Bug 2080255
Summary: | EgressIP broken on AWS with OpenShiftSDN / latest nightly build | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Andreas Karis <akaris> |
Component: | Networking | Assignee: | Andreas Karis <akaris> |
Networking sub component: | openshift-sdn | QA Contact: | huirwang |
Status: | CLOSED ERRATA | Docs Contact: | |
Severity: | high | ||
Priority: | high | CC: | surya |
Version: | 4.11 | ||
Target Milestone: | --- | ||
Target Release: | 4.11.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-08-10 11:09:50 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Andreas Karis
2022-04-29 11:18:13 UTC
Ouch ... ~~~ [akaris@linux must-gather.local.2579743636966703416]$ omg get pods -n openshift-sdn -o wide | grep ip-10-0-207-131.ec2.internal sdn-4fc9d 2/2 Running 0 1h51m 10.0.207.131 ip-10-0-207-131.ec2.internal [akaris@linux must-gather.local.2579743636966703416]$ omg logs -n openshift-sdn sdn-4fc9d -c sdn | tail 2022-04-29T11:13:54.845914139Z E0429 11:13:54.845902 1796 reflector.go:138] k8s.io/client-go.4/tools/cache/reflector.go:167: Failed to watch *v1.Node: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope 2022-04-29T11:14:38.351143719Z W0429 11:14:38.351104 1796 reflector.go:324] k8s.io/client-go.4/tools/cache/reflector.go:167: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope 2022-04-29T11:14:38.351143719Z E0429 11:14:38.351130 1796 reflector.go:138] k8s.io/client-go.4/tools/cache/reflector.go:167: Failed to watch *v1.Node: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope 2022-04-29T11:15:28.924555741Z W0429 11:15:28.924515 1796 reflector.go:324] k8s.io/client-go.4/tools/cache/reflector.go:167: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope 2022-04-29T11:15:28.924555741Z E0429 11:15:28.924544 1796 reflector.go:138] k8s.io/client-go.4/tools/cache/reflector.go:167: Failed to watch *v1.Node: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope 2022-04-29T11:16:21.184065683Z W0429 11:16:21.184025 1796 reflector.go:324] k8s.io/client-go.4/tools/cache/reflector.go:167: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope 2022-04-29T11:16:21.184065683Z E0429 11:16:21.184053 1796 reflector.go:138] k8s.io/client-go.4/tools/cache/reflector.go:167: Failed to watch *v1.Node: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope 2022-04-29T11:17:09.420543631Z W0429 11:17:09.420504 1796 reflector.go:324] k8s.io/client-go.4/tools/cache/reflector.go:167: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope 2022-04-29T11:17:09.420543631Z E0429 11:17:09.420530 1796 reflector.go:138] k8s.io/client-go.4/tools/cache/reflector.go:167: Failed to watch *v1.Node: failed to list *v1.Node: nodes is forbidden: User "system:serviceaccount:openshift-sdn:sdn" cannot list resource "nodes" in API group "" at the cluster scope ~~~ ~~~ [akaris@linux ~]$ oc get clusterrole openshift-sdn -o yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: creationTimestamp: "2022-04-29T09:19:35Z" name: openshift-sdn ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 89267bf8-012a-412f-a783-5c5156128652 resourceVersion: "2956" uid: 0a639727-28cf-4196-9e8d-e47afcff1da4 rules: - apiGroups: - network.openshift.io resources: - clusternetworks - egressnetworkpolicies - hostsubnets - netnamespaces verbs: - get - list - watch - apiGroups: - "" resources: - namespaces - endpoints - services - pods verbs: - get - list - watch - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - list - watch - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - get - list - watch - apiGroups: - "" - events.k8s.io resources: - events verbs: - create - patch - update - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create ~~~ Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: OpenShift Container Platform 4.11.0 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:5069 |