Bug 2299443

Summary: OCS client operator running in non - provider mode need to be disabled
Product: [Red Hat Storage] Red Hat OpenShift Data Foundation Reporter: Neha Berry <nberry>
Component: odf-operatorAssignee: Nitin Goyal <nigoyal>
Status: CLOSED ERRATA QA Contact: Jilju Joy <jijoy>
Severity: urgent Docs Contact:
Priority: unspecified    
Version: 4.16CC: asriram, jijoy, muagarwa, nigoyal, odf-bz-bot, omitrani
Target Milestone: ---Keywords: AutomationBackLog
Target Release: ODF 4.16.1   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: isf-provider
Fixed In Version: 4.16.1-5 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of:
: 2300289 (view as bug list) Environment:
Last Closed: 2024-08-19 07:43:15 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2300289, 2301880, 2304235    

Description Neha Berry 2024-07-23 07:47:04 UTC
Description of problem:

Ocs-client-operator is running in internal mode and external mode, along with the pod... but it not responsible to deploy CSI. In this case, a solution is required to disable/scale down client-operator running on clusters which is not provider mode.

Opening this bug based on the discussions to provide a solution for this situation.  


Slack thread https://ibm-systems-storage.slack.com/archives/C06EPQRBM36/p1713358489879719

uninstall of internal mode is affected by the same too

https://bugzilla.redhat.com/show_bug.cgi?id=2276855

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 21 errata-xmlrpc 2024-08-19 07:43:15 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: Red Hat OpenShift Data Foundation 4.16.1 bug fix and security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2024:5547