Kubernetes namespace scoping for Observability¶
Kubernetes Namespace Scoping refers to the configuration and operational practice of isolating observability resources—such as telemetry collectors and logging backends—to specific Kubernetes Namespaces.^[400-devops-07-monitoring-and-observability-k8s-istio-samples-open-telemetry-readme.md]
In Kubernetes environments like Istio, this involves explicitly targeting the correct namespace when applying configuration manifests to ensure that data pipelines (like OpenTelemetry) receive traffic and logs from the intended mesh or application workloads.^[400-devops-07-monitoring-and-observability-k8s-istio-samples-open-telemetry-readme.md]
Implementation Examples¶
Scoping is typically enforced using the -n (namespace) flag with kubectl commands or by defining metadata.namespace fields within YAML resource files.
- Collector Deployment: When deploying an OpenTelemetry Collector, it is standard practice to scope it to a specific namespace (e.g.,
istio-system) to manage its proximity to the control plane or specific workloads^[400-devops-07-monitoring-and-observability-k8s-istio-samples-open-telemetry-readme.md]. - Telemetry Resources: Istio
Telemetryresources must be applied to the namespace where the observability integration is configured to direct access logs to the correct provider^[400-devops-07-monitoring-and-observability-k8s-istio-samples-open-telemetry-readme.md].
Related Concepts¶
- [[Namespaces]]
- [[OpenTelemetry]]
- Istio
- [[Observability]]
Sources¶
400-devops-07-monitoring-and-observability-k8s-istio-samples-open-telemetry-readme.md