:rht.comp_t": {}, "f:rht.comp_ver": {}, "f:rht.prod_name": {}, "f:rht.prod_ver": {}}, "f:ownerReferences": {".": {}, "k:{\"uid\":\"375d7478-001f-4869-af32-068f3be5f020\"}": {}}}, "f:spec": {"f:affinity": {".": {}, "f:podAntiAffinity": {".": {}, "f:requiredDuringSchedulingIgnoredDuringExecution": {}}}, "f:containers": {"k:{\"name\":\"default-interconnect\"}": {".": {}, "f:env": {".": {}, "k:{\"name\":\"APPLICATION_NAME\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"POD_COUNT\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"POD_IP\"}": {".": {}, "f:name": {}, "f:valueFrom": {".": {}, "f:fieldRef": {}}}, "k:{\"name\":\"POD_NAMESPACE\"}": {".": {}, "f:name": {}, "f:valueFrom": {".": {}, "f:fieldRef": {}}}, "k:{\"name\":\"QDROUTERD_AUTO_CREATE_SASLDB_PATH\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"QDROUTERD_AUTO_CREATE_SASLDB_SOURCE\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"QDROUTERD_AUTO_MESH_DISCOVERY\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"QDROUTERD_CONF\"}": {".": {}, "f:name": {}, "f:value": {}}}, "f:image": {}, "f:imagePullPolicy": {}, "f:livenessProbe": {".": {}, "f:failureThreshold": {}, "f:httpGet": {".": {}, "f:path": {}, "f:port": {}, "f:scheme": {}}, "f:initialDelaySeconds": {}, "f:periodSeconds": {}, "f:successThreshold": {}, "f:timeoutSeconds": {}}, "f:name": {}, "f:ports": {".": {}, "k:{\"containerPort\":55671,\"protocol\":\"TCP\"}": {".": {}, "f:containerPort": {}, "f:name": {}, "f:protocol": {}}, "k:{\"containerPort\":5672,\"protocol\":\"TCP\"}": {".": {}, "f:containerPort": {}, "f:name": {}, "f:protocol": {}}}, "f:resources": {}, "f:terminationMessagePath": {}, "f:terminationMessagePolicy": {}, "f:volumeMounts": {".": {}, "k:{\"mountPath\":\"/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/qpid-dispatch/sasl-users\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/sasl2\"}": {".": {}, "f:mountPath": {}, "f:name": {}}}}}, "f:dnsPolicy": {}, "f:enableServiceLinks": {}, "f:restartPolicy": {}, "f:schedulerName": {}, "f:securityContext": {}, "f:serviceAccount": {}, "f:serviceAccountName": {}, "f:terminationGracePeriodSeconds": {}, "f:volumes": {".": {}, "k:{\"name\":\"default-interconnect-inter-router-ca\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}, "k:{\"name\":\"default-interconnect-inter-router-credentials\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}, "k:{\"name\":\"default-interconnect-openstack-ca\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}, "k:{\"name\":\"default-interconnect-openstack-credentials\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}, "k:{\"name\":\"sasl-config\"}": {".": {}, "f:configMap": {".": {}, "f:defaultMode": {}, "f:name": {}}, "f:name": {}}, "k:{\"name\":\"sasl-users\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}}}}, "manager": "kube-controller-manager", "operation": "Update", "time": "2025-10-06T00:29:20Z"}, {"apiVersion": "v1", "fieldsType": "FieldsV1", "fieldsV1": {"f:metadata": {"f:annotations": {"f:k8s.v1.cni.cncf.io/network-status": {}}}}, "manager": "multus-daemon", "operation": "Update", "subresource": "status", "time": "2025-10-06T00:29:21Z"}, {"apiVersion": "v1", "fieldsType": "FieldsV1", "fieldsV1": {"f:status": {"f:conditions": {"k:{\"type\":\"ContainersReady\"}": {".": {}, "f:lastProbeTime": {}, "f:lastTransitionTime": {}, "f:status": {}, "f:type": {}}, "k:{\"type\":\"Initialized\"}": {".": {}, "f:lastProbeTime": {}, "f:lastTransitionTime": {}, "f:status": {}, "f:type": {}}, "k:{\"type\":\"PodReadyToStartContainers\"}": {".": {}, "f:lastProbeTime": {}, "f:lastTransitionTime": {}, "f:status": {}, "f:type": {}}, "k:{\"type\":\"Ready\"}": {".": {}, "f:lastProbeTime": {}, "f:lastTransitionTime": {}, "f:status": {}, "f:type": {}}}, "f:containerStatuses": {}, "f:hostIP": {}, "f:hostIPs": {}, "f:phase": {}, "f:podIP": {}, "f:podIPs": {".": {}, "k:{\"ip\":\"10.217.0.80\"}": {".": {}, "f:ip": {}}}, "f:startTime": {}}}, "manager": "kubelet", "operation": "Update", "subresource": "status", "time": "2025-10-06T00:29:28Z"}], "name": "default-interconnect-84dbc59cb8-k884q", "namespace": "service-telemetry", "ownerReferences": [{"apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "default-interconnect-84dbc59cb8", "uid": "375d7478-001f-4869-af32-068f3be5f020"}], "resourceVersion": "50530", "uid": "bce880f5-86a7-40d7-9b04-9ff0a63edf09"}, "spec": {"affinity": {"podAntiAffinity": {"requiredDuringSchedulingIgnoredDuringExecution": [{"labelSelector": {"matchExpressions": [{"key": "application", "operator": "In", "values": ["default-interconnect"]}]}, "topologyKey": "kubernetes.io/hostname"}]}}, "containers": [{"env": [{"name": "APPLICATION_NAME", "value": "default-interconnect"}, {"name": "QDROUTERD_CONF", "value": "\nrouter {\n mode: interior\n id: ${HOSTNAME}\n}\n\nlistener {\n host: 127.0.0.1\n port: 5672\n role: normal\n}\nlistener {\n name: health-and-stats\n port: 8888\n http: true\n healthz: true\n metrics: true\n websockets: false\n httpRootDir: invalid\n}\n\nlistener {\n role: inter-router\n port: 55671\n saslMechanisms: EXTERNAL\n authenticatePeer: true\n sslProfile: inter-router\n}\n\nlistener {\n role: edge\n port: 5671\n saslMechanisms: PLAIN\n authenticatePeer: true\n sslProfile: openstack\n}\nlistener {\n role: edge\n port: 5673\n linkCapacity: 25000\n}\n\nsslProfile {\n name: openstack\n certFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials/tls.crt\n privateKeyFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials/tls.key\n caCertFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca/tls.crt\n}\nsslProfile {\n name: inter-router\n certFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials/tls.crt\n privateKeyFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials/tls.key\n caCertFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca/tls.crt\n}\n\naddress {\n prefix: closest\n distribution: closest\n}\naddress {\n prefix: multicast\n distribution: multicast\n}\naddress {\n prefix: unicast\n distribution: closest\n}\naddress {\n prefix: exclusive\n distribution: closest\n}\naddress {\n prefix: broadcast\n distribution: multicast\n}\naddress {\n prefix: collectd\n distribution: multicast\n}\naddress {\n prefix: ceilometer\n distribution: multicast\n}\n\n\n\n\n"}, {"name": "QDROUTERD_AUTO_CREATE_SASLDB_SOURCE", "value": "/etc/qpid-dispatch/sasl-users/"}, {"name": "QDROUTERD_AUTO_CREATE_SASLDB_PATH", "value": "/tmp/qdrouterd.sasldb"}, {"name": "POD_COUNT", "value": "1"}, {"name": "POD_NAMESPACE", "valueFrom": {"fieldRef": {"apiVersion": "v1", "fieldPath": "metadata.namespace"}}}, {"name": "POD_IP", "valueFrom": {"fieldRef": {"apiVersion": "v1", "fieldPath": "status.podIP"}}}, {"name": "QDROUTERD_AUTO_MESH_DISCOVERY", "value": "QUERY"}], "image": "registry.redhat.io/amq7/amq-interconnect@sha256:31d87473fa684178a694f9ee331d3c80f2653f9533cb65c2a325752166a077e9", "imagePullPolicy": "IfNotPresent", "livenessProbe": {"failureThreshold": 3, "httpGet": {"path": "/healthz", "port": 8888, "scheme": "HTTP"}, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1}, "name": "default-interconnect", "ports": [{"containerPort": 5672, "name": "port-5672", "protocol": "TCP"}, {"containerPort": 55671, "name": "port-55671", "protocol": "TCP"}], "resources": {}, "securityContext": {"allowPrivilegeEscalation": false, "capabilities": {"drop": ["ALL"]}, "runAsNonRoot": true, "runAsUser": 1000660000}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [{"mountPath": "/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials", "name": "default-interconnect-openstack-credentials"}, {"mountPath": "/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca", "name": "default-interconnect-openstack-ca"}, {"mountPath": "/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials", "name": "default-interconnect-inter-router-credentials"}, {"mountPath": "/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca", "name": "default-interconnect-inter-router-ca"}, {"mountPath": "/etc/qpid-dispatch/sasl-users", "name": "sasl-users"}, {"mountPath": "/etc/sasl2", "name": "sasl-config"}, {"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-htb8z", "readOnly": true}]}], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "crc", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {"fsGroup": 1000660000, "seLinuxOptions": {"level": "s0:c26,c5"}, "seccompProfile": {"type": "RuntimeDefault"}}, "serviceAccount": "default-interconnect", "serviceAccountName": "default-interconnect", "terminationGracePeriodSeconds": 30, "tolerations": [{"effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300}, {"effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300}], "volumes": [{"name": "default-interconnect-openstack-credentials", "secret": {"defaultMode": 420, "secretName": "default-interconnect-openstack-credentials"}}, {"name": "default-interconnect-openstack-ca", "secret": {"defaultMode": 420, "secretName": "default-interconnect-openstack-ca"}}, {"name": "default-interconnect-inter-router-credentials", "secret": {"defaultMode": 420, "secretName": "default-interconnect-inter-router-credentials"}}, {"name": "default-interconnect-inter-router-ca", "secret": {"defaultMode": 420, "secretName": "default-interconnect-inter-router-ca"}}, {"name": "sasl-users", "secret": {"defaultMode": 420, "secretName": "default-interconnect-users"}}, {"configMap": {"defaultMode": 420, "name": "default-interconnect-sasl-config"}, "name": "sasl-config"}, {"name": "kube-api-access-htb8z", "projected": {"defaultMode": 420, "sources": [{"serviceAccountToken": {"expirationSeconds": 3607, "path": "token"}}, {"configMap": {"items": [{"key": "ca.crt", "path": "ca.crt"}], "name": "kube-root-ca.crt"}}, {"downwardAPI": {"items": [{"fieldRef": {"apiVersion": "v1", "fieldPath": "metadata.namespace"}, "path": "namespace"}]}}, {"configMap": {"items": [{"key": "service-ca.crt", "path": "service-ca.crt"}], "name": "openshift-service-ca.crt"}}]}}]}, "status": {"conditions": [{"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:28Z", "status": "True", "type": "PodReadyToStartContainers"}, {"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:20Z", "status": "True", "type": "Initialized"}, {"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:28Z", "status": "True", "type": "Ready"}, {"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:28Z", "status": "True", "type": "ContainersReady"}, {"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:20Z", "status": "True", "type": "PodScheduled"}], "containerStatuses": [{"containerID": "cri-o://e10be8b6749609a1ec4201b2736ade003b983f4449b615e4be4946ffde1f31c8", "image": "registry.redhat.io/amq7/amq-interconnect@sha256:31d87473fa684178a694f9ee331d3c80f2653f9533cb65c2a325752166a077e9", "imageID": "registry.redhat.io/amq7/amq-interconnect@sha256:06ac9dd1544cec3885a8362c7685d6c5bb22aab0e46d476480b463b699ebc192", "lastState": {}, "name": "default-interconnect", "ready": true, "restartCount": 0, "started": true, "state": {"running": {"startedAt": "2025-10-06T00:29:28Z"}}}], "hostIP": "192.168.126.11", "hostIPs": [{"ip": "192.168.126.11"}], "phase": "Running", "podIP": "10.217.0.80", "podIPs": [{"ip": "10.217.0.80"}], "qosClass": "BestEffort", "startTime": "2025-10-06T00:29:20Z"}}, "method": "delete", "result": {"apiVersion": "v1", "kind": "Pod", "metadata": {"annotations": {"k8s.ovn.org/pod-networks": "{\"default\":{\"ip_addresses\":[\"10.217.0.80/23\"],\"mac_address\":\"0a:58:0a:d9:00:50\",\"gateway_ips\":[\"10.217.0.1\"],\"routes\":[{\"dest\":\"10.217.0.0/22\",\"nextHop\":\"10.217.0.1\"},{\"dest\":\"10.217.4.0/23\",\"nextHop\":\"10.217.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.217.0.1\"}],\"ip_address\":\"10.217.0.80/23\",\"gateway_ip\":\"10.217.0.1\"}}", "k8s.v1.cni.cncf.io/network-status": "[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.217.0.80\"\n ],\n \"mac\": \"0a:58:0a:d9:00:50\",\n \"default\": true,\n \"dns\": {}\n}]", "openshift.io/scc": "restricted-v2", "prometheus.io/port": "8888", "prometheus.io/scrape": "true", "seccomp.security.alpha.kubernetes.io/pod": "runtime/default"}, "creationTimestamp": "2025-10-06T00:29:20Z", "deletionGracePeriodSeconds": 30, "deletionTimestamp": "2025-10-06T00:31:09Z", "generateName": "default-interconnect-84dbc59cb8-", "labels": {"application": "default-interconnect", "com.company": "Red_Hat", "interconnect_cr": "default-interconnect", "pod-template-hash": "84dbc59cb8", "rht.comp": "Interconnect", "rht.comp_t": "application", "rht.comp_ver": "1.10", "rht.prod_name": "Red_Hat_Integration", "rht.prod_ver": "2021.Q4"}, "managedFields": [{"apiVersion": "v1", "fieldsType": "FieldsV1", "fieldsV1": {"f:metadata": {"f:annotations": {"f:k8s.ovn.org/pod-networks": {}}}}, "manager": "crc", "operation": "Update", "subresource": "status", "time": "2025-10-06T00:29:20Z"}, {"apiVersion": "v1", "fieldsType": "FieldsV1", "fieldsV1": {"f:metadata": {"f:annotations": {".": {}, "f:prometheus.io/port": {}, "f:prometheus.io/scrape": {}}, "f:generateName": {}, "f:labels": {".": {}, "f:application": {}, "f:com.company": {}, "f:interconnect_cr": {}, "f:pod-template-hash": {}, "f:rht.comp": {}, "f:rht.comp_t": {}, "f:rht.comp_ver": {}, "f:rht.prod_name": {}, "f:rht.prod_ver": {}}, "f:ownerReferences": {".": {}, "k:{\"uid\":\"375d7478-001f-4869-af32-068f3be5f020\"}": {}}}, "f:spec": {"f:affinity": {".": {}, "f:podAntiAffinity": {".": {}, "f:requiredDuringSchedulingIgnoredDuringExecution": {}}}, "f:containers": {"k:{\"name\":\"default-interconnect\"}": {".": {}, "f:env": {".": {}, "k:{\"name\":\"APPLICATION_NAME\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"POD_COUNT\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"POD_IP\"}": {".": {}, "f:name": {}, "f:valueFrom": {".": {}, "f:fieldRef": {}}}, "k:{\"name\":\"POD_NAMESPACE\"}": {".": {}, "f:name": {}, "f:valueFrom": {".": {}, "f:fieldRef": {}}}, "k:{\"name\":\"QDROUTERD_AUTO_CREATE_SASLDB_PATH\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"QDROUTERD_AUTO_CREATE_SASLDB_SOURCE\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"QDROUTERD_AUTO_MESH_DISCOVERY\"}": {".": {}, "f:name": {}, "f:value": {}}, "k:{\"name\":\"QDROUTERD_CONF\"}": {".": {}, "f:name": {}, "f:value": {}}}, "f:image": {}, "f:imagePullPolicy": {}, "f:livenessProbe": {".": {}, "f:failureThreshold": {}, "f:httpGet": {".": {}, "f:path": {}, "f:port": {}, "f:scheme": {}}, "f:initialDelaySeconds": {}, "f:periodSeconds": {}, "f:successThreshold": {}, "f:timeoutSeconds": {}}, "f:name": {}, "f:ports": {".": {}, "k:{\"containerPort\":55671,\"protocol\":\"TCP\"}": {".": {}, "f:containerPort": {}, "f:name": {}, "f:protocol": {}}, "k:{\"containerPort\":5672,\"protocol\":\"TCP\"}": {".": {}, "f:containerPort": {}, "f:name": {}, "f:protocol": {}}}, "f:resources": {}, "f:terminationMessagePath": {}, "f:terminationMessagePolicy": {}, "f:volumeMounts": {".": {}, "k:{\"mountPath\":\"/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/qpid-dispatch/sasl-users\"}": {".": {}, "f:mountPath": {}, "f:name": {}}, "k:{\"mountPath\":\"/etc/sasl2\"}": {".": {}, "f:mountPath": {}, "f:name": {}}}}}, "f:dnsPolicy": {}, "f:enableServiceLinks": {}, "f:restartPolicy": {}, "f:schedulerName": {}, "f:securityContext": {}, "f:serviceAccount": {}, "f:serviceAccountName": {}, "f:terminationGracePeriodSeconds": {}, "f:volumes": {".": {}, "k:{\"name\":\"default-interconnect-inter-router-ca\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}, "k:{\"name\":\"default-interconnect-inter-router-credentials\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}, "k:{\"name\":\"default-interconnect-openstack-ca\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}, "k:{\"name\":\"default-interconnect-openstack-credentials\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}, "k:{\"name\":\"sasl-config\"}": {".": {}, "f:configMap": {".": {}, "f:defaultMode": {}, "f:name": {}}, "f:name": {}}, "k:{\"name\":\"sasl-users\"}": {".": {}, "f:name": {}, "f:secret": {".": {}, "f:defaultMode": {}, "f:secretName": {}}}}}}, "manager": "kube-controller-manager", "operation": "Update", "time": "2025-10-06T00:29:20Z"}, {"apiVersion": "v1", "fieldsType": "FieldsV1", "fieldsV1": {"f:metadata": {"f:annotations": {"f:k8s.v1.cni.cncf.io/network-status": {}}}}, "manager": "multus-daemon", "operation": "Update", "subresource": "status", "time": "2025-10-06T00:29:21Z"}, {"apiVersion": "v1", "fieldsType": "FieldsV1", "fieldsV1": {"f:status": {"f:conditions": {"k:{\"type\":\"ContainersReady\"}": {".": {}, "f:lastProbeTime": {}, "f:lastTransitionTime": {}, "f:status": {}, "f:type": {}}, "k:{\"type\":\"Initialized\"}": {".": {}, "f:lastProbeTime": {}, "f:lastTransitionTime": {}, "f:status": {}, "f:type": {}}, "k:{\"type\":\"PodReadyToStartContainers\"}": {".": {}, "f:lastProbeTime": {}, "f:lastTransitionTime": {}, "f:status": {}, "f:type": {}}, "k:{\"type\":\"Ready\"}": {".": {}, "f:lastProbeTime": {}, "f:lastTransitionTime": {}, "f:status": {}, "f:type": {}}}, "f:containerStatuses": {}, "f:hostIP": {}, "f:hostIPs": {}, "f:phase": {}, "f:podIP": {}, "f:podIPs": {".": {}, "k:{\"ip\":\"10.217.0.80\"}": {".": {}, "f:ip": {}}}, "f:startTime": {}}}, "manager": "kubelet", "operation": "Update", "subresource": "status", "time": "2025-10-06T00:29:28Z"}], "name": "default-interconnect-84dbc59cb8-k884q", "namespace": "service-telemetry", "ownerReferences": [{"apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "default-interconnect-84dbc59cb8", "uid": "375d7478-001f-4869-af32-068f3be5f020"}], "resourceVersion": "51409", "uid": "bce880f5-86a7-40d7-9b04-9ff0a63edf09"}, "spec": {"affinity": {"podAntiAffinity": {"requiredDuringSchedulingIgnoredDuringExecution": [{"labelSelector": {"matchExpressions": [{"key": "application", "operator": "In", "values": ["default-interconnect"]}]}, "topologyKey": "kubernetes.io/hostname"}]}}, "containers": [{"env": [{"name": "APPLICATION_NAME", "value": "default-interconnect"}, {"name": "QDROUTERD_CONF", "value": "\nrouter {\n mode: interior\n id: ${HOSTNAME}\n}\n\nlistener {\n host: 127.0.0.1\n port: 5672\n role: normal\n}\nlistener {\n name: health-and-stats\n port: 8888\n http: true\n healthz: true\n metrics: true\n websockets: false\n httpRootDir: invalid\n}\n\nlistener {\n role: inter-router\n port: 55671\n saslMechanisms: EXTERNAL\n authenticatePeer: true\n sslProfile: inter-router\n}\n\nlistener {\n role: edge\n port: 5671\n saslMechanisms: PLAIN\n authenticatePeer: true\n sslProfile: openstack\n}\nlistener {\n role: edge\n port: 5673\n linkCapacity: 25000\n}\n\nsslProfile {\n name: openstack\n certFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials/tls.crt\n privateKeyFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials/tls.key\n caCertFile: /etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca/tls.crt\n}\nsslProfile {\n name: inter-router\n certFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials/tls.crt\n privateKeyFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials/tls.key\n caCertFile: /etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca/tls.crt\n}\n\naddress {\n prefix: closest\n distribution: closest\n}\naddress {\n prefix: multicast\n distribution: multicast\n}\naddress {\n prefix: unicast\n distribution: closest\n}\naddress {\n prefix: exclusive\n distribution: closest\n}\naddress {\n prefix: broadcast\n distribution: multicast\n}\naddress {\n prefix: collectd\n distribution: multicast\n}\naddress {\n prefix: ceilometer\n distribution: multicast\n}\n\n\n\n\n"}, {"name": "QDROUTERD_AUTO_CREATE_SASLDB_SOURCE", "value": "/etc/qpid-dispatch/sasl-users/"}, {"name": "QDROUTERD_AUTO_CREATE_SASLDB_PATH", "value": "/tmp/qdrouterd.sasldb"}, {"name": "POD_COUNT", "value": "1"}, {"name": "POD_NAMESPACE", "valueFrom": {"fieldRef": {"apiVersion": "v1", "fieldPath": "metadata.namespace"}}}, {"name": "POD_IP", "valueFrom": {"fieldRef": {"apiVersion": "v1", "fieldPath": "status.podIP"}}}, {"name": "QDROUTERD_AUTO_MESH_DISCOVERY", "value": "QUERY"}], "image": "registry.redhat.io/amq7/amq-interconnect@sha256:31d87473fa684178a694f9ee331d3c80f2653f9533cb65c2a325752166a077e9", "imagePullPolicy": "IfNotPresent", "livenessProbe": {"failureThreshold": 3, "httpGet": {"path": "/healthz", "port": 8888, "scheme": "HTTP"}, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1}, "name": "default-interconnect", "ports": [{"containerPort": 5672, "name": "port-5672", "protocol": "TCP"}, {"containerPort": 55671, "name": "port-55671", "protocol": "TCP"}], "resources": {}, "securityContext": {"allowPrivilegeEscalation": false, "capabilities": {"drop": ["ALL"]}, "runAsNonRoot": true, "runAsUser": 1000660000}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [{"mountPath": "/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-credentials", "name": "default-interconnect-openstack-credentials"}, {"mountPath": "/etc/qpid-dispatch-certs/openstack/default-interconnect-openstack-ca", "name": "default-interconnect-openstack-ca"}, {"mountPath": "/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-credentials", "name": "default-interconnect-inter-router-credentials"}, {"mountPath": "/etc/qpid-dispatch-certs/inter-router/default-interconnect-inter-router-ca", "name": "default-interconnect-inter-router-ca"}, {"mountPath": "/etc/qpid-dispatch/sasl-users", "name": "sasl-users"}, {"mountPath": "/etc/sasl2", "name": "sasl-config"}, {"mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-htb8z", "readOnly": true}]}], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "crc", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {"fsGroup": 1000660000, "seLinuxOptions": {"level": "s0:c26,c5"}, "seccompProfile": {"type": "RuntimeDefault"}}, "serviceAccount": "default-interconnect", "serviceAccountName": "default-interconnect", "terminationGracePeriodSeconds": 30, "tolerations": [{"effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300}, {"effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300}], "volumes": [{"name": "default-interconnect-openstack-credentials", "secret": {"defaultMode": 420, "secretName": "default-interconnect-openstack-credentials"}}, {"name": "default-interconnect-openstack-ca", "secret": {"defaultMode": 420, "secretName": "default-interconnect-openstack-ca"}}, {"name": "default-interconnect-inter-router-credentials", "secret": {"defaultMode": 420, "secretName": "default-interconnect-inter-router-credentials"}}, {"name": "default-interconnect-inter-router-ca", "secret": {"defaultMode": 420, "secretName": "default-interconnect-inter-router-ca"}}, {"name": "sasl-users", "secret": {"defaultMode": 420, "secretName": "default-interconnect-users"}}, {"configMap": {"defaultMode": 420, "name": "default-interconnect-sasl-config"}, "name": "sasl-config"}, {"name": "kube-api-access-htb8z", "projected": {"defaultMode": 420, "sources": [{"serviceAccountToken": {"expirationSeconds": 3607, "path": "token"}}, {"configMap": {"items": [{"key": "ca.crt", "path": "ca.crt"}], "name": "kube-root-ca.crt"}}, {"downwardAPI": {"items": [{"fieldRef": {"apiVersion": "v1", "fieldPath": "metadata.namespace"}, "path": "namespace"}]}}, {"configMap": {"items": [{"key": "service-ca.crt", "path": "service-ca.crt"}], "name": "openshift-service-ca.crt"}}]}}]}, "status": {"conditions": [{"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:28Z", "status": "True", "type": "PodReadyToStartContainers"}, {"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:20Z", "status": "True", "type": "Initialized"}, {"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:28Z", "status": "True", "type": "Ready"}, {"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:28Z", "status": "True", "type": "ContainersReady"}, {"lastProbeTime": null, "lastTransitionTime": "2025-10-06T00:29:20Z", "status": "True", "type": "PodScheduled"}], "containerStatuses": [{"containerID": "cri-o://e10be8b6749609a1ec4201b2736ade003b983f4449b615e4be4946ffde1f31c8", "image": "registry.redhat.io/amq7/amq-interconnect@sha256:31d87473fa684178a694f9ee331d3c80f2653f9533cb65c2a325752166a077e9", "imageID": "registry.redhat.io/amq7/amq-interconnect@sha256:06ac9dd1544cec3885a8362c7685d6c5bb22aab0e46d476480b463b699ebc192", "lastState": {}, "name": "default-interconnect", "ready": true, "restartCount": 0, "started": true, "state": {"running": {"startedAt": "2025-10-06T00:29:28Z"}}}], "hostIP": "192.168.126.11", "hostIPs": [{"ip": "192.168.126.11"}], "phase": "Running", "podIP": "10.217.0.80", "podIPs": [{"ip": "10.217.0.80"}], "qosClass": "BestEffort", "startTime": "2025-10-06T00:29:20Z"}}} ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create QDR instance] ********************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:271 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:39Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create QDR instance"} {"level":"info","ts":"2025-10-06T00:30:40Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/interconnectedcloud.github.io/v1alpha1/namespaces/service-telemetry/interconnects/default-interconnect","Verb":"get","APIPrefix":"apis","APIGroup":"interconnectedcloud.github.io","APIVersion":"v1alpha1","Namespace":"service-telemetry","Resource":"interconnects","Subresource":"","Name":"default-interconnect","Parts":["interconnects","default-interconnect"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Setup Certificates for metrics components] ************ task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:26 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:41Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Setup Certificates for metrics components"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create configmap for OAUTH CA certs] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:41Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create configmap for OAUTH CA certs"} {"level":"info","ts":"2025-10-06T00:30:42Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/configmaps/serving-certs-ca-bundle","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"configmaps","Subresource":"","Name":"serving-certs-ca-bundle","Parts":["configmaps","serving-certs-ca-bundle"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Check for existing cookie secret] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:12 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:42Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Check for existing cookie secret"} {"level":"info","ts":"2025-10-06T00:30:43Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/default-session-secret","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"default-session-secret","Parts":["secrets","default-session-secret"]}} {"level":"info","ts":"2025-10-06T00:30:43Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create cookie secret"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create cookie secret] ********************************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:20 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Prometheus instance] *************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:48 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:43Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create Prometheus instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/prometheus-stf with oauth redirect annotation] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:10 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:43Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ServiceAccount/prometheus-stf with oauth redirect annotation"} {"level":"info","ts":"2025-10-06T00:30:44Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/serviceaccounts/prometheus-stf","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"serviceaccounts","Subresource":"","Name":"prometheus-stf","Parts":["serviceaccounts","prometheus-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRole/prometheus-stf for non-resource URL /metrics access] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:21 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:44Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ClusterRole/prometheus-stf for non-resource URL /metrics access"} {"level":"info","ts":"2025-10-06T00:30:45Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ClusterRoleBinding/prometheus-stf"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRoleBinding/prometheus-stf] ************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:64 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Role/prometheus-stf for Prometheus operations] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:83 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:46Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create Role/prometheus-stf for Prometheus operations"} {"level":"info","ts":"2025-10-06T00:30:47Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/roles/prometheus-stf","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"roles","Subresource":"","Name":"prometheus-stf","Parts":["roles","prometheus-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create RoleBinding/prometheus-stf] ******************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:152 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:47Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create RoleBinding/prometheus-stf"} {"level":"info","ts":"2025-10-06T00:30:48Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/rolebindings/prometheus-stf","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"rolebindings","Subresource":"","Name":"prometheus-stf","Parts":["rolebindings","prometheus-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove old ClusterRoleBinding for prometheus-k8s using CMO roleRef] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:172 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:48Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Remove old ClusterRoleBinding for prometheus-k8s using CMO roleRef"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "monitoring.rhobs/v1",  "kind": "Prometheus",  "metadata": {  "labels": {  "app.kubernetes.io/managed-by": "observability-operator",  "prometheus": "default"  },  "name": "default",  "namespace": "service-telemetry"  },  "spec": {  "alerting": {  "alertmanagers": [  {  "bearerTokenFile": "/var/run/secrets/kubernetes.io/serviceaccount/token",  "name": "default-alertmanager-proxy",  "namespace": "service-telemetry",  "port": "web",  "scheme": "https",  "tlsConfig": {  "caFile": "/etc/prometheus/configmaps/serving-certs-ca-bundle/service-ca.crt",  "serverName": "default-alertmanager-proxy.service-telemetry.svc"  }  }  ]  },  "configMaps": [  "serving-certs-ca-bundle"  ],  "containers": [  {  "args": [  "-https-address=:9092",  "-tls-cert=/etc/tls/private/tls.crt",  "-tls-key=/etc/tls/private/tls.key",  "-upstream=http://localhost:9090/",  "-cookie-secret-file=/etc/proxy/secrets/session_secret",  "-openshift-service-account=prometheus-stf",  "-openshift-sar={\"namespace\":\"service-telemetry\",\"resource\": \"prometheuses\", \"resourceAPIGroup\":\"monitoring.rhobs\", \"verb\":\"get\"}",  "-openshift-delegate-urls={\"/\":{\"namespace\":\"service-telemetry\",\"resource\": \"prometheuses\", \"group\":\"monitoring.rhobs\", \"verb\":\"get\"}}"  ],  "image": "quay.io/openshift/origin-oauth-proxy:latest",  "name": "oauth-proxy",  "ports": [  {  "containerPort": 9092,  "name": "https",  "protocol": "TCP"  }  ],  "volumeMounts": [  {  "mountPath": "/etc/tls/private",  "name": "secret-default-prometheus-proxy-tls"  },  {  "mountPath": "/etc/proxy/secrets",  "name": "secret-default-session-secret"  }  ]  }  ],  "image": "quay.io/prometheus/prometheus:latest",  "listenLocal": true,  "podMetadata": {  "annotations": null,  "labels": {  "prometheus": "default"  }  },  "replicas": 1,  "retention": "24h",  "ruleSelector": {},  "scrapeConfigSelector": {  "matchLabels": {  "app": "smart-gateway"  }  },  "secrets": [  "default-prometheus-proxy-tls",  "default-session-secret"  ],  "securityContext": {},  "serviceAccountName": "prometheus-stf",  "storage": {  "volumeClaimTemplate": {  "spec": {  "resources": {  "requests": {  "storage": "20G"  }  },  "storageClassName": "crc-csi-hostpath-provisioner"  }  }  },  "version": null  }  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:49Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of Prometheus] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:191 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:49Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an instance of Prometheus"} {"level":"info","ts":"2025-10-06T00:30:50Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/monitoring.rhobs/v1/namespaces/service-telemetry/prometheuses/default","Verb":"get","APIPrefix":"apis","APIGroup":"monitoring.rhobs","APIVersion":"v1","Namespace":"service-telemetry","Resource":"prometheuses","Subresource":"","Name":"default","Parts":["prometheuses","default"]}} {"level":"info","ts":"2025-10-06T00:30:50Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Ensure no community Prometheus is installed if not using community operator"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no community Prometheus is installed if not using community operator] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:197 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:51Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Prometheus, service-telemetry/default"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no rhobs Prometheus is installed if not using it] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:207 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:51Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Ensure no rhobs Prometheus is installed if not using it"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create service to access the prometheus proxy] ******** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:223 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:51Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create service to access the prometheus proxy"} {"level":"info","ts":"2025-10-06T00:30:52Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/services/default-prometheus-proxy","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"services","Subresource":"","Name":"default-prometheus-proxy","Parts":["services","default-prometheus-proxy"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create route to access the prometheus proxy] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:234 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:52Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create route to access the prometheus proxy"} {"level":"info","ts":"2025-10-06T00:30:53Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/route.openshift.io/v1/namespaces/service-telemetry/routes/default-prometheus-proxy","Verb":"get","APIPrefix":"apis","APIGroup":"route.openshift.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"routes","Subresource":"","Name":"default-prometheus-proxy","Parts":["routes","default-prometheus-proxy"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Prometheus read-only user] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:50 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:53Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create Prometheus read-only user"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/stf-prometheus-reader] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:53Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ServiceAccount/stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:30:54Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/serviceaccounts/stf-prometheus-reader","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"serviceaccounts","Subresource":"","Name":"stf-prometheus-reader","Parts":["serviceaccounts","stf-prometheus-reader"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create prometheus-reader Role] ************************ task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:11 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:54Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create prometheus-reader Role"} {"level":"info","ts":"2025-10-06T00:30:55Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/roles/prometheus-reader","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"roles","Subresource":"","Name":"prometheus-reader","Parts":["roles","prometheus-reader"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create prometheus-reader RoleBinding for stf-prometheus-reader] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:30 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:55Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create prometheus-reader RoleBinding for stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:30:56Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/rolebindings/stf-prometheus-reader","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"rolebindings","Subresource":"","Name":"stf-prometheus-reader","Parts":["rolebindings","stf-prometheus-reader"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for stf-prometheus-reader] ***** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:47 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:56Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an access token for stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:30:57Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/stf-prometheus-reader-token","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"stf-prometheus-reader-token","Parts":["secrets","stf-prometheus-reader-token"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Alertmanager instance] ************************* task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:54 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:57Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create Alertmanager instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "monitoring.rhobs/v1",  "kind": "Alertmanager",  "metadata": {  "labels": {  "alertmanager": "default",  "app.kubernetes.io/managed-by": "observability-operator"  },  "name": "default",  "namespace": "service-telemetry"  },  "spec": {  "containers": [  {  "args": [  "-https-address=:9095",  "-tls-cert=/etc/tls/private/tls.crt",  "-tls-key=/etc/tls/private/tls.key",  "-upstream=http://localhost:9093/",  "-cookie-secret-file=/etc/proxy/secrets/session_secret",  "-openshift-service-account=alertmanager-stf",  "-openshift-sar={\"namespace\":\"service-telemetry\", \"resource\": \"alertmanagers\", \"resourceAPIGroup\":\"monitoring.rhobs\", \"verb\":\"get\"}",  "-openshift-delegate-urls={\"/\": {\"namespace\":\"service-telemetry\", \"resource\": \"alertmanagers\", \"group\":\"monitoring.rhobs\", \"verb\":\"get\"}}"  ],  "image": "quay.io/openshift/origin-oauth-proxy:latest",  "name": "oauth-proxy",  "ports": [  {  "containerPort": 9095,  "name": "https",  "protocol": "TCP"  }  ],  "volumeMounts": [  {  "mountPath": "/etc/tls/private",  "name": "secret-default-alertmanager-proxy-tls"  },  {  "mountPath": "/etc/proxy/secrets",  "name": "secret-default-session-secret"  }  ]  }  ],  "image": "quay.io/prometheus/alertmanager:latest",  "listenLocal": true,  "podMetadata": {  "labels": {  "alertmanager": "default"  }  },  "replicas": 1,  "scrapeConfigSelector": {  "matchLabels": {  "app": "smart-gateway"  }  },  "secrets": [  "default-alertmanager-proxy-tls",  "default-session-secret"  ],  "serviceAccountName": "alertmanager-stf",  "storage": {  "volumeClaimTemplate": {  "spec": {  "resources": {  "requests": {  "storage": "20G"  }  },  "storageClassName": "crc-csi-hostpath-provisioner"  }  }  }  }  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:58Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup alertmanager configuration template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "v1",  "kind": "Secret",  "metadata": {  "name": "alertmanager-default",  "namespace": "service-telemetry"  },  "stringData": {  "alertmanager.yaml": "global:\n resolve_timeout: 5m\nroute:\n group_by: ['job']\n group_wait: 30s\n group_interval: 5m\n repeat_interval: 12h\n receiver: 'snmp_wh'\nreceivers:\n- name: 'snmp_wh'\n webhook_configs:\n - url: 'http://default-prometheus-webhook-snmp:9099'"  },  "type": "Opaque"  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:58Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an Alertmanager configuration secret] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:58Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an Alertmanager configuration secret"} {"level":"info","ts":"2025-10-06T00:30:59Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/alertmanager-default","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"alertmanager-default","Parts":["secrets","alertmanager-default"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of Alertmanager] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:25 