Description of problem: when we do a redeploy certificates for logging component and the namespace is not "openshift-logging", the kibana route destinationCA is not replaced by the renewed certificate. Version-Release number of selected component (if applicable): openshift-ansible 3.11.135 How reproducible: - deploy logging in a different namespace, using: openshift_logging_install_logging=true _logging_namespace=logging openshift_logging_elasticsearch_namespace=logging openshift_logging_kibana_namespace=logging openshift_logging_curator_namespace=logging openshift_logging_fluentd_namespace=logging redeploy certificates. Check kibana service re deployed ca: oc get svc logging-kibana NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE logging-kibana ClusterIP 172.30.135.102 <none> 443/TCP 3h openssl s_client -connect 172.30.135.102:443 -showcerts 1 s:/CN=logging-signer-test i:/CN=logging-signer-test -----BEGIN CERTIFICATE----- MIIC2jCCAcKgAwIBAgIBATANBgkqhkiG9w0BAQsFADAeMRwwGgYDVQQDExNsb2dn aW5nLXNpZ25lci10ZXN0MB4XDTE5MDkxNjEwNDI1N1oXDTI0MDkxNDEwNDI1OFow HjEcMBoGA1UEAxMTbG9nZ2luZy1zaWduZXItdGVzdDCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBAM93K93bweZwYCZlwHWrAWt76F0xxX68sRPVjqaURYDY YEL1ZKolVDRCBRLU7ws7BDOkJuDwXMyt7ZZ9H0U1d7VQv6kiOUcI9g4V5XgmYBlQ KC18/jRGxBEY3ieQ+1AxdmD7XXdzwvlQMMhd4K+k/3MMakn1qSvei4xrNyRU/Lka RlCUFXxeF/dUf613dYMuqCVp/4K+blUGjbg51zBK43ci1S66X/ikm915dleT/XrH ComcyaNNRCJtSAgULhbOfQVDGqK0gYs79jJ/8crQ4am++B6mhzF5+bGm+NNG42v4 AbRMlkVpMVQQRbQi4tGbCBGxvFnPx/8vLoXAs8h9TqcCAwEAAaMjMCEwDgYDVR0P AQH/BAQDAgKkMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAB9p tQYk3kpdAcPplioJxz3XlxBlaUITInIZHdPN9WF6HT1Ht+t5+AXY5VHu0ZdIgjvR vcdZNqfbfJcrIoYBZ/vWKyNXI11xIfHRnk8DKd5xgMW7/2PAph5xP4Hca+Wcz7Kx h5RoSKBJ73hn1Ntt41uWylSUwvCjzBPXN8JaN61C3Zi0OIP5qI3WOYjNRtkGjm2+ gzqHjziGNDwtFdRmgqi4aZZihks9NAGQtqeFO7nvSyHAWVHxDgXlg1ZjDK9TWJ20 aYNM4EMQin4KQaoN1C0vMSDTYQQoUG5OV82Fui6lLUjCT0x86AiTuKrmR/0pO3Ia zXEc5ZJL9x6b4pPQDbs= -----END CERTIFICATE----- openssl x509 -in <former cert> -noout -text Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: sha256WithRSAEncryption Issuer: CN=logging-signer-test Validity Not Before: Sep 16 10:42:57 2019 GMT Not After : Sep 14 10:42:58 2024 GMT Subject: CN=logging-signer-test oc get route logging-kibana -o yaml | grep destinationCA -A18 destinationCACertificate: | -----BEGIN CERTIFICATE----- MIIC2jCCAcKgAwIBAgIBATANBgkqhkiG9w0BAQsFADAeMRwwGgYDVQQDExNsb2dn aW5nLXNpZ25lci10ZXN0MB4XDTE5MDgyODA5NTkzNFoXDTI0MDgyNjA5NTkzNVow HjEcMBoGA1UEAxMTbG9nZ2luZy1zaWduZXItdGVzdDCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBANayCriQpILy3tHKgfWnEppsjPjjPG4J/1SWFzzw8ley 5oeuaKzisoaifjmN8Cu61drxyXhYs3evX0mWkeNKBUcjSx00UuapwhW/RHtf+W45 mRzwNSXut6SibNCkZOi3tFNqwK8vr6BetP4FgMOyX+11tKgNAnko5LFaZMT2sUdm SL4QuuaLVK/3B8pg6XxeeqmocOkJg5NbZiscXVQx6G2GhMnmvSjks3m5dQ4f+NJS libmWNS2RlX4drKPN17L9olbEPENjJ3pPZaHBadnbbw+6N+VBFGSMYUdSzrw7iET JR01IEm/vNNtiTnzMkILDHbzGDEqEHIL+40tHh+a67kCAwEAAaMjMCEwDgYDVR0P AQH/BAQDAgKkMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBALxc Hh6O8y3+j2RIZW8VyqhP5TfCV3/YoGpOzYFmpieXlKPtZcEEwGDe+MVFjJpG+GxE WhCnwQ6JdnYzGOEmQtINmgUurqamL+QQdNudAhXnLQOnotXlGZ2/nE7UO5oFE8bZ ++GrPrJDtreLpJN2laWByMPl9B/cNoal0o+MoB2gWaUEttXUBHgpoOOeXZQzyhkd vyNmHI4UdezF/cAgYROyZ7qH2nxS2Y2pE91CvGckGLuXyOmGcYyY5IQujBByqsPs qxVyLl/1mtQ9TID3091YT8H3AMibHwHMy7J3guIcMEwO4V9vJ54LFXt5wiHbd/mn BYnsZDSJQDG8sM2L7Yo= -----END CERTIFICATE----- openssl x509 -in /tmp/routekibana -noout -text Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: sha256WithRSAEncryption Issuer: CN=logging-signer-test Validity Not Before: Aug 28 09:59:34 2019 GMT Not After : Aug 26 09:59:35 2024 GMT Subject: CN=logging-signer-test Workaround: edit route and replace destinationCACertificate by the redeployed one.
Created attachment 1616008 [details] redeploy certs logs