Bug 2030574
Summary: | console service uses older "service.alpha.openshift.io" for the service serving certificates. | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Arvind iyengar <aiyengar> |
Component: | Management Console | Assignee: | Jakub Hadvig <jhadvig> |
Status: | CLOSED ERRATA | QA Contact: | Xiyun Zhao <xiyuzhao> |
Severity: | low | Docs Contact: | |
Priority: | unspecified | ||
Version: | 4.10 | CC: | aos-bugs, yapei |
Target Milestone: | --- | ||
Target Release: | 4.10.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-03-10 16:32:55 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Arvind iyengar
2021-12-09 08:01:23 UTC
This bug has been verified on payload 4.10.0-0.nightly-2022-01-11-065245 Verification Step: 1. Log in CLI 2. Use below command to check the annotation for the service serving certificate configuration, verify if console resources are update to 'service.beta.openshift.io/serving-cert-secret-name: console-serving-cert', especially for the service/console. Also, verify the changes are not impact the correct resources, like prometheus-k8s or thanos-querier $ oc get clusterversion $ oc -n openshift-console get service/console -o yaml $ oc -n openshift-monitoring get svc prometheus-k8s -o yaml $ oc -n openshift-monitoring get svc thanos-querier -o yaml Result: 2. The console resources are being updated, check below list result for more details $ oc get clusterversion NAME VERSION AVAILABLE PROGRESSING SINCE STATUS version 4.10.0-0.nightly-2022-01-11-065245 True False 10h Cluster version is 4.10.0-0.nightly-2022-01-11-065245 $ oc -n openshift-console get service/console -o yaml apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1642029473 service.beta.openshift.io/serving-cert-secret-name: console-serving-cert <---- service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1642029473 $ oc -n openshift-monitoring get svc prometheus-k8s -o yaml apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1642029473 service.beta.openshift.io/serving-cert-secret-name: prometheus-k8s-tls <---- service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1642029473 $ oc -n openshift-monitoring get svc thanos-querier -o yaml apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1642029473 service.beta.openshift.io/serving-cert-secret-name: thanos-querier-tls <---- service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1642029473 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.10.3 security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:0056 |