Bug 1741120 - Feature gates "VolumePVCDataSource" could not be enabled
Summary: Feature gates "VolumePVCDataSource" could not be enabled
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Storage
Version: 4.2.0
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
: 4.3.0
Assignee: Jan Safranek
QA Contact: Chao Yang
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-08-14 10:13 UTC by Chao Yang
Modified: 2023-03-24 15:14 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-01-23 11:05:05 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2020:0062 0 None None None 2020-01-23 11:05:32 UTC

Description Chao Yang 2019-08-14 10:13:36 UTC
Description of problem:
Feature gates "VolumePVCDataSource" could not be enabled

Version-Release number of selected component (if applicable):
4.2.0-0.nightly-2019-08-08-002434

How reproducible:
Always
Steps to Reproduce:
1.Edit object featurgates
apiVersion: config.openshift.io/v1
featureSet: CustomNoUpgrade
kind: FeatureGate
metadata:
  annotations:
    release.openshift.io/create-only: "true"
  creationTimestamp: "2019-08-08T04:04:33Z"
  generation: 13
  name: cluster
  resourceVersion: "80689"
  selfLink: /apis/config.openshift.io/v1/featuregates/cluster
  uid: a138c9cb-b991-11e9-a186-02b8cd8a9d62
spec:
  customNoUpgrade:
    enabled:
    - ExpandCSIVolumes
    - ExpandInUsePersistentVolumes
    - VolumePVCDataSource
    - VolumeSnapshotDataSource
    - BlockVolume
    - CSIBlockVolume
  featureSet: CustomNoUpgrade
2.Pod kube-apiserver-ip-10-0-138-59.us-east-2.compute.internal is not running
3.Check logs as below:
I0808 08:19:20.107951       1 flags.go:33] FLAG: --watch-cache-sizes="[]"
I0808 08:19:20.110260       1 feature_gate.go:226] feature gates: &{map[ExpandCSIVolumes:true]}
I0808 08:19:20.110311       1 feature_gate.go:226] feature gates: &{map[ExpandCSIVolumes:true ExpandInUsePersistentVolumes:true]}
Error: invalid argument "VolumePVCDataSource=true" for "--feature-gates" flag: unrecognized feature gate: VolumePVCDataSource


Actual results:
Feature gates "VolumePVCDataSource" could not be enabled

Expected results:
Feature gates "VolumePVCDataSource" should be enabled
Master Log:

Node Log (of failed PODs):

PV Dump:

PVC Dump:

StorageClass Dump (if StorageClass used by PV/PVC):

Additional info:

Comment 1 Jan Safranek 2019-08-14 10:39:31 UTC
VolumePVCDataSource is part of Kubernetes 1.15, moving to 4.3. We should get it during rebase, IMO no code is needed on OCP side.

