Bug 2094382
Summary: | Auto remediation does not work for rules rhcos4-high-master-sysctl-kernel-yama-ptrace-scope and rhcos4-sysctl-kernel-core-pattern | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | xiyuan |
Component: | Compliance Operator | Assignee: | Vincent Shen <wenshen> |
Status: | CLOSED ERRATA | QA Contact: | xiyuan |
Severity: | medium | Docs Contact: | Jeana Routh <jrouth> |
Priority: | medium | ||
Version: | 4.11 | CC: | gparente, jhrozek, jrouth, lbragsta, mrogers, suprs, wenshen, xiyuan |
Target Milestone: | --- | ||
Target Release: | 4.12.0 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
* Previously, applying automatic remediation for the `rhcos4-high-master-sysctl-kernel-yama-ptrace-scope` and `rhcos4-sysctl-kernel-core-pattern` rules resulted in subsequent failures of those rules in scan results, even though they were remediated. The issue is fixed in this release.
(link:https://bugzilla.redhat.com/show_bug.cgi?id=2094382[*BZ#2094382*])
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-07-14 12:40:58 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
xiyuan
2022-06-07 13:55:15 UTC
*** Bug 2101353 has been marked as a duplicate of this bug. *** verification pass with CO v0.1.53 and 4.11.0-rc.1 $ oc get ip NAME CSV APPROVAL APPROVED install-hksfh compliance-operator.v0.1.53 Automatic true $ oc get csv NAME DISPLAY VERSION REPLACES PHASE compliance-operator.v0.1.53 Compliance Operator 0.1.53 Succeeded elasticsearch-operator.v5.5.0 OpenShift Elasticsearch Operator 5.5.0 Succeeded $ oc get clusterversion NAME VERSION AVAILABLE PROGRESSING SINCE STATUS version 4.11.0-rc.1 True False 3h45m Cluster version is 4.11.0-rc.1 $ oc apply -f -<<EOF apiVersion: compliance.openshift.io/v1alpha1 kind: ScanSettingBinding metadata: name: tp1 profiles: - name: mod-node kind: TailoredProfile apiGroup: compliance.openshift.io/v1alpha1 settingsRef: name: default-auto-apply kind: ScanSetting apiGroup: compliance.openshift.io/v1alpha1 EOF scansettingbinding.compliance.openshift.io/tp1 created [xiyuan@MiWiFi-RA69-srv func]$ oc get suite NAME PHASE RESULT tp1 LAUNCHING NOT-AVAILABLE [xiyuan@MiWiFi-RA69-srv func]$ oc get suite -w NAME PHASE RESULT tp1 LAUNCHING NOT-AVAILABLE tp1 LAUNCHING NOT-AVAILABLE tp1 RUNNING NOT-AVAILABLE tp1 RUNNING NOT-AVAILABLE tp1 AGGREGATING NOT-AVAILABLE tp1 AGGREGATING NOT-AVAILABLE tp1 DONE NON-COMPLIANT tp1 DONE NON-COMPLIANT $ oc get mcp -w NAME CONFIG UPDATED UPDATING DEGRADED MACHINECOUNT READYMACHINECOUNT UPDATEDMACHINECOUNT DEGRADEDMACHINECOUNT AGE master rendered-master-80d4713e574127cdabcd36fc602e5325 False True False 3 0 0 0 3h52m worker rendered-worker-6c2fffbb70d45659bce31d596159ca70 False True False 3 1 1 0 3h52m master rendered-master-80d4713e574127cdabcd36fc602e5325 False True False 3 0 1 0 3h53m master rendered-master-80d4713e574127cdabcd36fc602e5325 False True True 3 0 0 1 3h53m master rendered-master-80d4713e574127cdabcd36fc602e5325 False True False 3 1 1 0 3h53m master rendered-master-80d4713e574127cdabcd36fc602e5325 False True False 3 1 1 0 3h53m worker rendered-worker-6c2fffbb70d45659bce31d596159ca70 False True False 3 2 2 0 3h53m worker rendered-worker-adaa1a35a2f5a4e7817d65eee69da29e True False False 3 3 3 0 3h59m master rendered-master-80d4713e574127cdabcd36fc602e5325 False True False 3 1 2 0 3h59m master rendered-master-80d4713e574127cdabcd36fc602e5325 False True False 3 2 2 0 3h59m ... master rendered-master-6dceaacdc42f245350f1068c13fa68f0 True False False 3 3 3 0 4h4m worker rendered-worker-adaa1a35a2f5a4e7817d65eee69da29e True False False 3 3 3 0 4h4m $ oc compliance rerun-now scansettingbinding tp1 Rerunning scans from 'tp1': mod-node-master, mod-node-worker Re-running scan 'openshift-compliance/mod-node-master' Re-running scan 'openshift-compliance/mod-node-worker' $ oc get suite -w NAME PHASE RESULT tp1 LAUNCHING NOT-AVAILABLE tp1 RUNNING NOT-AVAILABLE tp1 RUNNING NOT-AVAILABLE tp1 AGGREGATING NOT-AVAILABLE tp1 AGGREGATING NOT-AVAILABLE tp1 DONE COMPLIANT tp1 DONE COMPLIANT ^C$ oc get ccr NAME STATUS SEVERITY mod-node-master-sysctl-kernel-core-pattern PASS medium mod-node-master-sysctl-kernel-yama-ptrace-scope PASS medium mod-node-worker-sysctl-kernel-core-pattern PASS medium mod-node-worker-sysctl-kernel-yama-ptrace-scope PASS medium Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (OpenShift Compliance Operator bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:5537 |