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:30:59Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an instance of Alertmanager"} {"level":"info","ts":"2025-10-06T00:31:00Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/monitoring.rhobs/v1/namespaces/service-telemetry/alertmanagers/default","Verb":"get","APIPrefix":"apis","APIGroup":"monitoring.rhobs","APIVersion":"v1","Namespace":"service-telemetry","Resource":"alertmanagers","Subresource":"","Name":"default","Parts":["alertmanagers","default"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no community Alertmanager is installed if not using community operator] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:31 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:00Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Ensure no community Alertmanager is installed if not using community operator"} {"level":"info","ts":"2025-10-06T00:31:00Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Alertmanager, service-telemetry/default"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no rhobs Alertmanager is installed if not using it] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:41 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:01Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Ensure no rhobs Alertmanager is installed if not using it"} {"level":"info","ts":"2025-10-06T00:31:01Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create SNMP traps instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create SNMP traps instance] *************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:54 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:01Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "apps/v1",  "kind": "Deployment",  "metadata": {  "name": "default-snmp-webhook",  "namespace": "service-telemetry"  },  "spec": {  "replicas": 1,  "selector": {  "matchLabels": {  "app": "default-snmp-webhook"  }  },  "template": {  "metadata": {  "labels": {  "app": "default-snmp-webhook"  }  },  "spec": {  "containers": [  {  "env": [  {  "name": "SNMP_COMMUNITY",  "value": "public"  },  {  "name": "SNMP_RETRIES",  "value": "5"  },  {  "name": "SNMP_HOST",  "value": "192.168.24.254"  },  {  "name": "SNMP_PORT",  "value": "162"  },  {  "name": "SNMP_TIMEOUT",  "value": "1"  },  {  "name": "ALERT_OID_LABEL",  "value": "oid"  },  {  "name": "TRAP_OID_PREFIX",  "value": "1.3.6.1.4.1.50495.15"  },  {  "name": "TRAP_DEFAULT_OID",  "value": "1.3.6.1.4.1.50495.15.1.2.1"  },  {  "name": "TRAP_DEFAULT_SEVERITY",  "value": ""  }  ],  "image": "image-registry.openshift-image-registry.svc:5000/service-telemetry/prometheus-webhook-snmp:latest",  "name": "prometheus-webhook-snmp",  "ports": [  {  "containerPort": 9099  }  ]  }  ]  }  }  }  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:01Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an instance of snmp webhook"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of snmp webhook] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_snmp_traps.yml:10 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:02Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/apps/v1/namespaces/service-telemetry/deployments/default-snmp-webhook","Verb":"get","APIPrefix":"apis","APIGroup":"apps","APIVersion":"v1","Namespace":"service-telemetry","Resource":"deployments","Subresource":"","Name":"default-snmp-webhook","Parts":["deployments","default-snmp-webhook"]}} {"level":"info","ts":"2025-10-06T00:31:02Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an instance of snmp webhook service"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of snmp webhook service] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_snmp_traps.yml:20 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:03Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/services/default-prometheus-webhook-snmp","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"services","Subresource":"","Name":"default-prometheus-webhook-snmp","Parts":["services","default-prometheus-webhook-snmp"]}} {"level":"info","ts":"2025-10-06T00:31:03Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ServiceAccount/alertmanager-stf with oauth redirect annotation"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/alertmanager-stf with oauth redirect annotation] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:04Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/serviceaccounts/alertmanager-stf","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"serviceaccounts","Subresource":"","Name":"alertmanager-stf","Parts":["serviceaccounts","alertmanager-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRole/alertmanager-stf] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:81 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:04Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ClusterRole/alertmanager-stf"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRoleBinding/alertmanager-stf] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:120 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:05Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ClusterRoleBinding/alertmanager-stf"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Role/alertmanager-stf] ************************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:139 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:06Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create Role/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:31:07Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/roles/alertmanager-stf","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"roles","Subresource":"","Name":"alertmanager-stf","Parts":["roles","alertmanager-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create RoleBinding/alertmanager-stf] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:177 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:07Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create RoleBinding/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:31:08Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/rolebindings/alertmanager-stf","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"rolebindings","Subresource":"","Name":"alertmanager-stf","Parts":["rolebindings","alertmanager-stf"]}} {"level":"info","ts":"2025-10-06T00:31:08Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create service to access the Alertmanager proxy"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create service to access the Alertmanager proxy] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:202 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:09Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/services/default-alertmanager-proxy","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"services","Subresource":"","Name":"default-alertmanager-proxy","Parts":["services","default-alertmanager-proxy"]}} {"level":"info","ts":"2025-10-06T00:31:09Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create route to access the Alertmanager proxy"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create route to access the Alertmanager proxy] ******** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:213 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:10Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/route.openshift.io/v1/namespaces/service-telemetry/routes/default-alertmanager-proxy","Verb":"get","APIPrefix":"apis","APIGroup":"route.openshift.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"routes","Subresource":"","Name":"default-alertmanager-proxy","Parts":["routes","default-alertmanager-proxy"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Setup Certificates for ElasticSearch] ***************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:67 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:10Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Setup Certificates for ElasticSearch"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Setup ElasticSearch] ********************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:10Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Setup ElasticSearch"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Get data about clouds] ******************************** ok: [localhost] => {  "servicetelemetry_vars.clouds": [  {  "events": {  "collectors": [  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 16384,  "verbose": false  },  "collector_type": "collectd",  "debug_enabled": false,  "subscription_address": "collectd/cloud1-notify"  },  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 16384,  "verbose": false  },  "collector_type": "ceilometer",  "debug_enabled": false,  "subscription_address": "anycast/ceilometer/cloud1-event.sample"  }  ]  },  "metrics": {  "collectors": [  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 16384,  "verbose": false  },  "collector_type": "collectd",  "debug_enabled": false,  "subscription_address": "collectd/cloud1-telemetry"  },  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 16384,  "verbose": false  },  "collector_type": "ceilometer",  "debug_enabled": false,  "subscription_address": "anycast/ceilometer/cloud1-metering.sample"  },  {  "bridge": {  "ring_buffer_count": 15000,  "ring_buffer_size": 65535,  "verbose": false  },  "collector_type": "sensubility",  "debug_enabled": false,  "subscription_address": "sensubility/cloud1-telemetry"  }  ]  },  "name": "cloud1"  }  ] } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:10Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} {"level":"info","ts":"2025-10-06T00:31:10Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Loop through cloud instances to setup transport receivers"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Loop through cloud instances to setup transport receivers] *** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:83 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:10Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"4019634858265498194","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Cloud collector setup] ******************************** ok: [localhost] => {  "msg": "Working on cloud {'name': 'cloud1', 'metrics': {'collectors': [{'collector_type': 'collectd', 'subscription_address': 'collectd/cloud1-telemetry', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 16384, 'ring_buffer_count': 15000, 'verbose': False}}, {'collector_type': 'ceilometer', 'subscription_address': 'anycast/ceilometer/cloud1-metering.sample', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 16384, 'ring_buffer_count': 15000, 'verbose': False}}, {'collector_type': 'sensubility', 'subscription_address': 'sensubility/cloud1-telemetry', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 65535, 'ring_buffer_count': 15000, 'verbose': False}}]}, 'events': {'collectors': [{'collector_type': 'collectd', 'subscription_address': 'collectd/cloud1-notify', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 16384, 'ring_buffer_count': 15000, 'verbose': False}}, {'collector_type': 'ceilometer', 'subscription_address': 'anycast/ceilometer/cloud1-event.sample', 'debug_enabled': False, 'bridge': {'ring_buffer_size': 16384, 'ring_buffer_count': 15000, 'verbose': False}}]}} to setup metrics and events Smart Gateways\n" } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:10Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy Metrics Smart Gateway instance for each collector"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy Metrics Smart Gateway instance for each collector] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:6 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:10Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} {"level":"info","ts":"2025-10-06T00:31:11Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/smartgateway.infra.watch/v2/namespaces/service-telemetry/smartgateways/default-cloud1-coll-meter","Verb":"get","APIPrefix":"apis","APIGroup":"smartgateway.infra.watch","APIVersion":"v2","Namespace":"service-telemetry","Resource":"smartgateways","Subresource":"","Name":"default-cloud1-coll-meter","Parts":["smartgateways","default-cloud1-coll-meter"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:11Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:11Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs"} {"level":"info","ts":"2025-10-06T00:31:12Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/prometheus-stf-token","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"prometheus-stf-token","Parts":["secrets","prometheus-stf-token"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ScrapeConfig to scrape Smart Gateway] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:64 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:13Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ScrapeConfig to scrape Smart Gateway"} {"level":"info","ts":"2025-10-06T00:31:14Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/monitoring.rhobs/v1alpha1/namespaces/service-telemetry/scrapeconfigs/default-cloud1-coll-meter","Verb":"get","APIPrefix":"apis","APIGroup":"monitoring.rhobs","APIVersion":"v1alpha1","Namespace":"service-telemetry","Resource":"scrapeconfigs","Subresource":"","Name":"default-cloud1-coll-meter","Parts":["scrapeconfigs","default-cloud1-coll-meter"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ScrapeConfig if provided] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:14Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create additional ScrapeConfig if provided"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ServiceMonitor if provided (legacy)] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:14Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create additional ServiceMonitor if provided (legacy)"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove (legacy) default ServiceMonitors] ************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:14Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Remove (legacy) default ServiceMonitors"} {"level":"info","ts":"2025-10-06T00:31:16Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1, Kind=ServiceMonitor, service-telemetry/default-cloud1-coll-meter"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:16Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} {"level":"info","ts":"2025-10-06T00:31:17Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/smartgateway.infra.watch/v2/namespaces/service-telemetry/smartgateways/default-cloud1-ceil-meter","Verb":"get","APIPrefix":"apis","APIGroup":"smartgateway.infra.watch","APIVersion":"v2","Namespace":"service-telemetry","Resource":"smartgateways","Subresource":"","Name":"default-cloud1-ceil-meter","Parts":["smartgateways","default-cloud1-ceil-meter"]}} {"level":"info","ts":"2025-10-06T00:31:17Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:17Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs"} {"level":"info","ts":"2025-10-06T00:31:18Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/prometheus-stf-token","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"prometheus-stf-token","Parts":["secrets","prometheus-stf-token"]}} {"level":"info","ts":"2025-10-06T00:31:18Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ScrapeConfig to scrape Smart Gateway"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ScrapeConfig to scrape Smart Gateway] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:64 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:19Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/monitoring.rhobs/v1alpha1/namespaces/service-telemetry/scrapeconfigs/default-cloud1-ceil-meter","Verb":"get","APIPrefix":"apis","APIGroup":"monitoring.rhobs","APIVersion":"v1alpha1","Namespace":"service-telemetry","Resource":"scrapeconfigs","Subresource":"","Name":"default-cloud1-ceil-meter","Parts":["scrapeconfigs","default-cloud1-ceil-meter"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ScrapeConfig if provided] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:19Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create additional ScrapeConfig if provided"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ServiceMonitor if provided (legacy)] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:19Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create additional ServiceMonitor if provided (legacy)"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove (legacy) default ServiceMonitors] ************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:20Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Remove (legacy) default ServiceMonitors"} {"level":"info","ts":"2025-10-06T00:31:21Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1, Kind=ServiceMonitor, service-telemetry/default-cloud1-ceil-meter"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:21Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} {"level":"info","ts":"2025-10-06T00:31:22Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/smartgateway.infra.watch/v2/namespaces/service-telemetry/smartgateways/default-cloud1-sens-meter","Verb":"get","APIPrefix":"apis","APIGroup":"smartgateway.infra.watch","APIVersion":"v2","Namespace":"service-telemetry","Resource":"smartgateways","Subresource":"","Name":"default-cloud1-sens-meter","Parts":["smartgateways","default-cloud1-sens-meter"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:22Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:22Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create an access token for prometheus-stf to use in scrapeconfigs"} {"level":"info","ts":"2025-10-06T00:31:23Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/prometheus-stf-token","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"prometheus-stf-token","Parts":["secrets","prometheus-stf-token"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ScrapeConfig to scrape Smart Gateway] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:64 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:23Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create ScrapeConfig to scrape Smart Gateway"} {"level":"info","ts":"2025-10-06T00:31:24Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/monitoring.rhobs/v1alpha1/namespaces/service-telemetry/scrapeconfigs/default-cloud1-sens-meter","Verb":"get","APIPrefix":"apis","APIGroup":"monitoring.rhobs","APIVersion":"v1alpha1","Namespace":"service-telemetry","Resource":"scrapeconfigs","Subresource":"","Name":"default-cloud1-sens-meter","Parts":["scrapeconfigs","default-cloud1-sens-meter"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ScrapeConfig if provided] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:24Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create additional ScrapeConfig if provided"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create additional ServiceMonitor if provided (legacy)] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:24Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Create additional ServiceMonitor if provided (legacy)"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove (legacy) default ServiceMonitors] ************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_scrapeconfig.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:24Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Remove (legacy) default ServiceMonitors"} {"level":"info","ts":"2025-10-06T00:31:25Z","logger":"proxy","msg":"Cache miss: monitoring.rhobs/v1, Kind=ServiceMonitor, service-telemetry/default-cloud1-sens-meter"} {"level":"info","ts":"2025-10-06T00:31:25Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Lookup Elasticsearch BasicAuth"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Lookup Elasticsearch BasicAuth] *********************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:24 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:26Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/elasticsearch-es-elastic-user","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"elasticsearch-es-elastic-user","Parts":["secrets","elasticsearch-es-elastic-user"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get the Elasticsearch TLS materials secret] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:52 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:26Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Get the Elasticsearch TLS materials secret"} {"level":"info","ts":"2025-10-06T00:31:27Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/elasticsearch-es-cert","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"elasticsearch-es-cert","Parts":["secrets","elasticsearch-es-cert"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Load dummy certs] ************************************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:62 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:27Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Load dummy certs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Augment the secret with dummy TLS cert/key if no TLS user auth material provided] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:66 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:27Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Augment the secret with dummy TLS cert/key if no TLS user auth material provided"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy Events Smart Gateway instance for each collector] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_clouds.yml:78 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:27Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy Events Smart Gateway instance for each collector"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:27Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} {"level":"info","ts":"2025-10-06T00:31:28Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/smartgateway.infra.watch/v2/namespaces/service-telemetry/smartgateways/default-cloud1-coll-event","Verb":"get","APIPrefix":"apis","APIGroup":"smartgateway.infra.watch","APIVersion":"v2","Namespace":"service-telemetry","Resource":"smartgateways","Subresource":"","Name":"default-cloud1-coll-event","Parts":["smartgateways","default-cloud1-coll-event"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:28Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy instance of Smart Gateway] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:5 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:28Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy instance of Smart Gateway"} {"level":"info","ts":"2025-10-06T00:31:29Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/smartgateway.infra.watch/v2/namespaces/service-telemetry/smartgateways/default-cloud1-ceil-event","Verb":"get","APIPrefix":"apis","APIGroup":"smartgateway.infra.watch","APIVersion":"v2","Namespace":"service-telemetry","Resource":"smartgateways","Subresource":"","Name":"default-cloud1-ceil-event","Parts":["smartgateways","default-cloud1-ceil-event"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/base_smartgateway.yml:9 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:29Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Deploy SG-specific ScrapeConfig for metrics SGs"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Start graphing component plays] *********************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:98 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:29Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Start graphing component plays"} {"level":"info","ts":"2025-10-06T00:31:29Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Post-setup"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Post-setup] ******************************************* task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:104 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove unlisted Smart Gateway] ************************ task path: /opt/ansible/roles/servicetelemetry/tasks/post.yml:20 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:30Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"4019634858265498194","EventData.Name":"servicetelemetry : Remove unlisted Smart Gateway"} {"level":"info","ts":"2025-10-06T00:31:30Z","logger":"runner","msg":"Ansible-runner exited successfully","job":"4019634858265498194","name":"default","namespace":"service-telemetry"} ----- Ansible Task Status Event StdOut (infra.watch/v1beta1, Kind=ServiceTelemetry, default/service-telemetry) ----- PLAY RECAP ********************************************************************* localhost : ok=128  changed=3  unreachable=0 failed=0 skipped=35  rescued=0 ignored=0 ---------- --------------------------- Ansible Task StdOut ------------------------------- TASK [Installing service telemetry] ******************************** ok: [localhost] => {  "msg": "INSTALLING SERVICE TELEMETRY" } ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Pre-setup] ******************************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:7 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:31Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"8368802926475675080","EventData.TaskArgs":""} {"level":"info","ts":"2025-10-06T00:31:31Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Pre-setup"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Clear the fact cache before looking up cluster information] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:31Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Clear the fact cache before looking up cluster information"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Show existing API groups available to us] ******************************** ok: [localhost] => {  "api_groups": [  "",  "apiregistration.k8s.io",  "apps",  "events.k8s.io",  "authentication.k8s.io",  "authorization.k8s.io",  "autoscaling",  "batch",  "certificates.k8s.io",  "networking.k8s.io",  "policy",  "rbac.authorization.k8s.io",  "storage.k8s.io",  "admissionregistration.k8s.io",  "apiextensions.k8s.io",  "scheduling.k8s.io",  "coordination.k8s.io",  "node.k8s.io",  "discovery.k8s.io",  "flowcontrol.apiserver.k8s.io",  "apps.openshift.io",  "authorization.openshift.io",  "build.openshift.io",  "image.openshift.io",  "oauth.openshift.io",  "project.openshift.io",  "quota.openshift.io",  "route.openshift.io",  "security.openshift.io",  "template.openshift.io",  "user.openshift.io",  "packages.operators.coreos.com",  "config.openshift.io",  "operator.openshift.io",  "acme.cert-manager.io",  "apiserver.openshift.io",  "apm.k8s.elastic.co",  "autoscaling.openshift.io",  "cert-manager.io",  "console.openshift.io",  "elasticsearch.k8s.elastic.co",  "enterprisesearch.k8s.elastic.co",  "imageregistry.operator.openshift.io",  "ingress.operator.openshift.io",  "k8s.cni.cncf.io",  "k8s.ovn.org",  "kibana.k8s.elastic.co",  "machine.openshift.io",  "machineconfiguration.openshift.io",  "monitoring.coreos.com",  "monitoring.openshift.io",  "monitoring.rhobs",  "network.operator.openshift.io",  "operators.coreos.com",  "samples.operator.openshift.io",  "security.internal.openshift.io",  "agent.k8s.elastic.co",  "autoscaling.k8s.elastic.co",  "controlplane.operator.openshift.io",  "interconnectedcloud.github.io",  "ipam.cluster.x-k8s.io",  "logstash.k8s.elastic.co",  "maps.k8s.elastic.co",  "migration.k8s.io",  "observability.openshift.io",  "perses.dev",  "policy.networking.k8s.io",  "stackconfigpolicy.k8s.elastic.co",  "whereabouts.cni.cncf.io",  "infrastructure.cluster.x-k8s.io",  "beat.k8s.elastic.co",  "helm.openshift.io",  "infra.watch",  "smartgateway.infra.watch"  ] } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:31Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"8368802926475675080","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Indicate what kind of cluster we are in (OpenShift or Kubernetes).] ******************************** ok: [localhost] => {  "msg": "CLUSTER TYPE: is_openshift=True; is_k8s=False" } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:31Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"8368802926475675080","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Fail when can't determine type of cluster] ************ task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:27 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:31Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Fail when can't determine type of cluster"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Print some debug information] ******************************** ok: [localhost] => {  "msg": [  "ServiceTelemetry Variables",  "--------------------------------------------",  "alerting:",  " alertmanager:",  " deployment_size: 1",  " receivers:",  " snmp_traps:",  " alert_oid_label: oid",  " community: public",  " enabled: true",  " port: 162",  " retries: 5",  " target: 192.168.24.254",  " timeout: 1",  " trap_default_oid: 1.3.6.1.4.1.50495.15.1.2.1",  " trap_default_severity: ''",  " trap_oid_prefix: 1.3.6.1.4.1.50495.15",  " storage:",  " persistent:",  " pvc_storage_request: 20G",  " storage_class: crc-csi-hostpath-provisioner",  " strategy: persistent",  " enabled: true",  "backends:",  " events:",  " elasticsearch:",  " certificates:",  " ca_cert_duration: 70080h",  " endpoint_cert_duration: 70080h",  " enabled: true",  " forwarding:",  " host_url: https://elasticsearch-es-http:9200",  " tls_secret_name: elasticsearch-es-cert",  " tls_server_name: ''",  " use_basic_auth: true",  " use_tls: true",  " user_secret_name: elasticsearch-es-elastic-user",  " node_count: 1",  " storage:",  " persistent:",  " pvc_storage_request: 20Gi",  " storage_class: ''",  " strategy: persistent",  " version: 7.16.1",  " metrics:",  " prometheus:",  " deployment_size: 1",  " enabled: true",  " scrape_interval: 30s",  " storage:",  " persistent:",  " pvc_storage_request: 20G",  " storage_class: crc-csi-hostpath-provisioner",  " retention: 24h",  " strategy: persistent",  "clouds:",  "- events:",  " collectors:",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: collectd",  " debug_enabled: false",  " subscription_address: collectd/cloud1-notify",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: ceilometer",  " debug_enabled: false",  " subscription_address: anycast/ceilometer/cloud1-event.sample",  " metrics:",  " collectors:",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: collectd",  " debug_enabled: false",  " subscription_address: collectd/cloud1-telemetry",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 16384",  " verbose: false",  " collector_type: ceilometer",  " debug_enabled: false",  " subscription_address: anycast/ceilometer/cloud1-metering.sample",  " - bridge:",  " ring_buffer_count: 15000",  " ring_buffer_size: 65535",  " verbose: false",  " collector_type: sensubility",  " debug_enabled: false",  " subscription_address: sensubility/cloud1-telemetry",  " name: cloud1",  "graphing:",  " enabled: false",  " grafana:",  " base_image: registry.redhat.io/rhel8/grafana:9",  " dashboards:",  " enabled: true",  " disable_signout_menu: false",  " ingress_enabled: true",  "high_availability:",  " enabled: false",  "transports:",  " qdr:",  " auth: basic",  " certificates:",  " ca_cert_duration: 70080h",  " endpoint_cert_duration: 70080h",  " deployment_size: 1",  " enabled: true",  " web:",  " enabled: false",  ""  ] } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:32Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"8368802926475675080","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get current Smart Gateways loaded] ******************** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:77 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:32Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Get current Smart Gateways loaded"} {"level":"info","ts":"2025-10-06T00:31:33Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/smartgateway.infra.watch/v2/namespaces/service-telemetry/smartgateways","Verb":"list","APIPrefix":"apis","APIGroup":"smartgateway.infra.watch","APIVersion":"v2","Namespace":"service-telemetry","Resource":"smartgateways","Subresource":"","Name":"","Parts":["smartgateways"]}} {"level":"info","ts":"2025-10-06T00:31:33Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Get current STF object"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get current STF object] ******************************* task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:84 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:34Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/infra.watch/v1beta1/namespaces/service-telemetry/servicetelemetrys/default","Verb":"get","APIPrefix":"apis","APIGroup":"infra.watch","APIVersion":"v1beta1","Namespace":"service-telemetry","Resource":"servicetelemetrys","Subresource":"","Name":"default","Parts":["servicetelemetrys","default"]}} {"level":"info","ts":"2025-10-06T00:31:34Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Get community Prometheus objects"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get community Prometheus objects] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:92 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:35Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Prometheus, service-telemetry/default"} {"level":"info","ts":"2025-10-06T00:31:35Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Apply community observabilityStrategy if missing on an STF object with an existing community prometheus"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply community observabilityStrategy if missing on an STF object with an existing community prometheus] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:101 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply default observabilityStrategy if missing on a new STF object with no associated community prometheus] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:118 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:35Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Apply default observabilityStrategy if missing on a new STF object with no associated community prometheus"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get QDR objects] ************************************** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:132 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:35Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Get QDR objects"} {"level":"info","ts":"2025-10-06T00:31:36Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/interconnectedcloud.github.io/v1alpha1/namespaces/service-telemetry/interconnects/default-interconnect","Verb":"get","APIPrefix":"apis","APIGroup":"interconnectedcloud.github.io","APIVersion":"v1alpha1","Namespace":"service-telemetry","Resource":"interconnects","Subresource":"","Name":"default-interconnect","Parts":["interconnects","default-interconnect"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply legacy auth=none for QDR if missing on the STF object and it's currently deployed that way] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:141 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:36Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Apply legacy auth=none for QDR if missing on the STF object and it's currently deployed that way"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Apply default auth for QDR if missing on a new STF object with no associated auth=none QDR] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:161 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:36Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Apply default auth for QDR if missing on a new STF object with no associated auth=none QDR"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Set ServiceTelemetry object status to have ephemeralStorageEnabled status] *** task path: /opt/ansible/roles/servicetelemetry/tasks/pre.yml:185 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:36Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Set ServiceTelemetry object status to have ephemeralStorageEnabled status"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create QDR instance] ********************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:36Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create QDR instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create self-signed interconnect issuer] *************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:6 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:36Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create self-signed interconnect issuer"} {"level":"info","ts":"2025-10-06T00:31:37Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/issuers/default-interconnect-selfsigned","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"issuers","Subresource":"","Name":"default-interconnect-selfsigned","Parts":["issuers","default-interconnect-selfsigned"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create self-signed interconnect certificate] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:37Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:31:38Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-selfsigned","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-selfsigned","Parts":["certificates","default-interconnect-selfsigned"]}} {"level":"info","ts":"2025-10-06T00:31:38Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create default CA interconnect issuer using self-signed interconnect certificate"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create default CA interconnect issuer using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:37 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:39Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/issuers/default-interconnect-ca","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"issuers","Subresource":"","Name":"default-interconnect-ca","Parts":["issuers","default-interconnect-ca"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create OpenStack CA certificate using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:51 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:39Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create OpenStack CA certificate using self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:31:40Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-openstack-ca","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-openstack-ca","Parts":["certificates","default-interconnect-openstack-ca"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create OpenStack credentials certificate using self-signed interconnect certificate] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:68 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:40Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create OpenStack credentials certificate using self-signed interconnect certificate"} {"level":"info","ts":"2025-10-06T00:31:41Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-openstack-credentials","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-openstack-credentials","Parts":["certificates","default-interconnect-openstack-credentials"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router CA issuer] ************************ task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:86 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:41Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create inter-router CA issuer"} {"level":"info","ts":"2025-10-06T00:31:42Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/issuers/default-interconnect-inter-router-ca","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"issuers","Subresource":"","Name":"default-interconnect-inter-router-ca","Parts":["issuers","default-interconnect-inter-router-ca"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router CA certificate] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:100 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:42Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create inter-router CA certificate"} {"level":"info","ts":"2025-10-06T00:31:43Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-inter-router-ca","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-inter-router-ca","Parts":["certificates","default-interconnect-inter-router-ca"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create inter-router credentials certificate] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:117 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:43Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create inter-router credentials certificate"} {"level":"info","ts":"2025-10-06T00:31:43Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/cert-manager.io/v1/namespaces/service-telemetry/certificates/default-interconnect-inter-router-credentials","Verb":"get","APIPrefix":"apis","APIGroup":"cert-manager.