Comment 5 Chao Yang 2019-10-17 06:36:09 UTC
Passed on 4.3.0-0.nightly-2019-10-16-222152
oc rsh kube-apiserver-ip-10-0-143-171.us-east-2.compute.internal cat /etc/kubernetes/static-pod-resources/configmaps/config/config.yaml
Defaulting container name to kube-apiserver-8.
Use 'oc describe pod/kube-apiserver-ip-10-0-143-171.us-east-2.compute.internal -n openshift-kube-apiserver' to see all of the containers in this pod.
{"admission":{"pluginConfig":{"network.openshift.io/ExternalIPRanger":{"configuration":{"allowIngressIP":false,"apiVersion":"network.openshift.io/v1","externalIPNetworkCIDRs":null,"kind":"ExternalIPRangerAdmissionConfig"},"location":""},"network.openshift.io/RestrictedEndpointsAdmission":{"configuration":{"apiVersion":"network.openshift.io/v1","kind":"RestrictedEndpointsAdmissionConfig","restrictedCIDRs":["10.128.0.0/14","172.30.0.0/16"]}}}},"aggregatorConfig":{"proxyClientInfo":{"certFile":"/etc/kubernetes/static-pod-certs/secrets/aggregator-client/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/aggregator-client/tls.key"}},"apiServerArguments":{"cloud-provider":["aws"],"enable-aggregator-routing":["true"],"feature-gates":["KubeletPodResources=true","APIResponseCompression=true","VolumePVCDataSource=true"],"http2-max-streams-per-connection":["2000"],"kubelet-preferred-address-types":["InternalIP"],"max-mutating-requests-inflight":["600"],"max-requests-inflight":["1200"],"minimal-shutdown-duration":["70s"],"storage-backend":["etcd3"],"storage-media-type":["application/vnd.kubernetes.protobuf"]},"apiVersion":"kubecontrolplane.config.openshift.io/v1","auditConfig":{"auditFilePath":"/var/log/kube-apiserver/audit.log","enabled":true,"logFormat":"json","maximumFileSizeMegabytes":100,"maximumRetainedFiles":10,"policyConfiguration":{"apiVersion":"audit.k8s.io/v1beta1","kind":"Policy","omitStages":["RequestReceived"],"rules":[{"level":"None","resources":[{"group":"","resources":["events"]}]},{"level":"None","resources":[{"group":"oauth.openshift.io","resources":["oauthaccesstokens","oauthauthorizetokens"]}]},{"level":"None","nonResourceURLs":["/api*","/version","/healthz","/readyz"],"userGroups":["system:authenticated","system:unauthenticated"]},{"level":"Metadata","omitStages":["RequestReceived"]}]}},"authConfig":{"oauthMetadataFile":"/etc/kubernetes/static-pod-resources/configmaps/oauth-metadata/oauthMetadata","requestHeader":{"clientCA":"/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt","clientCommonNames":["kube-apiserver-proxy","system:kube-apiserver-proxy","system:openshift-aggregator"],"extraHeaderPrefixes":["X-Remote-Extra-"],"groupHeaders":["X-Remote-Group"],"usernameHeaders":["X-Remote-User"]},"webhookTokenAuthenticators":null},"consolePublicURL":"","corsAllowedOrigins":["//127\\.0\\.0\\.1(:|$)","//localhost(:|$)"],"imagePolicyConfig":{"internalRegistryHostname":"image-registry.openshift-image-registry.svc:5000"},"kind":"KubeAPIServerConfig","kubeletClientInfo":{"ca":"/etc/kubernetes/static-pod-resources/configmaps/kubelet-serving-ca/ca-bundle.crt","certFile":"/etc/kubernetes/static-pod-resources/secrets/kubelet-client/tls.crt","keyFile":"/etc/kubernetes/static-pod-resources/secrets/kubelet-client/tls.key","port":10250},"projectConfig":{"defaultNodeSelector":""},"serviceAccountPublicKeyFiles":["/etc/kubernetes/static-pod-resources/configmaps/sa-token-signing-certs"],"servicesNodePortRange":"30000-32767","servicesSubnet":"172.30.0.0/16","servingInfo":{"bindAddress":"0.0.0.0:6443","bindNetwork":"tcp4","certFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.crt","clientCA":"/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.key","maxRequestsInFlight":1200,"namedCertificates":[{"certFile":"/etc/kubernetes/static-pod-certs/secrets/localhost-serving-cert-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/localhost-serving-cert-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/external-loadbalancer-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/external-loadbalancer-serving-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/internal-loadbalancer-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/internal-loadbalancer-serving-certkey/tls.key"}],"requestTimeoutSeconds":3600},"storageConfig":{"ca":"/etc/kubernetes/static-pod-resources/configmaps/etcd-serving-ca/ca-bundle.crt","certFile":"/etc/kubernetes/static-pod-resources/secrets/etcd-client/tls.crt","keyFile":"/etc/kubernetes/static-pod-resources/secrets/etcd-client/tls.key","urls":["https://etcd-0.qe-chaoyang.qe.devcluster.openshift.com:2379","https://etcd-1.qe-chaoyang.qe.devcluster.openshift.com:2379","https://etcd-2.qe-chaoyang.qe.devcluster.openshift.com:2379"]},"userAgentMatchingConfig":{"defaultRejectionMessage":"","deniedClients":null,"requiredClients":null}}

Comment 7 errata-xmlrpc 2020-01-23 11:05:05 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:0062


Note You need to log in before you can comment on or make changes to this bug.