$ oc get pods --namespace=openshift-insights -o custom-columns=:metadata.name --no-headers --field-selector=status.phase=Running
The Insights Operator periodically gathers configuration and component failure status and, by default, reports that data every two hours to Red Hat. This information enables Red Hat to assess configuration and deeper failure data than is reported through Telemetry. Users of OKD can display the report in the Insights Advisor service on Red Hat Hybrid Cloud Console.
The Insights Operator is installed and enabled by default. If you need to opt out of remote health reporting, see Opting out of remote health reporting.
For more information on using Insights Advisor to identify issues with your cluster, see Using Insights to identify issues with your cluster.
The Insights Operator declares alerts through the Prometheus monitoring system to the Alertmanager. You can view these alerts in the Alerting UI in the OKD web console by using one of the following methods:
In the Administrator perspective, click Observe → Alerting.
In the Developer perspective, click Observe → <project_name> → Alerts tab.
Currently, Insights Operator sends the following alerts when the conditions are met:
Alert | Description |
---|---|
|
Insights Operator is disabled. |
|
Simple content access is not enabled in Red Hat Subscription Management. |
|
Insights has an active recommendation for the cluster. |
To prevent the Insights Operator from sending alerts to the cluster Prometheus instance, you edit the support
secret. If the support
secret doesn’t exist, you must create it when you first add custom configurations. Note that configurations within the support
secret take precedence over the default settings defined in the pod.yaml
file.
To prevent the Insights Operator from sending alerts to the cluster Prometheus instance, you edit the support
secret. Note that this secret
is created by default. The configurations stored in the support secret take precedence over any default settings specified in the pod.yaml
file.
Remote health reporting is enabled, which is the default.
You are logged in to the OKD web console as cluster-admin
.
Navigate to Workloads → secrets.
On the secrets page, select All Projects from the Project list, and then set Show default projects to on.
Select the openshift-config project from the Projects list.
Search for the support secret by using the Search by name field.
If the secret exists:
Click the Options menu , and then click Edit secret.
Click Add Key/Value.
In the Key field, enter disableInsightsAlerts
.
In the Value field, enter True
.
If the secret does not exist:
Click Create → Key/value secret.
In the secret name field, enter support
.
In the Key field, enter disableInsightsAlerts
.
In the Value field, enter True
.
Click Create.
After you save the changes, Insights Operator no longer sends alerts to the cluster Prometheus instance.
When alerts are disabled, the Insights Operator no longer sends alerts to the cluster Prometheus instance. You can change this behavior.
Remote health reporting is enabled, which is the default.
You are logged in to the OKD web console as cluster-admin
.
Navigate to Workloads → secrets.
On the secrets page, select All Projects from the Project list, and then set Show default projects to ON.
Select the openshift-config project from the Projects list.
Search for the support secret by using the Search by name field.
Click the Options menu , and then click Edit secret.
For the disableInsightsAlerts
key, set the Value field to false
.
After you save the changes, Insights Operator again sends alerts to the cluster Prometheus instance.
Insights Operator stores gathered data in an archive located in the openshift-insights
namespace of your cluster. You can download and review the data that is gathered by the Insights Operator.
You have access to the cluster as a user with the cluster-admin
role.
Find the name of the running pod for the Insights Operator:
$ oc get pods --namespace=openshift-insights -o custom-columns=:metadata.name --no-headers --field-selector=status.phase=Running
Copy the recent data archives collected by the Insights Operator:
$ oc cp openshift-insights/<insights_operator_pod_name>:/var/lib/insights-operator ./insights-data (1)
1 | Replace <insights_operator_pod_name> with the pod name output from the preceding command. |
The recent Insights Operator archives are now available in the insights-data
directory.
You can view the time it takes for the Insights Operator to gather the information contained in the archive. This helps you to understand Insights Operator resource usage and issues with Insights Advisor.
A recent copy of your Insights Operator archive.
From your archive, open /insights-operator/gathers.json
.
The file contains a list of Insights Operator gather operations:
{
"name": "clusterconfig/authentication",
"duration_in_ms": 730, (1)
"records_count": 1,
"errors": null,
"panic": null
}
1 | duration_in_ms is the amount of time in milliseconds for each gather operation. |
Inspect each gather operation for abnormalities.
