Bug 1806681 - openshift-apiserver should never use the bootstrap etcd member
Summary: openshift-apiserver should never use the bootstrap etcd member
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: openshift-apiserver
Version: 4.4
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
: 4.4.0
Assignee: Luis Sanchez
QA Contact: Ke Wang
URL:
Whiteboard:
Depends On: 1806671
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-02-24 18:17 UTC by Luis Sanchez
Modified: 2020-05-04 11:39 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 1806671
Environment:
Last Closed: 2020-05-04 11:39:25 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github openshift cluster-openshift-apiserver-operator pull 322 0 None closed [release-4.4] Bug 1806681: openshift-apiserver should never use the bootstrap etcd member 2020-12-10 05:17:12 UTC

Description Luis Sanchez 2020-02-24 18:17:32 UTC
+++ This bug was initially created as a clone of Bug #1806671 +++

+++ This bug was initially created as a clone of Bug #1806634 +++

Description of problem:


Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 3 Ke Wang 2020-03-02 10:17:47 UTC
Verified with OCP build, 
$ oc version
Client Version: v4.4.0
Server Version: 4.4.0-0.nightly-2020-03-01-125730
Kubernetes Version: v1.17.1

Per PR https://github.com/openshift/cluster-openshift-apiserver-operator/pull/322, checking the changed EtcdEndpointNamespace = "openshift-etcd" and EtcdEndpointName      = "host-etcd-2" in events of namespace openshift-apiserver-operator, we can found related logs, see below,

$ oc get events -n openshift-apiserver-operator | grep -E 'openshift-etcd|host-etcd2'

A: ],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.oauth.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.user.openshift.io"}],"extension":null}
B: ,{"name":"openshift-apiserver","version":"4.4.0-0.nightly-2020-03-01-125730"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.oauth.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.user.openshift.io"}],"extension":null}
13h         Warning   ObserveStorageFailed            deployment/openshift-apiserver-operator              Required endpoints/host-etcd-2 in the openshift-etcd namespace not found, falling back to default etcd service
5h2m        Warning   ObserveStorageFailed            deployment/openshift-apiserver-operator              Required endpoints/host-etcd-2 in the openshift-etcd namespace not found, falling back to default etcd service

It changed as expected.

Comment 5 errata-xmlrpc 2020-05-04 11:39:25 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:0581


Note You need to log in before you can comment on or make changes to this bug.