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"certificates","Subresource":"","Name":"default-interconnect-inter-router-credentials","Parts":["certificates","default-interconnect-inter-router-credentials"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Interconnect SASL ConfigMap] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:136 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:44Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create Interconnect SASL ConfigMap"} {"level":"info","ts":"2025-10-06T00:31:44Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/configmaps/default-interconnect-sasl-config","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"configmaps","Subresource":"","Name":"default-interconnect-sasl-config","Parts":["configmaps","default-interconnect-sasl-config"]}} {"level":"info","ts":"2025-10-06T00:31:45Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Get QDR BasicAuth secret"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get QDR BasicAuth secret] ***************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:158 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:45Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/default-interconnect-users","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"default-interconnect-users","Parts":["secrets","default-interconnect-users"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Perform a one-time upgrade to the default generated password for QDR BasicAuth] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:170 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:46Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Perform a one-time upgrade to the default generated password for QDR BasicAuth"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Get the list of QDR pods] ***************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:184 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:46Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Get the list of QDR pods"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Restart QDR pods to pick up new password] ************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:193 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:46Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Restart QDR pods to pick up new password"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create QDR instance] ********************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_qdr.yml:271 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:46Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create QDR instance"} {"level":"info","ts":"2025-10-06T00:31:47Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/interconnectedcloud.github.io/v1alpha1/namespaces/service-telemetry/interconnects/default-interconnect","Verb":"get","APIPrefix":"apis","APIGroup":"interconnectedcloud.github.io","APIVersion":"v1alpha1","Namespace":"service-telemetry","Resource":"interconnects","Subresource":"","Name":"default-interconnect","Parts":["interconnects","default-interconnect"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Setup Certificates for metrics components] ************ task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:26 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:47Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Setup Certificates for metrics components"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create configmap for OAUTH CA certs] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:47Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create configmap for OAUTH CA certs"} {"level":"info","ts":"2025-10-06T00:31:48Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/configmaps/serving-certs-ca-bundle","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"configmaps","Subresource":"","Name":"serving-certs-ca-bundle","Parts":["configmaps","serving-certs-ca-bundle"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Check for existing cookie secret] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:12 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:48Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Check for existing cookie secret"} {"level":"info","ts":"2025-10-06T00:31:48Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/default-session-secret","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"default-session-secret","Parts":["secrets","default-session-secret"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create cookie secret] ********************************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_certificates.yml:20 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:49Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create cookie secret"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Prometheus instance] *************************** task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:48 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:49Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create Prometheus instance"} {"level":"info","ts":"2025-10-06T00:31:49Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create ServiceAccount/prometheus-stf with oauth redirect annotation"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/prometheus-stf with oauth redirect annotation] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:10 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:50Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/serviceaccounts/prometheus-stf","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"serviceaccounts","Subresource":"","Name":"prometheus-stf","Parts":["serviceaccounts","prometheus-stf"]}} {"level":"info","ts":"2025-10-06T00:31:50Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create ClusterRole/prometheus-stf for non-resource URL /metrics access"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRole/prometheus-stf for non-resource URL /metrics access] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:21 ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRoleBinding/prometheus-stf] ************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:64 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:51Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create ClusterRoleBinding/prometheus-stf"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Role/prometheus-stf for Prometheus operations] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:83 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:52Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create Role/prometheus-stf for Prometheus operations"} {"level":"info","ts":"2025-10-06T00:31:52Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/roles/prometheus-stf","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"roles","Subresource":"","Name":"prometheus-stf","Parts":["roles","prometheus-stf"]}} {"level":"info","ts":"2025-10-06T00:31:53Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create RoleBinding/prometheus-stf"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create RoleBinding/prometheus-stf] ******************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:152 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:53Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/rolebindings/prometheus-stf","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"rolebindings","Subresource":"","Name":"prometheus-stf","Parts":["rolebindings","prometheus-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Remove old ClusterRoleBinding for prometheus-k8s using CMO roleRef] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:172 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:54Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Remove old ClusterRoleBinding for prometheus-k8s using CMO roleRef"} --------------------------- Ansible Task StdOut ------------------------------- {"level":"info","ts":"2025-10-06T00:31:55Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"8368802926475675080","EventData.TaskArgs":""} TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "monitoring.rhobs/v1",  "kind": "Prometheus",  "metadata": {  "labels": {  "app.kubernetes.io/managed-by": "observability-operator",  "prometheus": "default"  },  "name": "default",  "namespace": "service-telemetry"  },  "spec": {  "alerting": {  "alertmanagers": [  {  "bearerTokenFile": "/var/run/secrets/kubernetes.io/serviceaccount/token",  "name": "default-alertmanager-proxy",  "namespace": "service-telemetry",  "port": "web",  "scheme": "https",  "tlsConfig": {  "caFile": "/etc/prometheus/configmaps/serving-certs-ca-bundle/service-ca.crt",  "serverName": "default-alertmanager-proxy.service-telemetry.svc"  }  }  ]  },  "configMaps": [  "serving-certs-ca-bundle"  ],  "containers": [  {  "args": [  "-https-address=:9092",  "-tls-cert=/etc/tls/private/tls.crt",  "-tls-key=/etc/tls/private/tls.key",  "-upstream=http://localhost:9090/",  "-cookie-secret-file=/etc/proxy/secrets/session_secret",  "-openshift-service-account=prometheus-stf",  "-openshift-sar={\"namespace\":\"service-telemetry\",\"resource\": \"prometheuses\", \"resourceAPIGroup\":\"monitoring.rhobs\", \"verb\":\"get\"}",  "-openshift-delegate-urls={\"/\":{\"namespace\":\"service-telemetry\",\"resource\": \"prometheuses\", \"group\":\"monitoring.rhobs\", \"verb\":\"get\"}}"  ],  "image": "quay.io/openshift/origin-oauth-proxy:latest",  "name": "oauth-proxy",  "ports": [  {  "containerPort": 9092,  "name": "https",  "protocol": "TCP"  }  ],  "volumeMounts": [  {  "mountPath": "/etc/tls/private",  "name": "secret-default-prometheus-proxy-tls"  },  {  "mountPath": "/etc/proxy/secrets",  "name": "secret-default-session-secret"  }  ]  }  ],  "image": "quay.io/prometheus/prometheus:latest",  "listenLocal": true,  "podMetadata": {  "annotations": null,  "labels": {  "prometheus": "default"  }  },  "replicas": 1,  "retention": "24h",  "ruleSelector": {},  "scrapeConfigSelector": {  "matchLabels": {  "app": "smart-gateway"  }  },  "secrets": [  "default-prometheus-proxy-tls",  "default-session-secret"  ],  "securityContext": {},  "serviceAccountName": "prometheus-stf",  "storage": {  "volumeClaimTemplate": {  "spec": {  "resources": {  "requests": {  "storage": "20G"  }  },  "storageClassName": "crc-csi-hostpath-provisioner"  }  }  },  "version": null  }  } } ------------------------------------------------------------------------------- --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of Prometheus] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:191 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:55Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create an instance of Prometheus"} {"level":"info","ts":"2025-10-06T00:31:56Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/monitoring.rhobs/v1/namespaces/service-telemetry/prometheuses/default","Verb":"get","APIPrefix":"apis","APIGroup":"monitoring.rhobs","APIVersion":"v1","Namespace":"service-telemetry","Resource":"prometheuses","Subresource":"","Name":"default","Parts":["prometheuses","default"]}} {"level":"info","ts":"2025-10-06T00:31:56Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Ensure no community Prometheus is installed if not using community operator"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no community Prometheus is installed if not using community operator] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:197 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:56Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Prometheus, service-telemetry/default"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no rhobs Prometheus is installed if not using it] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:207 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:57Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Ensure no rhobs Prometheus is installed if not using it"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create service to access the prometheus proxy] ******** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:223 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:57Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create service to access the prometheus proxy"} {"level":"info","ts":"2025-10-06T00:31:57Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/services/default-prometheus-proxy","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"services","Subresource":"","Name":"default-prometheus-proxy","Parts":["services","default-prometheus-proxy"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create route to access the prometheus proxy] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus.yml:234 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:58Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create route to access the prometheus proxy"} {"level":"info","ts":"2025-10-06T00:31:59Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/route.openshift.io/v1/namespaces/service-telemetry/routes/default-prometheus-proxy","Verb":"get","APIPrefix":"apis","APIGroup":"route.openshift.