Bug 2123386
| Summary: | when running with multus enabled PVs do not mount | |||
|---|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat OpenShift Data Foundation | Reporter: | Shawn Houston <shouston> | |
| Component: | rook | Assignee: | Madhu Rajanna <mrajanna> | |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Shivam Durgbuns <sdurgbun> | |
| Severity: | unspecified | Docs Contact: | ||
| Priority: | unspecified | |||
| Version: | 4.11 | CC: | kramdoss, mrajanna, muagarwa, ocs-bugs, odf-bz-bot, sdurgbun | |
| Target Milestone: | --- | |||
| Target Release: | ODF 4.12.0 | |||
| Hardware: | x86_64 | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | 4.12.0-74 | Doc Type: | Bug Fix | |
| Doc Text: |
Cause:
When ODF is deployed in a multus enabled cluster, the CSI holder pods are missing the service account name in the template, because of this CSI holder pods are not in a Running state and CephCSI was not able to mount the CephFS/RBD PVC to the application pods.
Consequence:
The user is not able to mount cephfs and rbd PVC to application pods in the multus enabled cluster.
Fix:
Add the missing service account name to the csi holder pods.
Result:
The application pods should be able to mount the cephfs and rbd PVC's.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2123626 (view as bug list) | Environment: | ||
| Last Closed: | 2023-02-08 14:06:28 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2123626 | |||
>ls csi-addons-controller-manager-6b68c99ff6-46jxr openshift-worker-1testmelibvirt2smh-debug csi-cephfsplugin-6ql7p openshift-worker-2testmelibvirt2smh-debug csi-cephfsplugin-b6f7w openshift-worker-3testmelibvirt2smh-debug csi-cephfsplugin-kq42r openshift-worker-4testmelibvirt2smh-debug csi-cephfsplugin-pqhxf openshift-worker-5testmelibvirt2smh-debug csi-cephfsplugin-provisioner-789f57d47f-n9w8s rook-ceph-crashcollector-openshift-worker-0.testme.libvirt4gctk csi-cephfsplugin-provisioner-789f57d47f-zq69q rook-ceph-crashcollector-openshift-worker-2.testme.libvirtpss5w csi-cephfsplugin-rk8vb rook-ceph-crashcollector-openshift-worker-3.testme.libvirtrln4z csi-cephfsplugin-tdm2t rook-ceph-crashcollector-openshift-worker-4.testme.libvirt4tstn csi-rbdplugin-cfd9f rook-ceph-crashcollector-openshift-worker-5.testme.libvirtthmvr csi-rbdplugin-j5vfc rook-ceph-mds-ocs-storagecluster-cephfilesystem-a-85f9bf54z7tt8 csi-rbdplugin-jht6p rook-ceph-mds-ocs-storagecluster-cephfilesystem-b-59fcb555nh8vl csi-rbdplugin-pkcz8 rook-ceph-mgr-a-c9cb6db96-jx25q csi-rbdplugin-provisioner-6bffcdc69c-2phkk rook-ceph-mon-a-5fcb9566dd-4zjct csi-rbdplugin-provisioner-6bffcdc69c-mjvkg rook-ceph-mon-b-75d4b95f8b-x5l6z csi-rbdplugin-v4l6w rook-ceph-mon-c-74c5867f94-l2cph csi-rbdplugin-vvf4g rook-ceph-operator-57cbb6944b-9mk9b must-gather-2gsml-helper rook-ceph-osd-0-7dd9cd7b8f-95rjw noobaa-core-0 rook-ceph-osd-1-5d545c9578-rcqx9 noobaa-db-pg-0 rook-ceph-osd-2-84585b8f87-798hw noobaa-operator-665944588c-lpc7l rook-ceph-osd-prepare-54955d151890a3817915ac92bc5a02ea-x4tql ocs-metrics-exporter-796fc9fd5c-s4sqr rook-ceph-osd-prepare-fce4f5a5dd008bc90a82dcc3bfcb47b7-2zvzj ocs-operator-b57fddd65-kl5zb rook-ceph-osd-prepare-fdfe26392dc5dcea2e67dc360ebf8a15-pbh45 odf-console-66f9bcb487-grqt6 rook-ceph-rgw-ocs-storagecluster-cephobjectstore-a-856c5fblwgr2 