Bug 1891795 - the authentication operator may spam DeploymentUpdated event endlessly
Summary: the authentication operator may spam DeploymentUpdated event endlessly
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: apiserver-auth
Version: 4.6
Hardware: Unspecified
OS: Unspecified
high
medium
Target Milestone: ---
: 4.6.z
Assignee: Standa Laznicka
QA Contact: pmali
URL:
Whiteboard:
Depends On: 1891758
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-10-27 11:57 UTC by OpenShift BugZilla Robot
Modified: 2020-12-14 13:50 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-12-14 13:50:25 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github openshift cluster-authentication-operator pull 367 0 None closed [release-4.6] Bug 1891795: deployment: update event spam 2021-02-01 10:01:01 UTC
Red Hat Product Errata RHSA-2020:5259 0 None None None 2020-12-14 13:50:39 UTC

Description OpenShift BugZilla Robot 2020-10-27 11:57:41 UTC
+++ This bug was initially created as a clone of Bug #1891758 +++

Description of problem:
In cases when authentication.operator resource's generation gets updated prior to the openshift-authentication/oauth-openshift deployment's generation, 

Version-Release number of selected component (if applicable):
4.6

How reproducible:
not sure about the exact percent, but quite often

Steps to Reproduce:
1. perform a configuration step that increases the generation of the openshift-authentication/oauth-openshift deployment

Actual results:
the authentication operator keeps logging and spamming an event that the openshift-authentication/oauth-openshift deployment changed


Expected results:
the deployment change event only gets reported once

Additional info:

Comment 1 pmali 2020-11-10 05:06:32 UTC
This bug is pre-merged verified according to DPTP-660, Here is the verification steps:

$ oc get clusterversion
NAME      VERSION                                           AVAILABLE   PROGRESSING   SINCE   STATUS
version   4.6.0-0.ci.test-2020-11-10-034758-ci-ln-zvpjcz2   True        False         29m     Cluster version is 4.6.0-0.ci.test-2020-11-10-034758-ci-ln-zvpjcz2

I1110 05:01:16.368163       1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"d39a906f-a78a-4588-b8ce-ec019ab846f8", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/oauth-openshift -n openshift-authentication because it changed
I1110 05:01:20.365748       1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"d39a906f-a78a-4588-b8ce-ec019ab846f8", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/oauth-openshift -n openshift-authentication because it changed

Events not in loop and not even occurring when no changes to the deployment. Marking as Verified.

Comment 6 errata-xmlrpc 2020-12-14 13:50:25 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.6.8 security and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2020:5259


Note You need to log in before you can comment on or make changes to this bug.