Skip to content

Conversation

@rioliu-rh
Copy link
Contributor

@rioliu-rh rioliu-rh commented Feb 11, 2026

Summary

  • Add build script to compile the component-monitor binary from ship-status-dash and install to /usr/local/bin
  • Add component-monitor config to probe the MCP server health endpoint
  • Add systemd service file for running the component-monitor as a persistent service on the VM

Context

The SHIP Status Dashboard component-monitor on app.ci cannot reach the internal VM network where the ERT MCP server runs. This deploys a dedicated ert-component-monitor instance on the VM itself to probe the local health endpoint and report status to the dashboard.

Ref: OCPERT-324

Add build script, config, and systemd service for running a dedicated
component-monitor instance on the ERT VM to report health status of
ERT services to the SHIP Status Dashboard.

The component-monitor probes the MCP server health endpoint and reports
status to the dashboard API. A separate instance is needed because
the app.ci cluster cannot reach the internal VM network.
@openshift-ci
Copy link

openshift-ci bot commented Feb 11, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign rioliu-rh for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@rioliu-rh
Copy link
Contributor Author

/cc @smg247

@openshift-ci openshift-ci bot requested a review from smg247 February 11, 2026 13:01
@@ -0,0 +1,25 @@
#!/bin/bash
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The component-monitor is available as a public image at: quay.io. The latest tag is automatically updated whenever a change is made.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

that's great, I can extract the latest binary from the image, don't have to build it from the source code

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The binary in the container image is dynamically linked and requires GLIBC_2.32, but RHEL8 ships with GLIBC 2.28. The binary was likely built on a newer base image.

/tmp/component-monitor: /lib64/libc.so.6: version `GLIBC_2.32' not found (required by /tmp/component-monitor)

I have Go 1.24.6 installed on RHEL8 vm, seems like I have to rollback image based logic

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will update the service file to launch it in container directly. so this file is not needed

Use the pre-built component-monitor image from quay.io/openshiftci
instead of compiling from source. This removes the Go toolchain
dependency on the VM.
The pre-built container image from quay.io/openshiftci avoids the need
to install Go or extract the binary. The systemd service uses podman run
with the config and token mounted as volumes.
Remove User directive since cloud-user lacks rootless podman
permissions. System-level podman services run as root by default.
@rioliu-rh
Copy link
Contributor Author

Updated based on review feedback:

  • Removed build.sh - no longer needed
  • Updated systemd service to run the component-monitor directly as a container via podman run, mounting config and token as volumes
  • Runs as root since cloud-user doesn't have rootless podman permissions on RHEL8

The GLIBC incompatibility with extracting the binary is avoided entirely by running the container image as-is.

@openshift-ci
Copy link

openshift-ci bot commented Feb 11, 2026

@rioliu-rh: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants