Bug 1666908

Summary: cluster-ingress-operator high API request rates
Product: OpenShift Container Platform Reporter: Seth Jennings <sjenning>
Component: NetworkingAssignee: Dan Mace <dmace>
Networking sub component: router QA Contact: Hongan Li <hongli>
Status: CLOSED ERRATA Docs Contact:
Severity: urgent    
Priority: urgent CC: aos-bugs, hongkliu
Version: 4.1.0   
Target Milestone: ---   
Target Release: 4.1.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-04 10:41:55 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
cluster-ingress-operator.png none

Description Seth Jennings 2019-01-16 21:56:47 UTC
Created attachment 1521143 [details]
cluster-ingress-operator.png

The cluster-ingress-operator is submitting high levels of API request (see attached image)

In all about 20 requests per second.  This is not typical of a properly running operator.

Comment 1 Seth Jennings 2019-01-16 22:01:48 UTC
Likely addressed by https://github.com/openshift/cluster-ingress-operator/pull/105

Comment 2 Seth Jennings 2019-01-17 15:54:04 UTC
I can confirm that https://github.com/openshift/cluster-ingress-operator/pull/105 fixed this. Thanks!

Comment 3 Dan Mace 2019-01-24 12:50:40 UTC
*** Bug 1666846 has been marked as a duplicate of this bug. ***

Comment 5 Hongan Li 2019-01-25 09:16:28 UTC
the issue has been fixed as Comment 2.

and wildcard dns record also is created.

Comment 8 errata-xmlrpc 2019-06-04 10:41:55 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2019:0758