Description of problem: After running /usr/share/ansible/openshift-ansible/playbooks/openshift-checks/certificate_expiry/easy-mode.yaml and reviewing output of certificate status, there was no listing of kubelet-client-current or kubelet-server-current certificates for any node in the cluster, even though CSRs were generated and awaiting approval. *Requires Auto-Approver to be disabled in the cluster. Version-Release number of selected component (if applicable): OCP 3.11 How reproducible: Reproducible Steps to Reproduce: 1. Cluster with auto-approver disabled (openshift_master_bootstrap_auto_approve = false) 2. /etc/origin/node/certificates/kubelet-client-current or kubelet-server-current certificates should be velid 3. run /usr/share/ansible/openshift-ansible/playbooks/openshift-checks/certificate_expiry/easy-mode.yaml 4. Examine Report . identified certificates should be included in the report (whether valid, or after CSR is generated) and indicating date of expiration. Actual results: Report was run and no certificates were included from any node in the cluster from /etc/origin/node/certificates Expected results: Generated report should shows kubelet client/server certificates and their associated expiration date Additional info:
*** This bug has been marked as a duplicate of bug 1754081 ***