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"routes","Subresource":"","Name":"default-prometheus-proxy","Parts":["routes","default-prometheus-proxy"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Prometheus read-only user] ********************* task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:50 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:31:59Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create Prometheus read-only user"} {"level":"info","ts":"2025-10-06T00:31:59Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create ServiceAccount/stf-prometheus-reader"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/stf-prometheus-reader] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:1 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:00Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/serviceaccounts/stf-prometheus-reader","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"serviceaccounts","Subresource":"","Name":"stf-prometheus-reader","Parts":["serviceaccounts","stf-prometheus-reader"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create prometheus-reader Role] ************************ task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:11 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:00Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create prometheus-reader Role"} {"level":"info","ts":"2025-10-06T00:32:00Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/roles/prometheus-reader","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"roles","Subresource":"","Name":"prometheus-reader","Parts":["roles","prometheus-reader"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create prometheus-reader RoleBinding for stf-prometheus-reader] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:30 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:01Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create prometheus-reader RoleBinding for stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:32:01Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/rolebindings/stf-prometheus-reader","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"rolebindings","Subresource":"","Name":"stf-prometheus-reader","Parts":["rolebindings","stf-prometheus-reader"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an access token for stf-prometheus-reader] ***** task path: /opt/ansible/roles/servicetelemetry/tasks/component_prometheus_reader.yml:47 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:02Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create an access token for stf-prometheus-reader"} {"level":"info","ts":"2025-10-06T00:32:02Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/stf-prometheus-reader-token","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"stf-prometheus-reader-token","Parts":["secrets","stf-prometheus-reader-token"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Alertmanager instance] ************************* task path: /opt/ansible/roles/servicetelemetry/tasks/main.yml:54 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:02Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create Alertmanager instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "monitoring.rhobs/v1",  "kind": "Alertmanager",  "metadata": {  "labels": {  "alertmanager": "default",  "app.kubernetes.io/managed-by": "observability-operator"  },  "name": "default",  "namespace": "service-telemetry"  },  "spec": {  "containers": [  {  "args": [  "-https-address=:9095",  "-tls-cert=/etc/tls/private/tls.crt",  "-tls-key=/etc/tls/private/tls.key",  "-upstream=http://localhost:9093/",  "-cookie-secret-file=/etc/proxy/secrets/session_secret",  "-openshift-service-account=alertmanager-stf",  "-openshift-sar={\"namespace\":\"service-telemetry\", \"resource\": \"alertmanagers\", \"resourceAPIGroup\":\"monitoring.rhobs\", \"verb\":\"get\"}",  "-openshift-delegate-urls={\"/\": {\"namespace\":\"service-telemetry\", \"resource\": \"alertmanagers\", \"group\":\"monitoring.rhobs\", \"verb\":\"get\"}}"  ],  "image": "quay.io/openshift/origin-oauth-proxy:latest",  "name": "oauth-proxy",  "ports": [  {  "containerPort": 9095,  "name": "https",  "protocol": "TCP"  }  ],  "volumeMounts": [  {  "mountPath": "/etc/tls/private",  "name": "secret-default-alertmanager-proxy-tls"  },  {  "mountPath": "/etc/proxy/secrets",  "name": "secret-default-session-secret"  }  ]  }  ],  "image": "quay.io/prometheus/alertmanager:latest",  "listenLocal": true,  "podMetadata": {  "labels": {  "alertmanager": "default"  }  },  "replicas": 1,  "scrapeConfigSelector": {  "matchLabels": {  "app": "smart-gateway"  }  },  "secrets": [  "default-alertmanager-proxy-tls",  "default-session-secret"  ],  "serviceAccountName": "alertmanager-stf",  "storage": {  "volumeClaimTemplate": {  "spec": {  "resources": {  "requests": {  "storage": "20G"  }  },  "storageClassName": "crc-csi-hostpath-provisioner"  }  }  }  }  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:03Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"8368802926475675080","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup alertmanager configuration template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "v1",  "kind": "Secret",  "metadata": {  "name": "alertmanager-default",  "namespace": "service-telemetry"  },  "stringData": {  "alertmanager.yaml": "global:\n resolve_timeout: 5m\nroute:\n group_by: ['job']\n group_wait: 30s\n group_interval: 5m\n repeat_interval: 12h\n receiver: 'snmp_wh'\nreceivers:\n- name: 'snmp_wh'\n webhook_configs:\n - url: 'http://default-prometheus-webhook-snmp:9099'"  },  "type": "Opaque"  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:03Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"8368802926475675080","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an Alertmanager configuration secret] ********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:19 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:03Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create an Alertmanager configuration secret"} {"level":"info","ts":"2025-10-06T00:32:04Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/secrets/alertmanager-default","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"secrets","Subresource":"","Name":"alertmanager-default","Parts":["secrets","alertmanager-default"]}} {"level":"info","ts":"2025-10-06T00:32:04Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create an instance of Alertmanager"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of Alertmanager] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:25 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:05Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/monitoring.rhobs/v1/namespaces/service-telemetry/alertmanagers/default","Verb":"get","APIPrefix":"apis","APIGroup":"monitoring.rhobs","APIVersion":"v1","Namespace":"service-telemetry","Resource":"alertmanagers","Subresource":"","Name":"default","Parts":["alertmanagers","default"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no community Alertmanager is installed if not using community operator] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:31 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:05Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Ensure no community Alertmanager is installed if not using community operator"} {"level":"info","ts":"2025-10-06T00:32:05Z","logger":"proxy","msg":"Cache miss: monitoring.coreos.com/v1, Kind=Alertmanager, service-telemetry/default"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Ensure no rhobs Alertmanager is installed if not using it] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:41 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:06Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Ensure no rhobs Alertmanager is installed if not using it"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create SNMP traps instance] *************************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:54 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:06Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create SNMP traps instance"} --------------------------- Ansible Task StdOut ------------------------------- TASK [Lookup template] ******************************** ok: [localhost] => {  "msg": {  "apiVersion": "apps/v1",  "kind": "Deployment",  "metadata": {  "name": "default-snmp-webhook",  "namespace": "service-telemetry"  },  "spec": {  "replicas": 1,  "selector": {  "matchLabels": {  "app": "default-snmp-webhook"  }  },  "template": {  "metadata": {  "labels": {  "app": "default-snmp-webhook"  }  },  "spec": {  "containers": [  {  "env": [  {  "name": "SNMP_COMMUNITY",  "value": "public"  },  {  "name": "SNMP_RETRIES",  "value": "5"  },  {  "name": "SNMP_HOST",  "value": "192.168.24.254"  },  {  "name": "SNMP_PORT",  "value": "162"  },  {  "name": "SNMP_TIMEOUT",  "value": "1"  },  {  "name": "ALERT_OID_LABEL",  "value": "oid"  },  {  "name": "TRAP_OID_PREFIX",  "value": "1.3.6.1.4.1.50495.15"  },  {  "name": "TRAP_DEFAULT_OID",  "value": "1.3.6.1.4.1.50495.15.1.2.1"  },  {  "name": "TRAP_DEFAULT_SEVERITY",  "value": ""  }  ],  "image": "image-registry.openshift-image-registry.svc:5000/service-telemetry/prometheus-webhook-snmp:latest",  "name": "prometheus-webhook-snmp",  "ports": [  {  "containerPort": 9099  }  ]  }  ]  }  }  }  } } ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:06Z","logger":"logging_event_handler","msg":"[playbook debug]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"runner_on_ok","job":"8368802926475675080","EventData.TaskArgs":""} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of snmp webhook] ******************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_snmp_traps.yml:10 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:06Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create an instance of snmp webhook"} {"level":"info","ts":"2025-10-06T00:32:07Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/apps/v1/namespaces/service-telemetry/deployments/default-snmp-webhook","Verb":"get","APIPrefix":"apis","APIGroup":"apps","APIVersion":"v1","Namespace":"service-telemetry","Resource":"deployments","Subresource":"","Name":"default-snmp-webhook","Parts":["deployments","default-snmp-webhook"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create an instance of snmp webhook service] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_snmp_traps.yml:20 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:07Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create an instance of snmp webhook service"} {"level":"info","ts":"2025-10-06T00:32:08Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/services/default-prometheus-webhook-snmp","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"services","Subresource":"","Name":"default-prometheus-webhook-snmp","Parts":["services","default-prometheus-webhook-snmp"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ServiceAccount/alertmanager-stf with oauth redirect annotation] *** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:70 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:08Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create ServiceAccount/alertmanager-stf with oauth redirect annotation"} {"level":"info","ts":"2025-10-06T00:32:09Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/api/v1/namespaces/service-telemetry/serviceaccounts/alertmanager-stf","Verb":"get","APIPrefix":"api","APIGroup":"","APIVersion":"v1","Namespace":"service-telemetry","Resource":"serviceaccounts","Subresource":"","Name":"alertmanager-stf","Parts":["serviceaccounts","alertmanager-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRole/alertmanager-stf] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:81 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:09Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create ClusterRole/alertmanager-stf"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create ClusterRoleBinding/alertmanager-stf] *********** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:120 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:10Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create ClusterRoleBinding/alertmanager-stf"} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create Role/alertmanager-stf] ************************* task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:139 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:11Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create Role/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:32:12Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/roles/alertmanager-stf","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"roles","Subresource":"","Name":"alertmanager-stf","Parts":["roles","alertmanager-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create RoleBinding/alertmanager-stf] ****************** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:177 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:12Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create RoleBinding/alertmanager-stf"} {"level":"info","ts":"2025-10-06T00:32:13Z","logger":"proxy","msg":"Read object from cache","resource":{"IsResourceRequest":true,"Path":"/apis/rbac.authorization.k8s.io/v1/namespaces/service-telemetry/rolebindings/alertmanager-stf","Verb":"get","APIPrefix":"apis","APIGroup":"rbac.authorization.k8s.io","APIVersion":"v1","Namespace":"service-telemetry","Resource":"rolebindings","Subresource":"","Name":"alertmanager-stf","Parts":["rolebindings","alertmanager-stf"]}} --------------------------- Ansible Task StdOut ------------------------------- TASK [servicetelemetry : Create service to access the Alertmanager proxy] ****** task path: /opt/ansible/roles/servicetelemetry/tasks/component_alertmanager.yml:202 ------------------------------------------------------------------------------- {"level":"info","ts":"2025-10-06T00:32:13Z","logger":"logging_event_handler","msg":"[playbook task start]","name":"default","namespace":"service-telemetry","gvk":"infra.watch/v1beta1, Kind=ServiceTelemetry","event_type":"playbook_on_task_start","job":"8368802926475675080","EventData.Name":"servicetelemetry : Create service to access the Alertmanager proxy"}