Bug 2079422

Summary: Deprecated 1.25 API call
Product: OpenShift Container Platform Reporter: Ruth Netser <rnetser>
Component: NetworkingAssignee: obraunsh
Networking sub component: openshift-sdn QA Contact: zhaozhanqi <zzhao>
Status: CLOSED ERRATA Docs Contact:
Severity: high    
Priority: unspecified CC: ffernand
Version: 4.11   
Target Milestone: ---   
Target Release: 4.11.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-08-10 11:08:39 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2092193    

Description Ruth Netser 2022-04-27 14:15:07 UTC
Description of problem:
cluster-network-operator - Deprecated 1.25 API call 

Version-Release number of selected component (if applicable):
OCP 4.11.0-0.nightly-2022-04-12-072444

How reproducible:


Steps to Reproduce:
1. On an 4.11 cluster - check for deprecated API calls
2.
3.

Actual results:
{'kind': 'Event', 'apiVersion': 'audit.k8s.io/v1', 'level': 'Metadata', 'auditID': '339b91db-8652-4672-9cbc-58c45d672169', 'stage': 'ResponseComplete', 'requestURI': '/apis/policy/v1beta1/namespaces/openshift-ovn-kubernetes/poddisruptionbudgets/ovn-raft-quorum-guard?fieldManager=cluster-network-operator%2Foperconfig&force=true', 'verb': 'patch', 'user': {'username': 'system:serviceaccount:openshift-network-operator:default', 'uid': '5fc19534-e822-4c04-8947-be7a0b8b321f', 'groups': ['system:serviceaccounts', 'system:serviceaccounts:openshift-network-operator', 'system:authenticated'], 'extra': {'authentication.kubernetes.io/pod-name': ['network-operator-775fb8b8b4-w2f7w'], 'authentication.kubernetes.io/pod-uid': ['e5dfeb7e-7bf8-4177-a243-67f0e1cf2a40']}}, 'sourceIPs': ['192.168.1.254'], 'userAgent': 'cluster-network-operator/v0.0.0 (linux/amd64) kubernetes/$Format', 'objectRef': {'resource': 'poddisruptionbudgets', 'namespace': 'openshift-ovn-kubernetes', 'name': 'ovn-raft-quorum-guard', 'apiGroup': 'policy', 'apiVersion': 'v1beta1'}, 'responseStatus': {'metadata': {}, 'code': 200}, 'requestReceivedTimestamp': '2022-04-27T10:30:56.917847Z', 'stageTimestamp': '2022-04-27T10:30:56.939740Z', 'annotations': {'authorization.k8s.io/decision': 'allow', 'authorization.k8s.io/reason': 'RBAC: allowed by ClusterRoleBinding "default-account-cluster-network-operator" of ClusterRole "cluster-admin" to ServiceAccount "default/openshift-network-operator"', 'k8s.io/deprecated': 'true', 'k8s.io/removed-release': '1.25'}}


E           	{'kind': 'Event', 'apiVersion': 'audit.k8s.io/v1', 'level': 'Metadata', 'auditID': '3568ce84-2658-48b0-a8be-010688397538', 'stage': 'ResponseComplete', 'requestURI': '/apis/discovery.k8s.io/v1beta1/endpointslices?allowWatchBookmarks=true&labelSelector=%21service.kubernetes.io%2Fheadless%2C%21service.kubernetes.io%2Fservice-proxy-name&resourceVersion=36280832&timeout=8m58s&timeoutSeconds=538&watch=true', 'verb': 'watch', 'user': {'username': 'system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-controller', 'uid': '06d1e753-6f17-4d01-8acc-5b8f9258ef74', 'groups': ['system:serviceaccounts', 'system:serviceaccounts:openshift-ovn-kubernetes', 'system:authenticated'], 'extra': {'authentication.kubernetes.io/pod-name': ['ovnkube-master-pxsqt'], 'authentication.kubernetes.io/pod-uid': ['35d9589b-fbaf-4acf-b704-75adbf414248']}}, 'sourceIPs': ['192.168.1.254'], 'userAgent': 'c01-mk-411-dhtlg-master-2/ovnkube@964977ca5bbd (linux/amd64) kubernetes/', 'objectRef': {'resource': 'endpointslices', 'apiGroup': 'discovery.k8s.io', 'apiVersion': 'v1beta1'}, 'responseStatus': {'metadata': {}, 'code': 200}, 'requestReceivedTimestamp': '2022-04-27T10:47:05.213640Z', 'stageTimestamp': '2022-04-27T10:56:03.214441Z', 'annotations': {'authorization.k8s.io/decision': 'allow', 'authorization.k8s.io/reason': 'RBAC: allowed by ClusterRoleBinding "openshift-ovn-kubernetes-controller" of ClusterRole "openshift-ovn-kubernetes-controller" to ServiceAccount "ovn-kubernetes-controller/openshift-ovn-kubernetes"', 'k8s.io/deprecated': 'true', 'k8s.io/removed-release': '1.25'}}

Expected results:


Additional info:

Comment 4 zhaozhanqi 2022-05-24 01:59:56 UTC
Verified this bug on 4.11.0-0.nightly-2022-05-20-213928

$ oc get PodDisruptionBudget ovn-raft-quorum-guard -n openshift-ovn-kubernetes -o yaml
apiVersion: policy/v1
kind: PodDisruptionBudget
metadata:
  creationTimestamp: "2022-05-23T00:37:42Z"
  generation: 1
  name: ovn-raft-quorum-guard
  namespace: openshift-ovn-kubernetes
  ownerReferences:
  - apiVersion: operator.openshift.io/v1
    blockOwnerDeletion: true
    controller: true
    kind: Network
    name: cluster
    uid: 16fc5dee-d212-4823-aeca-e7335638cccd
  resourceVersion: "158504"
  uid: 3783d026-a727-40a6-ae97-eaba1d771d7f
spec:
  minAvailable: 2
  selector:
    matchLabels:
      app: ovnkube-master
status:
  conditions:
  - lastTransitionTime: "2022-05-23T06:28:00Z"
    message: ""
    observedGeneration: 1
    reason: SufficientPods
    status: "True"
    type: DisruptionAllowed
  currentHealthy: 3
  desiredHealthy: 2
  disruptionsAllowed: 1
  expectedPods: 3
  observedGeneration: 1

Comment 6 errata-xmlrpc 2022-08-10 11:08:39 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: OpenShift Container Platform 4.11.0 bug fix and security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:5069