Description of problem: Feature gates "VolumePVCDataSource" could not be enabled Version-Release number of selected component (if applicable): 4.2.0-0.nightly-2019-08-08-002434 How reproducible: Always Steps to Reproduce: 1.Edit object featurgates apiVersion: config.openshift.io/v1 featureSet: CustomNoUpgrade kind: FeatureGate metadata: annotations: release.openshift.io/create-only: "true" creationTimestamp: "2019-08-08T04:04:33Z" generation: 13 name: cluster resourceVersion: "80689" selfLink: /apis/config.openshift.io/v1/featuregates/cluster uid: a138c9cb-b991-11e9-a186-02b8cd8a9d62 spec: customNoUpgrade: enabled: - ExpandCSIVolumes - ExpandInUsePersistentVolumes - VolumePVCDataSource - VolumeSnapshotDataSource - BlockVolume - CSIBlockVolume featureSet: CustomNoUpgrade 2.Pod kube-apiserver-ip-10-0-138-59.us-east-2.compute.internal is not running 3.Check logs as below: I0808 08:19:20.107951 1 flags.go:33] FLAG: --watch-cache-sizes="[]" I0808 08:19:20.110260 1 feature_gate.go:226] feature gates: &{map[ExpandCSIVolumes:true]} I0808 08:19:20.110311 1 feature_gate.go:226] feature gates: &{map[ExpandCSIVolumes:true ExpandInUsePersistentVolumes:true]} Error: invalid argument "VolumePVCDataSource=true" for "--feature-gates" flag: unrecognized feature gate: VolumePVCDataSource Actual results: Feature gates "VolumePVCDataSource" could not be enabled Expected results: Feature gates "VolumePVCDataSource" should be enabled Master Log: Node Log (of failed PODs): PV Dump: PVC Dump: StorageClass Dump (if StorageClass used by PV/PVC): Additional info:
VolumePVCDataSource is part of Kubernetes 1.15, moving to 4.3. We should get it during rebase, IMO no code is needed on OCP side.
Passed on 4.3.0-0.nightly-2019-10-16-222152 oc rsh kube-apiserver-ip-10-0-143-171.us-east-2.compute.internal cat /etc/kubernetes/static-pod-resources/configmaps/config/config.yaml Defaulting container name to kube-apiserver-8. Use 'oc describe pod/kube-apiserver-ip-10-0-143-171.us-east-2.compute.internal -n openshift-kube-apiserver' to see all of the containers in this pod. {"admission":{"pluginConfig":{"network.openshift.io/ExternalIPRanger":{"configuration":{"allowIngressIP":false,"apiVersion":"network.openshift.io/v1","externalIPNetworkCIDRs":null,"kind":"ExternalIPRangerAdmissionConfig"},"location":""},"network.openshift.io/RestrictedEndpointsAdmission":{"configuration":{"apiVersion":"network.openshift.io/v1","kind":"RestrictedEndpointsAdmissionConfig","restrictedCIDRs":["10.128.0.0/14","172.30.0.0/16"]}}}},"aggregatorConfig":{"proxyClientInfo":{"certFile":"/etc/kubernetes/static-pod-certs/secrets/aggregator-client/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/aggregator-client/tls.key"}},"apiServerArguments":{"cloud-provider":["aws"],"enable-aggregator-routing":["true"],"feature-gates":["KubeletPodResources=true","APIResponseCompression=true","VolumePVCDataSource=true"],"http2-max-streams-per-connection":["2000"],"kubelet-preferred-address-types":["InternalIP"],"max-mutating-requests-inflight":["600"],"max-requests-inflight":["1200"],"minimal-shutdown-duration":["70s"],"storage-backend":["etcd3"],"storage-media-type":["application/vnd.kubernetes.protobuf"]},"apiVersion":"kubecontrolplane.config.openshift.io/v1","auditConfig":{"auditFilePath":"/var/log/kube-apiserver/audit.log","enabled":true,"logFormat":"json","maximumFileSizeMegabytes":100,"maximumRetainedFiles":10,"policyConfiguration":{"apiVersion":"audit.k8s.io/v1beta1","kind":"Policy","omitStages":["RequestReceived"],"rules":[{"level":"None","resources":[{"group":"","resources":["events"]}]},{"level":"None","resources":[{"group":"oauth.openshift.io","resources":["oauthaccesstokens","oauthauthorizetokens"]}]},{"level":"None","nonResourceURLs":["/api*","/version","/healthz","/readyz"],"userGroups":["system:authenticated","system:unauthenticated"]},{"level":"Metadata","omitStages":["RequestReceived"]}]}},"authConfig":{"oauthMetadataFile":"/etc/kubernetes/static-pod-resources/configmaps/oauth-metadata/oauthMetadata","requestHeader":{"clientCA":"/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt","clientCommonNames":["kube-apiserver-proxy","system:kube-apiserver-proxy","system:openshift-aggregator"],"extraHeaderPrefixes":["X-Remote-Extra-"],"groupHeaders":["X-Remote-Group"],"usernameHeaders":["X-Remote-User"]},"webhookTokenAuthenticators":null},"consolePublicURL":"","corsAllowedOrigins":["//127\\.0\\.0\\.1(:|$)","//localhost(:|$)"],"imagePolicyConfig":{"internalRegistryHostname":"image-registry.openshift-image-registry.svc:5000"},"kind":"KubeAPIServerConfig","kubeletClientInfo":{"ca":"/etc/kubernetes/static-pod-resources/configmaps/kubelet-serving-ca/ca-bundle.crt","certFile":"/etc/kubernetes/static-pod-resources/secrets/kubelet-client/tls.crt","keyFile":"/etc/kubernetes/static-pod-resources/secrets/kubelet-client/tls.key","port":10250},"projectConfig":{"defaultNodeSelector":""},"serviceAccountPublicKeyFiles":["/etc/kubernetes/static-pod-resources/configmaps/sa-token-signing-certs"],"servicesNodePortRange":"30000-32767","servicesSubnet":"172.30.0.0/16","servingInfo":{"bindAddress":"0.0.0.0:6443","bindNetwork":"tcp4","certFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.crt","clientCA":"/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.key","maxRequestsInFlight":1200,"namedCertificates":[{"certFile":"/etc/kubernetes/static-pod-certs/secrets/localhost-serving-cert-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/localhost-serving-cert-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/external-loadbalancer-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/external-loadbalancer-serving-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/internal-loadbalancer-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/internal-loadbalancer-serving-certkey/tls.key"}],"requestTimeoutSeconds":3600},"storageConfig":{"ca":"/etc/kubernetes/static-pod-resources/configmaps/etcd-serving-ca/ca-bundle.crt","certFile":"/etc/kubernetes/static-pod-resources/secrets/etcd-client/tls.crt","keyFile":"/etc/kubernetes/static-pod-resources/secrets/etcd-client/tls.key","urls":["https://etcd-0.qe-chaoyang.qe.devcluster.openshift.com:2379","https://etcd-1.qe-chaoyang.qe.devcluster.openshift.com:2379","https://etcd-2.qe-chaoyang.qe.devcluster.openshift.com:2379"]},"userAgentMatchingConfig":{"defaultRejectionMessage":"","deniedClients":null,"requiredClients":null}}
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:0062