Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is it possible to blacklist /kubepods.slice ? #3460

Open
zbialik opened this issue Jan 22, 2024 · 1 comment
Open

Is it possible to blacklist /kubepods.slice ? #3460

zbialik opened this issue Jan 22, 2024 · 1 comment

Comments

@zbialik
Copy link

zbialik commented Jan 22, 2024

We're already using kubelet's default exposed cadvisor metrics to monitor pod/container usages.

We want to monitor other usages for other cgroups under /system.slice + /kube.slice (for container runtime + kubelet), but this isn't exposed by kubelet right now.

I see cadvisor exposes the other cgroup metrics properly, but I can't seem to get it configured to ONLY expose those under /system.slice + /kube.slice. It appears like cadvisor will always expose the cgroups under /kubepods.slice (perhaps due to a reliance on CRI?).

I tried using the whitelist argument (--raw_cgroup_prefix_whitelist=/system.slice) but continue to get metrics for /kubepods.slice. Is this supposed to happen?

Current workaround is to replace our scraped kubelet-cadvisor metrics with new ones from a cadvisor DaemonSet, but I'd prefer to just use our cadvisor DaemonSet for the system-specific cgroups, not those already covered by kubelet.

@deepakzac
Copy link

hi @zbialik I'm running into the same exact issue. Did you ever resolve it?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants