Bug 1738568
Summary: | Rotating node serving CSR did not get auto-approved by operator. | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Muhammad Aizuddin Zali <mzali> |
Component: | Cloud Compute | Assignee: | Jan Chaloupka <jchaloup> |
Status: | CLOSED DUPLICATE | QA Contact: | Jianwei Hou <jhou> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 4.1.z | CC: | agarcial, aos-bugs, brad.ison, clasohm, maszulik, mfojtik, mzali, nagrawal, rsandu, rsawhill |
Target Milestone: | --- | ||
Target Release: | 4.2.0 | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-27 10:38:12 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Muhammad Aizuddin Zali
2019-08-07 13:34:51 UTC
Referring to this URL[1]. "After you approve the initial CSRs, the subsequent node client CSRs are automatically approved by the cluster kube-controller-manager. " Not sure if this statement only applies when adding RHEL compute node to the cluster, but I also unable to look for information that we required CSR to be manually approved for first rotation. ( Or I might missed/overlooked this from our docs. ) [1]: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.1/html/machine_management/adding-rhel-compute#installation-approve-csrs_adding-rhel-compute. After going trough our documentation[1] again, re-read these lines, seem I might be confused between kube client certificate that auto-approved by controller and node serving certificate by machine-approver. However for better experience shouldn't this auto approve since the node already part of the cluster? "3.1.2.4. Certificate signing requests management Because your cluster has limited access to automatic machine management when you use infrastructure that you provision, you must provide a mechanism for approving cluster certificate signing requests (CSRs) after installation. The kube-controller-manager only approves the kubelet client CSRs. The machine-approver cannot guarantee the validity of a serving certificate that is requested by using kubelet credentials because it cannot confirm that the correct machine issued the request. You must determine and implement a method of verifying the validity of the kubelet serving certificate requests and approving them." [1]:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.1/html/installing/installing-on-bare-metal#installing-bare-metal > However for better experience shouldn't this auto approve since the node already part of the cluster?
Agreed. This is so dumb.
(In reply to Ryan Sawhill from comment #3) > > However for better experience shouldn't this auto approve since the node already part of the cluster? > > Agreed. This is so dumb. I believed this is fundamental features and shouldn't be skipped even in MVP. As workaround I need to create a cronjob that approve the existing node serving cert rotation request and skipped bootstrap node CSR approval request[1]. [1]:https://github.com/aizuddin85/openshift4/tree/master/serving-cert-approver-workaround Can you provide me with the full output from oc adm must-gather from your cluster? (In reply to Maciej Szulik from comment #5) > Can you provide me with the full output from oc adm must-gather from your > cluster? due to size constraint, i already uploaded to our dropbox. Additional info: 'oc adm must-gather' output uploaded to dropbox.redhat.com. /incoming/must-gather.local.7787674465236119942.tar.gz cloud team owns the auto-approver. Muhammad Aizuddin Zali, can you attach the must gather tar file (/incoming/must-gather.local.7787674465236119942.tar.gz ) into this issue? This is a known, documented, limitation on UPI installs. The cluster-machine-approver relies on data from the machine-api to authorized CSRs. When that data is not available, it doesn't preform the authorization. We're exploring ways of handling renewals without the need for the machine-api however. See: https://bugzilla.redhat.com/show_bug.cgi?id=1737611 *** This bug has been marked as a duplicate of bug 1737611 *** |