Bug 1947801
| Summary: | Kube Storage Version Migrator APIRemovedInNextReleaseInUse info alerts display | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | Stefan Schimanski <sttts> |
| Component: | kube-storage-version-migrator | Assignee: | Stefan Schimanski <sttts> |
| Status: | CLOSED ERRATA | QA Contact: | Xingxing Xia <xxia> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 4.8 | CC: | alegrand, anpicker, aos-bugs, erooth, hongyli, juzhao, kakkoyun, kewang, lcosic, mfojtik, pkrupa, sanchezl, surbania, xxia |
| Target Milestone: | --- | Keywords: | Reopened |
| Target Release: | 4.8.0 | Flags: | kewang:
needinfo-
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1947719 | Environment: | |
| Last Closed: | 2021-07-27 22:58:29 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1947719 | ||
|
Description
Stefan Schimanski
2021-04-09 09:43:53 UTC
Moving back to MODIFIED to include build-system fix follow-up https://github.com/openshift/kubernetes-kube-storage-version-migrator/pull/175. Checking the audit logs for the listed API accesses to deprecated API versions
$ oc get clusterversion
NAME VERSION AVAILABLE PROGRESSING SINCE STATUS
version 4.8.0-0.nightly-2021-04-24-234710 True False 168m Cluster version is 4.8.0-0.nightly-2021-04-24-234710
$ masters=$(oc get no -l node-role.kubernetes.io/master | sed '1d' | awk '{print $1}')
$ oc adm node-logs $masters --path=kube-apiserver/audit.log --raw | grep -e '"k8s.io/removed-release":"1.22"' | tee dep.json
$ cat dep.json | jq -r '.user.username+": "+.requestURI' | sort | uniq | grep storages
system:serviceaccount:openshift-cluster-version:default: /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/storagestates.migration.k8s.io
There is still one left. @sttts, Could you have a look, is it expected?
This bug's PR is dev-approved and not yet merged, so I'm following issue DPTP-660 to do the pre-merge verifying for QE pre-merge verification goal of issue OCPQE-815 by using the bot to launch a cluster with the open PR. Here is the verification steps:
$ masters=$(oc get no -l node-role.kubernetes.io/master | sed '1d' | awk '{print $1}')
$ oc adm node-logs $masters --path=kube-apiserver/audit.log --raw | grep -e '"k8s.io/removed-release":"1.22"' | tee dep.json
$ cat dep.json | jq -r '.user.username+": "+.requestURI' | sort | uniq | grep storages
Nothing can be found.
$ oc get clusterversion
NAME VERSION AVAILABLE PROGRESSING SINCE STATUS
version 4.8.0-0.ci.test-2021-04-30-025007-ci-ln-8rxw1fk True False 58m Cluster version is 4.8.0-0.ci.test-2021-04-30-025007-ci-ln-8rxw1fk
So the bug is pre-merge verified. After the PR gets merged, the bug will be moved to VERIFIED by the bot automatically or, if not working, by me manually.
Verified in 4.8.0-0.nightly-2021-05-08-025039, no migration realted api access now:
$ MASTERS=$(oc get no -l node-role.kubernetes.io/master --no-headers | awk '{print $1}')
$ oc adm node-logs $MASTERS --path=kube-apiserver/audit.log --raw | grep -E '"k8s.io/removed-release":"[^"]+"' > all.log
$ grep '"k8s.io/removed-release":"1.22"' all.log > 1.22.log
$ jq -r '.user.username+": "+.requestURI' 1.22.log | grep -o '/[^?]*' | sort | uniq -c | sort -n
2 /apis/certificates.k8s.io/v1beta1/certificatesigningrequests
6 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions
12 /apis/extensions/v1beta1/ingresses
16 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/controllerconfigs.machineconfiguration.openshift.io
28 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/clusteroperators.config.openshift.io
28 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/clusterversions.config.openshift.io
28 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/containerruntimeconfigs.machineconfiguration.openshift.io
28 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/credentialsrequests.cloudcredential.openshift.io
28 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/kubeletconfigs.machineconfiguration.openshift.io
28 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/machineconfigpools.machineconfiguration.openshift.io
28 /apis/apiextensions.k8s.io/v1beta1/customresourcedefinitions/machineconfigs.machineconfiguration.openshift.io
28 /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/default-account-openshift-machine-config-operator
28 /apis/rbac.authorization.k8s.io/v1beta1/namespaces/openshift-machine-api/rolebindings/cluster-autoscaler-operator
28 /apis/rbac.authorization.k8s.io/v1beta1/namespaces/openshift-machine-api/roles/cluster-autoscaler-operator
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.8.2 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:2438 |