Kubernetes event reporter for Sentry.
Errors and warnings in Kubernetes often go unnoticed by operators. Even when they are checked they are hard to read and understand in the context of what else is going on in the cluster. sentry-kubernetes is a small container you launch inside your Kubernetes cluster that will send errors and warnings to Sentry where they will be cleanly presented and intelligently grouped. Typical Sentry features such as notifications can then be used to help operation and developer visibility.
- 
SENTRY_DSN- Sentry DSN that will be used by the agent. - 
SENTRY_ENVIRONMENT- Sentry environment that will be used for reported events. - 
SENTRY_K8S_WATCH_NAMESPACES- a comma-separated list of namespaces that will be watched. Only thedefaultnamespace is watched by default. If you want to watch all namespaces, set the varible to value__all__. - 
SENTRY_K8S_WATCH_HISTORICAL- if set to1, all existing (old) events will also be reported. Default is0(old events will not be reported). - 
SENTRY_K8S_CLUSTER_CONFIG_TYPE- the type of the cluster initialization method. Allowed options:auto,in-cluster,out-cluster. Default isauto. - 
SENTRY_K8S_KUBECONFIG_PATH- filesystem path to thekubeconfigconfiguration that will be used to connect to the cluster. Not used ifSENTRY_K8S_CLUSTER_CONFIG_TYPEis set toin-cluster. - 
SENTRY_K8S_LOG_LEVEL- logging level. Can betrace,debug,info,warn,error,disabled. Default isinfo. 
To add a custom tag to all events produced by the agent, set an environment variable, whose name is prefixed with SENTRY_K8S_GLOBAL_TAG_.
Example:
SENTRY_K8S_GLOBAL_TAG_cluster_name=main-cluster will add cluster_name=main_cluster tag to every outgoing Sentry event.
- 
SENTRY_K8S_INTEGRATION_GKE_ENABLED- if set to1, enable the GKE integration. Default is0(disabled).The GKE integration will attempt to fetch GKE/GCE metadata from the GCP metadata server, such as project name, cluster name, and cluster location.
 
If you don't want to report certain kinds of events to Sentry, you can configure client-side filters.
- 
Event Reason: filtering by
Event.Reasonfield.SENTRY_K8S_FILTER_OUT_EVENT_REASONSis a comma separated set of event Reason values. If the event's Reason is in that list, the event will be dropped. By default, the following reasons are filtered out (muted):DockerStart,KubeletStart,NodeSysctlChange,ContainerdStart. - 
Event Source: filtering by
Event.Source.Componentfield.SENTRY_K8S_FILTER_OUT_EVENT_SOURCESis a comma separated set of Source Component values (examples includekubelet,default-cheduler,job-controller,kernel-monitor). If the event's Source Component is in that list, the event will be dropped. By default, no events are filtered out by Source Component. 
- When the same event (for example, a failed readiness check) happens multiple times, Kubernetes might not report each of them individually, and instead combine them, and send with some backoff. The event message in that case will be prefixed with "(combined from similar events)" string, that we currently strip. AFAIK, there's no way to disable this batching behaviour.
 
- For pod-related events: fetch last log lines and displaying them as breadcrumbs or stacktrace.
 - Automatic Sentry cron monitoring instrumentaion of Kubernetes CronJobs.
 
- 
Install necessary dependencies to run Kubernetes locally
- 
Install
dockerand start the docker daemonhttps://docs.docker.com/engine/install/
dockeris a service that manages containers and is used by Kubernetes to create nodes (sincekindactually create Kubernetes “nodes” as docker containers rather than VMs) - 
Install
kindand add it to PATHhttps://kind.sigs.k8s.io/docs/user/quick-start/
kindis a tool for running local Kubernetes clusters and we use it here for testing. The container runtime used by it iscontainerd, which is the same runtime used now by Docker. - 
Install
kubectl, which is the command line tool we use to interact with Kubernetes clusters ran locally bykind 
 - 
 - 
Run Kubernetes cluster locally for development purposes
- Create a Kubernetes cluster with 
kindusing the command (the cluster name is “kind” by default) 
kind create clusterb. Output information about the created cluster named “kind” or some cluster name you have chosen using the following command (replacing
<cluster name>withkindif default used)kubectl cluster-info --context kind-<cluster name>You should see an output similar to the following:
Kubernetes control plane is running at https://127.0.0.1:61502 CoreDNS is running at https://127.0.0.1:61502/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy
 - Create a Kubernetes cluster with 
 - 
Run the
sentry-kubernetesGo module (which must be performed after the Kubernetes cluster is already running because the module requires thekubeconfigfile)- Clone the 
sentry-kubernetesrepository 
git clone https://github.com/getsentry/sentry-kubernetes.gitb. Pass a valid Sentry DSN to the an environment variable named
SENTRY_DSN(https://docs.sentry.io/product/sentry-basics/concepts/dsn-explainer/)c. At the root of the repository directory, build the Go module with the command
make buildd. Run the module outside of the k8s cluster by executing the command
go run .which now starts up the process that automatically detects the cluster configuration in order to detect events
 - Clone the 
 - 
Add error-producing pods to test event capturing
- Create resources (e.g. pods or deployments) using existing manifests meant to produce errors to be captured by 
sentry-kubernetes. For example, we can apply the manifest for a pod that exhibits crash loop behavior with the command 
kubectl apply -f ./k8s/errors/pod-crashloop.yamlb. Check that the pod is created using the command
kubectl get podswhich should produce an output similar to the following:
NAME READY STATUS RESTARTS AGE pod-crashloop 0/1 CrashLoopBackOff 32 (33s ago) 3h10m
Notice that the Status is
CrashLoopBackOff, which is the intended state for our purposec. Check that the
sentry-kubernetesprocess capture this crash loop error by checking for the an output similar to the following:[Sentry] 2023/11/08 12:07:53 Using release from Git: abc123 12:07PM INF Auto-detecting cluster configuration... 12:07PM WRN Could not initialize in-cluster config 12:07PM INF Detected out-of-cluster configuration 12:07PM INF Running integrations... 12:07PM INF Watching events starting from: Wed, 08 Nov 2023 12:07:53 -0800 namespace=default watcher=events 12:07PM INF CronJob monitoring is disabled namespace=default watcher=events [Sentry] 2023/11/08 12:09:27 Sending error event [w0dc9c22094d7rg9b27afabc868e32] to o4506191942320128.ingest.sentry.io project: 4506191948087296 [Sentry] 2023/11/08 12:10:57 Sending error event [4808b623f0eb446eac0eb6c5f0a43681] to o4506191942320128.ingest.sentry.io project: 4506191948087296
d. Check the
Issuestab of the corresponding Sentry project to ensure the events captured are shown similar to below: - Create resources (e.g. pods or deployments) using existing manifests meant to produce errors to be captured by 
 
