Bug 1508290
Summary: | [3.6]Upgrade masters failed due to migrate storage failed | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | liujia <jiajliu> |
Component: | apiserver-auth | Assignee: | Simo Sorce <ssorce> |
Status: | CLOSED WONTFIX | QA Contact: | Chuan Yu <chuyu> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 3.6.1 | CC: | aos-bugs, eparis, jialiu, jkaur, jokerman, mkhan, mmccomas, rbost, sdodson, ssorce, vsemushi, wmeng |
Target Milestone: | --- | ||
Target Release: | 3.6.z | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2018-02-15 21:35:07 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
liujia
2017-11-01 05:17:16 UTC
*** Bug 1508294 has been marked as a duplicate of this bug. *** Routing to Security. Similar to the one from yesterday https://bugzilla.redhat.com/show_bug.cgi?id=1508027 Liujia, does this happen for 3.6 -> 3.7 upgrades too ? Seth, why doyo uhtink this is a Security issue ? If upgrade is performning forbidden operation ssounds like it is an upgrade problem ? Scott, this is not a duplicate of 1508294 afaict. (In reply to Simo Sorce from comment #5) > Scott, > this is not a duplicate of 1508294 afaict. Yup, re-opened 1508294 and send it to build team. The upgrade process runs `oc adm migrate storage --include=*` prior to the upgrade. We've been told that this is a mandatory and fatal if it fails. I can't say whether this is pod or security but all the migrate does is read an object and write it back to the API ensuring that all objects adhere to the current spec and that's the part that's failing here. So we send these bugs to the owners of the respective objects to decide if there's some way to automatically resolve the problem or if we need to document it for manual reconciliation. This most likely has the same root cause as bug 1383707 - SCC is trying to mutate the pod spec on update which causes validation to fail the update, which then fails the migrate command. The PR to fix this https://github.com/openshift/origin/pull/16934 will not land until 3.8 I will let Simo decide how to update this BZ. (In reply to Simo Sorce from comment #5) > Liujia, > does this happen for 3.6 -> 3.7 upgrades too ? Not yet. Did you move it to 3.6.z because you expect a backport ? Slava, is this backportable ? > Slava, is this backportable ?
It's possible but hard and most likely will require to backport some other changes.
If the backport to 3.6.z is too difficult/risky, would it be possible to identify a workaround? The workaround is to create an SCC that will not try to modify the Pod Spec and set it as higher priority I think. Slava, do we have any doc on this ? > The workaround is to create an SCC Jordan has suggested and couple users confirmed that instead of creating a new SCC, "privileged" can be used: https://bugzilla.redhat.com/show_bug.cgi?id=1383707#c20 https://bugzilla.redhat.com/show_bug.cgi?id=1383707#c47 https://bugzilla.redhat.com/show_bug.cgi?id=1383707#c45 And don't forget to revert this priority back later. > do we have any doc on this ? On what exactly? How to modify a priority field? By using oc edit/oc patch commands. These are the typical operations: https://docs.openshift.org/latest/admin_guide/manage_scc.html#ensure-that-admission-attempts-to-use-a-specific-scc-first https://docs.openshift.org/latest/admin_guide/manage_scc.html#updating-security-context-constraints Robert, is this information sufficient ? |