Description of problem: Error while updating operator configuration: could not apply (flowcontrol.apiserver.k8s.io/v1alpha1, Kind=FlowSchema) /openshift-sdn: could not create (flowcontrol.apiserver.k8s.io/v1alpha1, Kind=FlowSchema) /openshift-sdn: the server could not find the requested resource Version-Release number of selected component (if applicable): 4.8.0-0.nightly-2021-06-12-144803 How reproducible: So far 1 on 1 try. Steps to Reproduce: 1. IPI installation on AWS v. 4.1.41 2. Upgrade OCP 4.1.41 -> 4.2.36 -> 4.3.40 -> 4.4.33 -> 4.5.40 -> 4.6.34- > 4.7.16 -> 4.8.0-0.nightly-2021-06-12-144803 Actual results: After last upgrade: oc get co NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE authentication 4.8.0-0.nightly-2021-06-12-144803 False False False 150m baremetal 4.8.0-0.nightly-2021-06-12-144803 True False False 3h45m cloud-credential 4.8.0-0.nightly-2021-06-12-144803 True False False 10h cluster-autoscaler 4.8.0-0.nightly-2021-06-12-144803 True False False 10h config-operator 4.8.0-0.nightly-2021-06-12-144803 True False False 6h7m console 4.8.0-0.nightly-2021-06-12-144803 True False False 148m csi-snapshot-controller 4.8.0-0.nightly-2021-06-12-144803 True False False 3h43m dns 4.7.16 True False False 4h41m etcd 4.8.0-0.nightly-2021-06-12-144803 True False False 7h13m image-registry 4.8.0-0.nightly-2021-06-12-144803 True False False 3h18m ingress 4.8.0-0.nightly-2021-06-12-144803 True False False 150m insights 4.8.0-0.nightly-2021-06-12-144803 True False False 8h kube-apiserver 4.8.0-0.nightly-2021-06-12-144803 True False False 7h12m kube-controller-manager 4.8.0-0.nightly-2021-06-12-144803 True False False 7h10m kube-scheduler 4.8.0-0.nightly-2021-06-12-144803 True False False 7h11m kube-storage-version-migrator 4.8.0-0.nightly-2021-06-12-144803 True False False 3h17m machine-api 4.8.0-0.nightly-2021-06-12-144803 True False False 10h machine-approver 4.8.0-0.nightly-2021-06-12-144803 True False False 6h machine-config 4.7.16 True False False 3h5m marketplace 4.8.0-0.nightly-2021-06-12-144803 True False False 3h14m monitoring 4.8.0-0.nightly-2021-06-12-144803 True False False 146m network 4.7.16 True False True 10h node-tuning 4.8.0-0.nightly-2021-06-12-144803 True False False 149m openshift-apiserver 4.8.0-0.nightly-2021-06-12-144803 True False False 3h7m openshift-controller-manager 4.8.0-0.nightly-2021-06-12-144803 True False False 10h openshift-samples 4.8.0-0.nightly-2021-06-12-144803 True False False 149m operator-lifecycle-manager 4.8.0-0.nightly-2021-06-12-144803 True False False 10h operator-lifecycle-manager-catalog 4.8.0-0.nightly-2021-06-12-144803 True False False 10h operator-lifecycle-manager-packageserver 4.8.0-0.nightly-2021-06-12-144803 True False False 3h13m service-ca 4.8.0-0.nightly-2021-06-12-144803 True False False 10h service-catalog-apiserver 4.4.33 True False False 3h7m service-catalog-controller-manager 4.4.33 True False False 3h18m storage 4.8.0-0.nightly-2021-06-12-144803 True False False 3h16m Name: network Namespace: Labels: <none> Annotations: network.operator.openshift.io/last-seen-state: {"DaemonsetStates":[],"DeploymentStates":[]} API Version: config.openshift.io/v1 Kind: ClusterOperator Metadata: Creation Timestamp: 2021-06-12T19:01:57Z Generation: 1 Resource Version: 346301 UID: a90affd4-cbb0-11eb-ad4d-02a832e61a34 Spec: Status: Conditions: Last Transition Time: 2021-06-13T02:35:23Z Message: Error while updating operator configuration: could not apply (flowcontrol.apiserver.k8s.io/v1alpha1, Kind=FlowSchema) /openshift-sdn: could not create (flowcontrol.apiserver.k8s.io/v1alpha1, Kind=FlowSchema) /openshift-sdn: the server could not find the requested resource Reason: ApplyOperatorConfig Status: True Type: Degraded Last Transition Time: 2021-06-13T02:14:04Z Status: False Type: Progressing Last Transition Time: 2021-06-12T19:02:35Z Status: True Type: Available Last Transition Time: 2021-06-12T20:39:52Z Status: True Type: Upgradeable Last Transition Time: 2021-06-13T01:41:44Z Status: False Type: ManagementStateDegraded Extension: <nil> Related Objects: Group: Name: applied-cluster Namespace: openshift-network-operator Resource: configmaps Group: apiextensions.k8s.io Name: network-attachment-definitions.k8s.cni.cncf.io Resource: customresourcedefinitions Group: apiextensions.k8s.io Name: ippools.whereabouts.cni.cncf.io Resource: customresourcedefinitions Group: apiextensions.k8s.io Name: overlappingrangeipreservations.whereabouts.cni.cncf.io Resource: customresourcedefinitions Group: Name: openshift-multus Resource: namespaces Group: rbac.authorization.k8s.io Name: multus Resource: clusterroles Group: Name: multus Namespace: openshift-multus Resource: serviceaccounts Group: rbac.authorization.k8s.io Name: multus Resource: clusterrolebindings Group: rbac.authorization.k8s.io Name: multus-whereabouts Resource: clusterrolebindings Group: rbac.authorization.k8s.io Name: whereabouts-cni Resource: clusterroles Group: Name: cni-binary-copy-script Namespace: openshift-multus Resource: configmaps Group: apps Name: multus Namespace: openshift-multus Resource: daemonsets Group: Name: metrics-daemon-sa Namespace: openshift-multus Resource: serviceaccounts Group: rbac.authorization.k8s.io Name: metrics-daemon-role Resource: clusterroles Group: rbac.authorization.k8s.io Name: metrics-daemon-sa-rolebinding Resource: clusterrolebindings Group: apps Name: network-metrics-daemon Namespace: openshift-multus Resource: daemonsets Group: monitoring.coreos.com Name: monitor-network Namespace: openshift-multus Resource: servicemonitors Group: Name: network-metrics-service Namespace: openshift-multus Resource: services Group: rbac.authorization.k8s.io Name: prometheus-k8s Namespace: openshift-multus Resource: roles Group: rbac.authorization.k8s.io Name: prometheus-k8s Namespace: openshift-multus Resource: rolebindings Group: Name: multus-admission-controller Namespace: openshift-multus Resource: services Group: rbac.authorization.k8s.io Name: multus-admission-controller-webhook Resource: clusterroles Group: rbac.authorization.k8s.io Name: multus-admission-controller-webhook Resource: clusterrolebindings Group: admissionregistration.k8s.io Name: multus.openshift.io Resource: validatingwebhookconfigurations Group: apps Name: multus-admission-controller Namespace: openshift-multus Resource: daemonsets Group: monitoring.coreos.com Name: monitor-multus-admission-controller Namespace: openshift-multus Resource: servicemonitors Group: rbac.authorization.k8s.io Name: prometheus-k8s Namespace: openshift-multus Resource: roles Group: rbac.authorization.k8s.io Name: prometheus-k8s Namespace: openshift-multus Resource: rolebindings Group: monitoring.coreos.com Name: prometheus-k8s-rules Namespace: openshift-multus Resource: prometheusrules Group: Name: openshift-sdn Resource: namespaces Group: apiextensions.k8s.io Name: clusternetworks.network.openshift.io Resource: customresourcedefinitions Group: apiextensions.k8s.io Name: hostsubnets.network.openshift.io Resource: customresourcedefinitions Group: apiextensions.k8s.io Name: netnamespaces.network.openshift.io Resource: customresourcedefinitions Group: apiextensions.k8s.io Name: egressnetworkpolicies.network.openshift.io Resource: customresourcedefinitions Group: rbac.authorization.k8s.io Name: openshift-sdn Resource: clusterroles Group: Name: sdn Namespace: openshift-sdn Resource: serviceaccounts Group: rbac.authorization.k8s.io Name: openshift-sdn Resource: clusterrolebindings Group: Name: sdn-controller Namespace: openshift-sdn Resource: serviceaccounts Group: rbac.authorization.k8s.io Name: openshift-sdn-controller Resource: clusterroles Group: rbac.authorization.k8s.io Name: openshift-sdn-controller Resource: clusterrolebindings Group: rbac.authorization.k8s.io Name: openshift-sdn-controller-leaderelection Namespace: openshift-sdn Resource: roles Group: rbac.authorization.k8s.io Name: openshift-sdn-controller-leaderelection Namespace: openshift-sdn Resource: rolebindings Group: network.openshift.io Name: default Resource: clusternetworks Group: flowcontrol.apiserver.k8s.io Name: openshift-sdn Resource: flowschemas Group: monitoring.coreos.com Name: networking-rules Namespace: openshift-sdn Resource: prometheusrules Group: apps Name: sdn-controller Namespace: openshift-sdn Resource: daemonsets Group: monitoring.coreos.com Name: monitor-sdn Namespace: openshift-sdn Resource: servicemonitors Group: Name: sdn Namespace: openshift-sdn Resource: services Group: rbac.authorization.k8s.io Name: prometheus-k8s Namespace: openshift-sdn Resource: roles Group: rbac.authorization.k8s.io Name: prometheus-k8s Namespace: openshift-sdn Resource: rolebindings Group: Name: openshift-host-network Resource: namespaces Group: Name: host-network-namespace-quotas Namespace: openshift-host-network Resource: resourcequotas Group: Name: sdn-config Namespace: openshift-sdn Resource: configmaps Group: apps Name: sdn Namespace: openshift-sdn Resource: daemonsets Group: Name: openshift-network-diagnostics Resource: namespaces Group: Name: network-diagnostics Namespace: openshift-network-diagnostics Resource: serviceaccounts Group: rbac.authorization.k8s.io Name: network-diagnostics Namespace: openshift-network-diagnostics Resource: roles Group: rbac.authorization.k8s.io Name: network-diagnostics Namespace: openshift-network-diagnostics Resource: rolebindings Group: rbac.authorization.k8s.io Name: network-diagnostics Resource: clusterroles Group: rbac.authorization.k8s.io Name: network-diagnostics Resource: clusterrolebindings Group: rbac.authorization.k8s.io Name: network-diagnostics Namespace: kube-system Resource: rolebindings Group: apps Name: network-check-source Namespace: openshift-network-diagnostics Resource: deployments Group: Name: network-check-source Namespace: openshift-network-diagnostics Resource: services Group: monitoring.coreos.com Name: network-check-source Namespace: openshift-network-diagnostics Resource: servicemonitors Group: apps Name: network-check-target Namespace: openshift-network-diagnostics Resource: daemonsets Group: Name: network-check-target Namespace: openshift-network-diagnostics Resource: services Group: Name: openshift-network-operator Resource: namespaces Group: operator.openshift.io Name: cluster Resource: networks Group: networking.k8s.io Name: Resource: NetworkPolicy Group: k8s.ovn.org Name: Resource: EgressFirewall Group: k8s.ovn.org Name: Resource: EgressIP Versions: Name: operator Version: 4.7.16 Events: <none> Expected results: All operators will be updated. Additional info:
*** This bug has been marked as a duplicate of bug 1967388 ***