Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 2000521

Summary: Kube-apiserver CO degraded due to failed conditional check (ConfigObservationDegraded)
Product: OpenShift Container Platform Reporter: Yash Chouksey <ychoukse>
Component: kube-apiserverAssignee: Lukasz Szaszkiewicz <lszaszki>
Status: CLOSED ERRATA QA Contact: Ke Wang <kewang>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 4.8CC: aapark, akashem, aos-bugs, lszaszki, mfojtik, nsatsia, xxia
Target Milestone: ---   
Target Release: 4.10.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-03-10 16:07:01 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2007455    
Bug Blocks:    

Comment 1 Lukasz Szaszkiewicz 2021-09-03 13:38:08 UTC
Thanks, I will coordinate with the etcd and let you know.

Comment 6 Ke Wang 2021-11-03 15:20:27 UTC
Verified with 4.10.0-0.nightly-2021-10-31-210828,
config machineNetwork CIDR with Deserved one, then bootstrap will prompt err msg:

login on bootstrp node, 
# journalctl -b -f -u bootkube.service  --since "200000 min ago"  >> /tmp/bk.log

Checked the log, got one error message for reserved IP in use, the installation was failed at last as expected.
...
Nov 02 11:57:07 localhost systemd[1]: Started Bootstrap a Kubernetes cluster.
Nov 02 11:57:22 localhost bootkube.sh[3828]: Moving OpenShift manifests in with the rest of them
Nov 02 11:57:22 localhost bootkube.sh[3828]: Rendering Cluster Version Operator Manifests...
Nov 02 11:57:22 localhost bootkube.sh[3828]: Rendering CEO Manifests...
Nov 02 11:57:24 localhost bootkube.sh[3828]: F1102 11:57:24.894685       1 render.go:61] machineNetwork CIDR is reserved and unsupported: "2001:db8::"
Nov 02 11:57:24 localhost bootkube.sh[3828]: goroutine 1 [running]:
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/klog/v2.stacks(0xc000012001, 0xc000624540, 0x6a, 0xbd)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/klog/v2.0/klog.go:1026 +0xb9
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/klog/v2.(*loggingT).output(0x3e67400, 0xc000000003, 0x0, 0x0, 0xc0003e7570, 0x1, 0x32823e4, 0x9, 0x3d, 0x414700)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/klog/v2.0/klog.go:975 +0x1e5
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/klog/v2.(*loggingT).printDepth(0x3e67400, 0xc000000003, 0x0, 0x0, 0x0, 0x0, 0x1, 0xc000300e60, 0x1, 0x1)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/klog/v2.0/klog.go:735 +0x185
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/klog/v2.(*loggingT).print(...)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/klog/v2.0/klog.go:717
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/klog/v2.Fatal(...)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/klog/v2.0/klog.go:1494
Nov 02 11:57:24 localhost bootkube.sh[3828]: github.com/openshift/cluster-etcd-operator/pkg/cmd/render.NewRenderCommand.func1.1(0xc0007dfcf8)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         github.com/openshift/cluster-etcd-operator/pkg/cmd/render/render.go:61 +0x130
Nov 02 11:57:24 localhost bootkube.sh[3828]: github.com/openshift/cluster-etcd-operator/pkg/cmd/render.NewRenderCommand.func1(0xc000460500, 0xc0004aee10, 0x0, 0x5)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         github.com/openshift/cluster-etcd-operator/pkg/cmd/render/render.go:68 +0xb5
Nov 02 11:57:24 localhost bootkube.sh[3828]: github.com/spf13/cobra.(*Command).execute(0xc000460500, 0xc0004aedc0, 0x5, 0x5, 0xc000460500, 0xc0004aedc0)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         github.com/spf13/cobra.1/command.go:860 +0x2c2
Nov 02 11:57:24 localhost bootkube.sh[3828]: github.com/spf13/cobra.(*Command).ExecuteC(0xc00026b680, 0xc00009a180, 0x3e66ec0, 0x0)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         github.com/spf13/cobra.1/command.go:974 +0x375
Nov 02 11:57:24 localhost bootkube.sh[3828]: github.com/spf13/cobra.(*Command).Execute(...)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         github.com/spf13/cobra.1/command.go:902
Nov 02 11:57:24 localhost bootkube.sh[3828]: main.main()
Nov 02 11:57:24 localhost bootkube.sh[3828]:         github.com/openshift/cluster-etcd-operator/cmd/cluster-etcd-operator/main.go:43 +0x27a
Nov 02 11:57:24 localhost bootkube.sh[3828]: goroutine 6 [chan receive]:
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/klog/v2.(*loggingT).flushDaemon(0x3e67400)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/klog/v2.0/klog.go:1169 +0x8b
Nov 02 11:57:24 localhost bootkube.sh[3828]: created by k8s.io/klog/v2.init.0
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/klog/v2.0/klog.go:420 +0xdf
Nov 02 11:57:24 localhost bootkube.sh[3828]: goroutine 102 [select]:
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/apimachinery/pkg/util/wait.BackoffUntil(0x29d3b80, 0x2bd8c80, 0xc000123bf0, 0x1, 0xc0000a6300)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/apimachinery.1/pkg/util/wait/wait.go:167 +0x118
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/apimachinery/pkg/util/wait.JitterUntil(0x29d3b80, 0x12a05f200, 0x0, 0xc000561301, 0xc0000a6300)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/apimachinery.1/pkg/util/wait/wait.go:133 +0x98
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/apimachinery/pkg/util/wait.Until(...)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/apimachinery.1/pkg/util/wait/wait.go:90
Nov 02 11:57:24 localhost bootkube.sh[3828]: k8s.io/apimachinery/pkg/util/wait.Forever(0x29d3b80, 0x12a05f200)
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/apimachinery.1/pkg/util/wait/wait.go:81 +0x4f
Nov 02 11:57:24 localhost bootkube.sh[3828]: created by k8s.io/component-base/logs.InitLogs
Nov 02 11:57:24 localhost bootkube.sh[3828]:         k8s.io/component-base.1/logs/logs.go:58 +0x8a
Nov 02 11:57:25 localhost systemd[1]: bootkube.service: Main process exited, code=exited, status=255/n/a
Nov 02 11:57:25 localhost systemd[1]: bootkube.service: Failed with result 'exit-code'.
...

Comment 9 errata-xmlrpc 2022-03-10 16:07:01 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.10.3 security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:0056