Bug 1934296 - ACM 2.1.4 CP4MCM Custom Certificate not working with Observability, x509: certificate signed by unknown authority
Summary: ACM 2.1.4 CP4MCM Custom Certificate not working with Observability, x509: cer...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Advanced Cluster Management for Kubernetes
Classification: Red Hat
Component: Core Services / Observability
Version: rhacm-2.1.z
Hardware: Unspecified
OS: Unspecified
unspecified
high
Target Milestone: ---
: rhacm-2.1.8
Assignee: Chunlin Yang
QA Contact: Xiang Yin
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-03-02 21:18 UTC by James Young
Modified: 2024-06-14 00:36 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-06-23 22:50:01 UTC
Target Upstream Version:
Embargoed:
cqu: qe_test_coverage+
ming: rhacm-2.1.z+
chuyang: needinfo-
chuyang: needinfo-
chuyang: needinfo-


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github open-cluster-management backlog issues 10033 0 None None None 2021-03-03 19:06:17 UTC
Red Hat Product Errata RHBA-2021:2540 0 None None None 2021-06-23 22:50:04 UTC

Comment 1 Chunlin Yang 2021-03-04 09:06:58 UTC
Thanks for report this issue. That is an known issue of ACM 2.1. Could you follow this step to resolve your issue - https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.1/html/troubleshooting/troubleshooting#symptom-observability-invalid-certification

Comment 2 Mihir Lele 2021-03-05 03:56:16 UTC
The pod multicluster-observability-operator-<pod_name> does not exist for the customer

Comment 3 Chunlin Yang 2021-03-05 05:27:29 UTC
multicluster-observability-operator-<pod_name> is in ACM namespace. for example: open-cluster-management if no changes made.

Comment 5 Chunlin Yang 2021-03-08 14:44:53 UTC
@tuado How can I access the must-gather information? I did not see a link in the case. Thanks.

Comment 7 Chunlin Yang 2021-03-09 14:47:38 UTC
@rspagnol I can access the logs and found that 
`ts=2021-02-27T16:32:46` said that error loading config file \"/spoke/hub-kubeconfig/kubeconfig
`ts=2021-02-24T20:53:57` said that certificate signed by unknown authority
from the description, I can see the certificate signed by unknown authority error at 2021-03-01 the customer environment has. It cannot connect with API server. I remembered we have the similar issue logged in server foundation. @jqiu do we have document or fix for this issue? Thanks.

Comment 9 Chunlin Yang 2021-03-22 01:30:14 UTC
@jayoung Can we setup a meeting or slack channel to discuss? We cannot reproduce it in local environment. Thanks.

Comment 11 llan 2021-03-30 00:04:47 UTC
In Mar 26th, we have an online meeting for debug. Finally we made this flow work with custom ca cert. In fact we are following steps here: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.1/html/troubleshooting/troubleshooting#symptom-observability-invalid-certification

But there are two things required attentions:
1. In MCO CR, if we set annotation mco-pause as true, observability will not be enabled in the newly-imported cluster. If we delete this annotation, the changes we made in the workaround will be reverted. So each time when users remove the mco-pause annotation and add it back, need to manually apply the steps in the workaround again.
2. In the kubeconfig secret which needs to be patched in manifestwork, it contains ca cert and token. For every imported clusters, the ca cert is the same one, but the token is different. So when applying the fix, the same kubeconfig cannot be applied to every imported clusters, each cluster should patched its' own version.

Comment 17 errata-xmlrpc 2021-06-23 22:50:01 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Red Hat Advanced Cluster Management 2.1.8 bug fix and container updates), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:2540


Note You need to log in before you can comment on or make changes to this bug.