Bug 1862878
Summary: | The Tolerations does not work for file-integrity-operator | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | xiyuan |
Component: | File Integrity Operator | Assignee: | Matt Rogers <mrogers> |
Status: | CLOSED ERRATA | QA Contact: | xiyuan |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 4.6 | CC: | jhrozek, josorior, mrogers, nkinder, pdhamdhe |
Target Milestone: | --- | ||
Target Release: | 4.6.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-10-27 16:22:03 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
xiyuan
2020-08-03 05:41:38 UTC
tolerations don't work properly with the holdoff pods. We need to fix that. Tried with latest load, the issue in https://bugzilla.redhat.com/show_bug.cgi?id=1862878#c1 not reproduced, and the tolerations also worked as expected. $ oc get clusterversion NAME VERSION AVAILABLE PROGRESSING SINCE STATUS version 4.6.0-0.nightly-2020-08-25-222652 True False 32h Cluster version is 4.6.0-0.nightly-2020-08-25-222652 $ oc get node NAME STATUS ROLES AGE VERSION qe-weinliu46-6-vvwbv-m-0.c.openshift-qe.internal Ready master 32h v1.19.0-rc.2+aaf4ce1-dirty qe-weinliu46-6-vvwbv-m-1.c.openshift-qe.internal Ready master 32h v1.19.0-rc.2+aaf4ce1-dirty qe-weinliu46-6-vvwbv-m-2.c.openshift-qe.internal Ready master 32h v1.19.0-rc.2+aaf4ce1-dirty qe-weinliu46-6-vvwbv-w-a-0.c.openshift-qe.internal Ready worker 32h v1.19.0-rc.2+aaf4ce1-dirty qe-weinliu46-6-vvwbv-w-b-1.c.openshift-qe.internal Ready worker 32h v1.19.0-rc.2+aaf4ce1-dirty $ kubectl taint node qe-weinliu46-6-vvwbv-w-a-0.c.openshift-qe.internal key1=value1:NoSchedule node/qe-weinliu46-6-vvwbv-w-a-0.c.openshift-qe.internal tainted $ oc create -f - << EOF > apiVersion: fileintegrity.openshift.io/v1alpha1 > kind: FileIntegrity > metadata: > name: example-fileintegrity5 > namespace: openshift-file-integrity > spec: > config: > name: myconf > namespace: openshift-file-integrity > key: aide-conf > gracePeriod: 20 > debug: true > nodeSelector: > node-role.kubernetes.io/worker: "" > EOF fileintegrity.fileintegrity.openshift.io/example-fileintegrity5 created $ oc get pod NAME READY STATUS RESTARTS AGE pod/aide-ds-example-fileintegrity5-mwgr9 1/1 Running 0 10s pod/file-integrity-operator-bcd5f54c8-vrnvs 1/1 Running 0 3h20m pod/qe-weinliu46-6-vvwbv-m-0.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h20m pod/qe-weinliu46-6-vvwbv-m-1.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h20m pod/qe-weinliu46-6-vvwbv-m-2.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h20m pod/qe-weinliu46-6-vvwbv-w-a-0.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h20m pod/qe-weinliu46-6-vvwbv-w-b-1.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h20m $ oc delete fileintegrity example-fileintegrity5 fileintegrity.fileintegrity.openshift.io "example-fileintegrity5" deleted $ oc create -f - << EOF > apiVersion: fileintegrity.openshift.io/v1alpha1 > kind: FileIntegrity > metadata: > name: example-fileintegrity6 > namespace: openshift-file-integrity > spec: > config: > name: myconf > namespace: openshift-file-integrity > key: aide-conf > gracePeriod: 20 > debug: true > nodeSelector: > node-role.kubernetes.io/worker: "" > tolerations: > - key: "key1" > value: "value1" > operator: "Equal" > effect: "NoSchedule" > EOF fileintegrity.fileintegrity.openshift.io/example-fileintegrity6 created $ oc get pod -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES aide-ds-example-fileintegrity6-f6lp8 1/1 Running 0 96s 10.131.1.76 qe-weinliu46-6-vvwbv-w-a-0.c.openshift-qe.internal <none> <none> aide-ds-example-fileintegrity6-n5jl2 1/1 Running 0 104s 10.128.3.253 qe-weinliu46-6-vvwbv-w-b-1.c.openshift-qe.internal <none> <none> file-integrity-operator-bcd5f54c8-vrnvs 1/1 Running 0 3h23m 10.129.0.100 qe-weinliu46-6-vvwbv-m-0.c.openshift-qe.internal <none> <none> qe-weinliu46-6-vvwbv-m-0.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h23m 10.129.0.101 qe-weinliu46-6-vvwbv-m-0.c.openshift-qe.internal <none> <none> qe-weinliu46-6-vvwbv-m-1.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h23m 10.130.0.91 qe-weinliu46-6-vvwbv-m-1.c.openshift-qe.internal <none> <none> qe-weinliu46-6-vvwbv-m-2.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h23m 10.128.0.87 qe-weinliu46-6-vvwbv-m-2.c.openshift-qe.internal <none> <none> qe-weinliu46-6-vvwbv-w-a-0.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h23m 10.131.0.73 qe-weinliu46-6-vvwbv-w-a-0.c.openshift-qe.internal <none> <none> qe-weinliu46-6-vvwbv-w-b-1.c.openshift-qe.internal-rmholdoff 0/1 Completed 0 3h23m 10.128.3.175 qe-weinliu46-6-vvwbv-w-b-1.c.openshift-qe.internal <none> <none> So, should we close this? Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (OpenShift Container Platform 4.6 GA Images), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:4196 |