Bug 1802161

Summary: `regenerate-certificates` command blocked by error `illegal base64 data at input byte 3`
Product: OpenShift Container Platform Reporter: Lukasz Szaszkiewicz <lszaszki>
Component: kube-apiserverAssignee: Lukasz Szaszkiewicz <lszaszki>
Status: CLOSED ERRATA QA Contact: Xingxing Xia <xxia>
Severity: medium Docs Contact:
Priority: high    
Version: 4.3.0CC: aos-bugs, lszaszki, mfojtik, xxia, yinzhou
Target Milestone: ---   
Target Release: 4.3.z   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: 1785498 Environment:
Last Closed: 2020-05-27 17:00:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1785498    
Bug Blocks: 1789655    

Comment 1 Michal Fojtik 2020-05-12 10:45:27 UTC
This bug hasn't had any activity in the last 30 days. Maybe the problem got resolved, was a duplicate of something else, or became less pressing for some reason - or maybe it's still relevant but just hasn't been looked at yet.

As such, we're marking this bug as "LifecycleStale" and decreasing the severity. 

If you have further information on the current state of the bug, please update it, otherwise this bug will be automatically closed in 7 days. The information can be, for example, that the problem still occurs, that you still want the feature, that more information is needed, or that the bug is (for whatever reason) no longer relevant.

Comment 2 Lukasz Szaszkiewicz 2020-05-12 12:59:03 UTC
*** Bug 1789655 has been marked as a duplicate of this bug. ***

Comment 6 Xingxing Xia 2020-05-20 10:38:58 UTC
Verified in 4.3.0-0.nightly-2020-05-18-121719 ipi aws etcd encrypted env by following the DR doc, the issue is gone.
Just found below after following the DR, will still investigate and file bug if any:
$ oc get co | grep -v "True.*False.*False"
NAME                                       VERSION                             AVAILABLE   PROGRESSING   DEGRADED   SINCE
authentication                             4.3.0-0.nightly-2020-05-18-121719   True        True          True       8h                  machine-config                             4.3.0-0.nightly-2020-05-18-121719   False       False         True       42m
monitoring                                 4.3.0-0.nightly-2020-05-18-121719   False       True          True       47m                 operator-lifecycle-manager-packageserver   4.3.0-0.nightly-2020-05-18-121719   False       True          False      56m

Comment 7 Xingxing Xia 2020-05-25 11:21:40 UTC
> $ oc get co | grep -v "True.*False.*False"
> NAME                                       VERSION                             AVAILABLE   PROGRESSING   DEGRADED   SINCE
> authentication                             4.3.0-0.nightly-2020-05-18-121719   True        True          True       8h
> machine-config                             4.3.0-0.nightly-2020-05-18-121719   False       False         True       42m
> monitoring                                 4.3.0-0.nightly-2020-05-18-121719   False       True          True       47m
> operator-lifecycle-manager-packageserver   4.3.0-0.nightly-2020-05-18-121719   False       True          False      56m

Today retried again in 4.3.0-0.nightly-2020-05-24-223407 IPI AWS etcd encrypted env. The DR succeeds, but this time didn't see abnormal operators like previous comment.

Comment 9 errata-xmlrpc 2020-05-27 17:00:45 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:2184