OCPBUGS-74497: Add UserAgent to Azure SDK client telemetry options#1400
OCPBUGS-74497: Add UserAgent to Azure SDK client telemetry options#1400Nirshal wants to merge 1 commit intoopenshift:masterfrom
Conversation
…when authenticating to Azure Cloud Set policy.TelemetryOptions with ApplicationID for ARM dns RecordSetsClient, PrivateRecordSetsClient, and Azure credential clients."
|
Skipping CI for Draft Pull Request. |
|
@Nirshal: This pull request references Jira Issue OCPBUGS-74497, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Repository YAML (base), Organization UI (inherited) Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (2)
📝 WalkthroughWalkthroughAzure SDK telemetry configuration has been added to the Azure DNS client code. The changes introduce ✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
/retest |
|
According to Claude e2e-analyze skill: Error: Failed to acquire lease for "hypershift-aws-quota-slice": resources not found /test e2e-aws-ovn-hypershift-conformance |
|
/test e2e-aws-ovn-hypershift-conformance |
|
/retest |
1 similar comment
|
/retest |
|
@Nirshal: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
/verified by @wewang58 |
|
@wewang58: This PR has been marked as verified by DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
I let claude check the ci/prow/e2e-aws-operator-techpreview error, and it is unrelated to this PR modifications: |
|
@davidesalerno @Thealisyed can you provide some help with this PR? I need the proper labels to merge |
What this PR does / why we need it
The Cluster Ingress Operator is not setting the ApplicationID in the Azure SDK
TelemetryOptions when creating Azure ARM SDK clients and credential clients.
This means Azure API requests from CIO do not include proper application
identification in the User-Agent header for request tracing and telemetry purposes.
This PR adds
policy.TelemetryOptionswithApplicationIDto:RecordSetsClientPrivateRecordSetsClientUserAssignedIdentityCredential,WorkloadIdentityCredential,ClientSecretCredential)Which issue(s) this PR fixes
Fixes https://issues.redhat.com/browse/OCPBUGS-74497
Special notes for your reviewer
ApplicationIDvalue is set to[cio-useragent]as suggested in the Jira issue. Note that the AWS provider uses a different format that includes the operator release version(e.g.,
OpenShift/<version> (ingress-operator)), but the Azure SDK enforces a maximum of 24 characters with no spaces for this field. Additionally, the release version is not currentlyavailable in the Azure client package and would require propagating it from the controller. Happy to align to a different format if preferred.
auth.go). This PR fixes both.Checklist