odf-operator-controller-manager-85df889d79-tvqw2 rook-ceph-tools-6765fc6564-j79pb - apiVersion: apps/v1 kind: DaemonSet metadata: annotations: deprecated.daemonset.template.generation: "1" creationTimestamp: "2022-09-01T12:46:40Z" generation: 1 labels: rook-version: v4.11.0-0.cf9b14df972044635a892b2a6b498961a0d78c71 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deprecated.daemonset.template.generation: {} f:labels: .: {} f:rook-version: {} f:spec: f:revisionHistoryLimit: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:k8s.v1.cni.cncf.io/networks: {} f:labels: .: {} f:app: {} f:name: {} f:spec: f:affinity: .: {} f:nodeAffinity: {} f:containers: k:{"name":"csi-cephfsplugin-holder-ocs-storagecluster-cephcluster"}: .: {} f:args: {} f:command: {} f:env: .: {} k:{"name":"CEPH_CLUSTER_NAMESPACE"}: .: {} f:name: {} f:value: {} k:{"name":"ROOK_CEPH_CSI_DRIVER_NAME"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: {} f:securityContext: .: {} f:privileged: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/lib/kubelet/plugins"}: .: {} f:mountPath: {} f:mountPropagation: {} f:name: {} f:dnsPolicy: {} f:hostPID: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"plugin-mount-dir"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} f:updateStrategy: f:type: {} manager: Go-http-client operation: Update time: "2022-09-01T12:46:40Z" name: csi-cephfsplugin-holder-ocs-storagecluster-cephcluster namespace: openshift-storage resourceVersion: "43613" uid: 3723fa6c-f834-4c73-9e65-3ed26df53701 spec: revisionHistoryLimit: 10 selector: matchLabels: app: csi-cephfsplugin-holder template: metadata: annotations: k8s.v1.cni.cncf.io/networks: openshift-storage/odf-public-cluster creationTimestamp: null labels: app: csi-cephfsplugin-holder name: -ocs-storagecluster-cephcluster spec: affinity: nodeAffinity: {} containers: - args: - ln --force --symbolic --verbose /proc/$$$/ns/net /var/lib/kubelet/plugins/$ROOK_CEPH_CSI_DRIVER_NAME/$CEPH_CLUSTER_NAMESPACE.net.ns && sleep infinity command: - /bin/sh - -c env: - name: CEPH_CLUSTER_NAMESPACE value: openshift-storage - name: ROOK_CEPH_CSI_DRIVER_NAME value: openshift-storage.cephfs.csi.ceph.com image: registry.redhat.io/odf4/cephcsi-rhel8@sha256:7d015719d62d9a26b5a8f1ddc7b1789501b8889638b711ac3cef07e355f96a59 imagePullPolicy: IfNotPresent name: csi-cephfsplugin-holder-ocs-storagecluster-cephcluster resources: {} securityContext: privileged: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /var/lib/kubelet/plugins mountPropagation: Bidirectional name: plugin-mount-dir dnsPolicy: ClusterFirst hostPID: true restartPolicy: Always schedulerName: default-scheduler securityContext: {} terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node.ocs.openshift.io/storage operator: Equal value: "true" volumes: - hostPath: path: /var/lib/kubelet/plugins type: Directory name: plugin-mount-dir updateStrategy: type: OnDelete status: currentNumberScheduled: 0 desiredNumberScheduled: 0 numberMisscheduled: 0 numberReady: 0 I dont see a csi holder pod created, which is responsible for creating a symlink `/proc/$$$/ns/net` to `/var/lib/kubelet/plugins/openshift-storage.rbd.csi.ceph.com/openshift-storage.net.ns` We don't have OCP logs to check why pods are not created for the daemonset, Need to reproduce it. Moving to Rook as no issue with cephcsi.