Bug 2087686
| Summary: | Can't install submariner add-ons from UI on unsupported cloud provider | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | Red Hat Advanced Cluster Management for Kubernetes | Reporter: | dbergami | ||||||||||
| Component: | Submariner | Assignee: | Kevin Cormier <kcormier> | ||||||||||
| Status: | CLOSED ERRATA | QA Contact: | Noam Manos <nmanos> | ||||||||||
| Severity: | medium | Docs Contact: | Christopher Dawson <cdawson> | ||||||||||
| Priority: | unspecified | ||||||||||||
| Version: | rhacm-2.5 | CC: | akandath, amagrawa, kcormier, mbabushk, nyechiel | ||||||||||
| Target Milestone: | --- | Keywords: | Reopened | ||||||||||
| Target Release: | rhacm-2.5.1 | Flags: | bot-tracker-sync:
rhacm-2.5.z+
|
||||||||||
| Hardware: | ppc64le | ||||||||||||
| OS: | Unspecified | ||||||||||||
| Whiteboard: | |||||||||||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |||||||||||
| Doc Text: | Story Points: | --- | |||||||||||
| Clone Of: | Environment: | ||||||||||||
| Last Closed: | 2022-07-07 14:48:12 UTC | Type: | Bug | ||||||||||
| Regression: | --- | Mount Type: | --- | ||||||||||
| Documentation: | --- | CRM: | |||||||||||
| Verified Versions: | Category: | --- | |||||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
| Embargoed: | |||||||||||||
| Attachments: |
|
||||||||||||
|
Description
dbergami
2022-05-18 08:55:45 UTC
Created attachment 1880723 [details]
YAML is empty
Created attachment 1880724 [details]
YAML is empty
The YAML generated bythe UI should contain at least the Broker and the two ManagedClusterAddOn. This is what we do to deploy submariner from the CLI: $ oc apply -f - << EOF apiVersion: addon.open-cluster-management.io/v1alpha1 kind: ManagedClusterAddOn metadata: name: submariner namespace: local-cluster spec: installNamespace: submariner-operator EOF $ oc apply -f - << EOF apiVersion: addon.open-cluster-management.io/v1alpha1 kind: ManagedClusterAddOn metadata: name: submariner namespace: roks-cluster spec: installNamespace: submariner-operator EOF $ oc apply -f - << EOF apiVersion: submariner.io/v1alpha1 kind: Broker metadata: name: submariner-broker namespace: submariner-broker spec: globalnetEnabled: false EOF The initial YAML generated by UI contains:
apiVersion: addon.open-cluster-management.io/v1alpha1
kind: ManagedClusterAddOn
metadata:
name: submariner
namespace: ""
spec:
installNamespace: submariner-operator
---
apiVersion: submarineraddon.open-cluster-management.io/v1alpha1
kind: SubmarinerConfig
metadata:
name: submariner
namespace: ""
spec:
gatewayConfig:
gateways: 0
IPSecNATTPort: 0
NATTEnable: false
cableDriver: ""
credentialsSecret:
name: ""
---
apiVersion: submariner.io/v1alpha1
kind: Broker
metadata:
name: submariner-broker
namespace: submariner-broker
spec:
globalnetEnabled: false
but as soon as I select a target cluster that is not from a supported provider, the YAML becomes empty.
While it should remove the SubmarinerConfig entry, the other entries should be preserved.
*** Bug 2098087 has been marked as a duplicate of this bug. *** @noam manos Please verify fixed in 2.5.1. Thanks. Unfortunately, since the mentioned platform is not officially supported by the submariner yet and we don't have a resources mentioned in the BZ, we unable to verify the bug. Since we had customers complaining about this, I'd like to get it fixed in 2.5.1 if possible. Let me see if I can find some clusters and verify myself. Created attachment 1893479 [details]
ACM 2.5.1: Custom Yaml for Submariner of the unsupported platform
Created attachment 1893480 [details]
ACM 2.5.1: Unsupported platform for Submariner addon warning
Verified on ACM 2.5.1 - See screenshot attached. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:5531 |