Bug 1883458
| Summary: | Move range allocations to CRD's | |||
|---|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | RamaKasturi <knarra> | |
| Component: | kube-controller-manager | Assignee: | David Eads <deads> | |
| Status: | CLOSED ERRATA | QA Contact: | RamaKasturi <knarra> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 4.6 | CC: | aos-bugs, deads, maszulik, mfojtik, mgugino, wking | |
| Target Milestone: | --- | |||
| Target Release: | 4.6.0 | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | ||
| Doc Text: | Story Points: | --- | ||
| Clone Of: | ||||
| : | 1886022 (view as bug list) | Environment: | ||
| Last Closed: | 2020-10-27 16:45:59 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 1886022 | |||
| Bug Blocks: | ||||
|
Description
RamaKasturi
2020-09-29 09:28:32 UTC
*** Bug 1882101 has been marked as a duplicate of this bug. *** Tried verifying the bug with the latest payload and i see that new resource which is "rangeallocations.security.internal.openshift.io" is getting updated instead of old one "rangeallocations.security.openshift.io" but still below errors in the cluster-policy-controller log file. Is that expected ? E1006 05:18:55.581007 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:18:55.603974 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) W1006 05:18:55.604537 1 warnings.go:67] extensions/v1beta1 Ingress is deprecated in v1.14+, unavailable in v1.22+; use networking.k8s.io/v1 Ingress E1006 05:18:56.629012 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) E1006 05:18:59.284960 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) E1006 05:19:04.471800 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) E1006 05:19:05.586309 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:19:15.608814 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:19:15.811716 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) E1006 05:19:25.604746 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:19:35.588644 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:19:35.839566 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) E1006 05:19:45.623711 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:19:55.604708 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:20:05.585542 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:20:08.914551 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) E1006 05:20:15.585260 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:20:25.585476 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:20:35.584909 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:20:45.271719 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) E1006 05:20:45.585275 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:20:55.584885 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope E1006 05:21:05.583511 1 namespace_scc_allocation_controller.go:259] rangeallocations.security.internal.openshift.io "scc-uid" is forbidden: User "system:serviceaccount:openshift-infra:namespace-security-allocation-controller" cannot get resource "rangeallocations" in API group "security.internal.openshift.io" at the cluster scope Also i do see that oc api-resources lists the new one. [knarra@knarra Openshift]$ oc api-resources | grep security.internal rangeallocations security.internal.openshift.io false RangeAllocation payload where the bug was verified : ===================================== [knarra@knarra Openshift]$ oc version Client Version: 4.6.0-202009302026.p0-eadaf89 Server Version: 4.6.0-0.nightly-2020-10-03-051134 Kubernetes Version: v1.19.0+db1fc96 Tried verifying bug with the payload below and i do not see any errors in the cluster-policy-controller.log related to rangeallocations.security.internal.openshift.io. However i am still seeing the error as below, will move the bug to verified state once check with dev. [knarra@knarra Openshift]$ oc get clusterversion NAME VERSION AVAILABLE PROGRESSING SINCE STATUS version 4.6.0-rc.2 True False 44m Cluster version is 4.6.0-rc.2 [knarra@knarra Openshift]$ oc version Client Version: 4.6.0-202010081244.p0-074039a Server Version: 4.6.0-rc.2 Kubernetes Version: v1.19.0+d59ce34 [knarra@knarra Openshift]$ oc api-resources | grep security.internal rangeallocations security.internal.openshift.io false RangeAllocation E1012 05:16:40.472868 1 reflector.go:127] k8s.io/client-go.0/tools/cache/reflector.go:156: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) Above error pasted in comment 6 is seen during bootstrap in the cluster-policy-controller.log file and it might be because kube-apiserver is temporarily unavailable. Based on comment 6 moving the bug to verified state as once the cluster is up and running i do not see the above logs present in cluster-poliy-controller log file any more. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (OpenShift Container Platform 4.6 GA Images), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:4196 The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days |