You can disable the Insights Operator gather operations. Disabling the gather operations gives you the ability to increase privacy for your organization as Insights Operator will no longer gather and send Insights cluster reports to Red Hat. This will disable Insights analysis and recommendations for your cluster without affecting other core functions that require communication with Red Hat such as cluster transfers. You can view a list of attempted gather operations for your cluster from the /insights-operator/gathers.json
file in your Insights Operator archive. Be aware that some gather operations only occur when certain conditions are met and might not appear in your most recent archive.
The For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope. |
You are logged in to the OKD web console as a user with the cluster-admin
role.
Navigate to Administration → CustomResourceDefinitions.
On the CustomResourceDefinitions page, use the Search by name field to find the InsightsDataGather resource definition and click it.
On the CustomResourceDefinition details page, click the Instances tab.
Click cluster, and then click the YAML tab.
Disable the gather operations by performing one of the following edits to the InsightsDataGather
configuration file:
To disable all the gather operations, enter all
under the disabledGatherers
key:
apiVersion: config.openshift.io/v1alpha1
kind: InsightsDataGather
metadata:
....
spec: (1)
gatherConfig:
disabledGatherers:
- all (2)
1 | The spec parameter specifies gather configurations. |
2 | The all value disables all gather operations. |
To disable individual gather operations, enter their values under the disabledGatherers
key:
spec:
gatherConfig:
disabledGatherers:
- clusterconfig/container_images (1)
- clusterconfig/host_subnets
- workloads/workload_info
1 | Example individual gather operation |
Click Save.
After you save the changes, the Insights Operator gather configurations are updated and the operations will no longer occur.
Disabling gather operations degrades Insights Advisor’s ability to offer effective recommendations for your cluster. |
You can enable the Insights Operator gather operations, if the gather operations have been disabled.
The For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope. |
You are logged in to the OKD web console as a user with the cluster-admin
role.
Navigate to Administration → CustomResourceDefinitions.
On the CustomResourceDefinitions page, use the Search by name field to find the InsightsDataGather resource definition and click it.
On the CustomResourceDefinition details page, click the Instances tab.
Click cluster, and then click the YAML tab.
Enable the gather operations by performing one of the following edits:
To enable all disabled gather operations, remove the gatherConfig
stanza:
apiVersion: config.openshift.io/v1alpha1
kind: InsightsDataGather
metadata:
....
spec:
gatherConfig: (1)
disabledGatherers: all
1 | Remove the gatherConfig stanza to enable all gather operations. |
To enable individual gather operations, remove their values under the disabledGatherers
key:
spec:
gatherConfig:
disabledGatherers:
- clusterconfig/container_images (1)
- clusterconfig/host_subnets
- workloads/workload_info
1 | Remove one or more gather operations. |
Click Save.
After you save the changes, the Insights Operator gather configurations are updated and the affected gather operations start.
Disabling gather operations degrades Insights Advisor’s ability to offer effective recommendations for your cluster. |
You can configure Insights Operator to meet the needs of your organization. The Insights Operator is configured using a combination of the default configurations in the pod.yaml
file in the Insights Operator Config
directory and the configurations stored in the support
secret in the openshift-config
namespace. The support
secret does not exist by default and must be created when adding custom configurations for the first time. Configurations in the support
secret override the defaults set in the pod.yaml
file.
The table below describes the available configuration attributes:
Attribute name | Description | Value type | Default value |
---|---|---|---|
|
Enables the global obfuscation of IP addresses and the cluster domain name |
Boolean |
|
|
Specifies the frequency of the simple content access entitlements download |
Time interval |
|
|
Disables the simple content access entitlements download |
Boolean |
|
|
Specifies how often Insights Operator checks OpenShift Cluster Manager for available cluster transfers |
Time interval |
|
|
Disables Insights Operator alerts to the cluster Prometheus instance |
Boolean |
|
|
Set custom proxy for Insights Operator |
URL |
|
This procedure describes how to set custom Insights Operator configurations.
Red Hat recommends you consult Red Hat Support before making changes to the default Insights Operator configuration. |
You are logged in to the OKD web console as a user with cluster-admin
role.
Navigate to Workloads → secrets.
On the secrets page, select All Projects from the Project list, and then set Show default projects to on.
Select the openshift-config project from the Project list.
Search for the support secret using the Search by name field. If it does not exist, click Create → Key/value secret to create it.
Click the Options menu for the secret, and then click Edit secret.
Click Add Key/Value.
Enter an attribute name with an appropriate value (see table above), and click Save.
Repeat the above steps for any additional configurations.