Bug 1971835 - ApplyOperatorConfig Error while updating operator configuration
Summary: ApplyOperatorConfig Error while updating operator configuration
Keywords:
Status: CLOSED DUPLICATE of bug 1967388
Alias: None
Product: OpenShift Container Platform
Classification: Red Hat
Component: Networking
Version: 4.8
Hardware: Unspecified
OS: Unspecified
unspecified
medium
Target Milestone: ---
: ---
Assignee: Ben Bennett
QA Contact: zhaozhanqi
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-06-14 20:05 UTC by Simon
Modified: 2021-06-16 13:56 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-06-16 13:56:51 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Simon 2021-06-14 20:05:10 UTC
Description of problem:
Error while updating operator configuration: could not apply (flowcontrol.apiserver.k8s.io/v1alpha1, Kind=FlowSchema) /openshift-sdn: could not create (flowcontrol.apiserver.k8s.io/v1alpha1, Kind=FlowSchema) /openshift-sdn: the server could not find the requested resource

Version-Release number of selected component (if applicable):
4.8.0-0.nightly-2021-06-12-144803

How reproducible:
So far 1 on 1 try.

Steps to Reproduce:
1. IPI installation on AWS v. 4.1.41
2. Upgrade OCP 4.1.41 -> 4.2.36 -> 4.3.40 -> 4.4.33 -> 4.5.40 -> 4.6.34- > 4.7.16 -> 4.8.0-0.nightly-2021-06-12-144803

Actual results:
After last upgrade:
oc get co
NAME                                       VERSION                             AVAILABLE   PROGRESSING   DEGRADED   SINCE
authentication                             4.8.0-0.nightly-2021-06-12-144803   False       False         False      150m
baremetal                                  4.8.0-0.nightly-2021-06-12-144803   True        False         False      3h45m
cloud-credential                           4.8.0-0.nightly-2021-06-12-144803   True        False         False      10h
cluster-autoscaler                         4.8.0-0.nightly-2021-06-12-144803   True        False         False      10h
config-operator                            4.8.0-0.nightly-2021-06-12-144803   True        False         False      6h7m
console                                    4.8.0-0.nightly-2021-06-12-144803   True        False         False      148m
csi-snapshot-controller                    4.8.0-0.nightly-2021-06-12-144803   True        False         False      3h43m
dns                                        4.7.16                              True        False         False      4h41m
etcd                                       4.8.0-0.nightly-2021-06-12-144803   True        False         False      7h13m
image-registry                             4.8.0-0.nightly-2021-06-12-144803   True        False         False      3h18m
ingress                                    4.8.0-0.nightly-2021-06-12-144803   True        False         False      150m
insights                                   4.8.0-0.nightly-2021-06-12-144803   True        False         False      8h
kube-apiserver                             4.8.0-0.nightly-2021-06-12-144803   True        False         False      7h12m
kube-controller-manager                    4.8.0-0.nightly-2021-06-12-144803   True        False         False      7h10m
kube-scheduler                             4.8.0-0.nightly-2021-06-12-144803   True        False         False      7h11m
kube-storage-version-migrator              4.8.0-0.nightly-2021-06-12-144803   True        False         False      3h17m
machine-api                                4.8.0-0.nightly-2021-06-12-144803   True        False         False      10h
machine-approver                           4.8.0-0.nightly-2021-06-12-144803   True        False         False      6h
machine-config                             4.7.16                              True        False         False      3h5m
marketplace                                4.8.0-0.nightly-2021-06-12-144803   True        False         False      3h14m
monitoring                                 4.8.0-0.nightly-2021-06-12-144803   True        False         False      146m
network                                    4.7.16                              True        False         True       10h
node-tuning                                4.8.0-0.nightly-2021-06-12-144803   True        False         False      149m
openshift-apiserver                        4.8.0-0.nightly-2021-06-12-144803   True        False         False      3h7m
openshift-controller-manager               4.8.0-0.nightly-2021-06-12-144803   True        False         False      10h
openshift-samples                          4.8.0-0.nightly-2021-06-12-144803   True        False         False      149m
operator-lifecycle-manager                 4.8.0-0.nightly-2021-06-12-144803   True        False         False      10h
operator-lifecycle-manager-catalog         4.8.0-0.nightly-2021-06-12-144803   True        False         False      10h
operator-lifecycle-manager-packageserver   4.8.0-0.nightly-2021-06-12-144803   True        False         False      3h13m
service-ca                                 4.8.0-0.nightly-2021-06-12-144803   True        False         False      10h
service-catalog-apiserver                  4.4.33                              True        False         False      3h7m
service-catalog-controller-manager         4.4.33                              True        False         False      3h18m
storage                                    4.8.0-0.nightly-2021-06-12-144803   True        False         False      3h16m

 Name:         network
 Namespace:    
 Labels:       <none>
 Annotations:  network.operator.openshift.io/last-seen-state: {"DaemonsetStates":[],"DeploymentStates":[]}
 API Version:  config.openshift.io/v1
 Kind:         ClusterOperator
 Metadata:
   Creation Timestamp:  2021-06-12T19:01:57Z
   Generation:          1
   Resource Version:    346301
   UID:                 a90affd4-cbb0-11eb-ad4d-02a832e61a34
 Spec:
 Status:
   Conditions:
     Last Transition Time:  2021-06-13T02:35:23Z
     Message:               Error while updating operator configuration: could not apply (flowcontrol.apiserver.k8s.io/v1alpha1, Kind=FlowSchema) /openshift-sdn: could not create (flowcontrol.apiserver.k8s.io/v1alpha1, Kind=FlowSchema) /openshift-sdn: the server could not find the requested resource
     Reason:                ApplyOperatorConfig
     Status:                True
     Type:                  Degraded
     Last Transition Time:  2021-06-13T02:14:04Z
     Status:                False
     Type:                  Progressing
     Last Transition Time:  2021-06-12T19:02:35Z
     Status:                True
     Type:                  Available
     Last Transition Time:  2021-06-12T20:39:52Z
     Status:                True
     Type:                  Upgradeable
     Last Transition Time:  2021-06-13T01:41:44Z
     Status:                False
     Type:                  ManagementStateDegraded
   Extension:               <nil>
   Related Objects:
     Group:      
     Name:       applied-cluster
     Namespace:  openshift-network-operator
     Resource:   configmaps
     Group:      apiextensions.k8s.io
     Name:       network-attachment-definitions.k8s.cni.cncf.io
     Resource:   customresourcedefinitions
     Group:      apiextensions.k8s.io
     Name:       ippools.whereabouts.cni.cncf.io
     Resource:   customresourcedefinitions
     Group:      apiextensions.k8s.io
     Name:       overlappingrangeipreservations.whereabouts.cni.cncf.io
     Resource:   customresourcedefinitions
     Group:      
     Name:       openshift-multus
     Resource:   namespaces
     Group:      rbac.authorization.k8s.io
     Name:       multus
     Resource:   clusterroles
     Group:      
     Name:       multus
     Namespace:  openshift-multus
     Resource:   serviceaccounts
     Group:      rbac.authorization.k8s.io
     Name:       multus
     Resource:   clusterrolebindings
     Group:      rbac.authorization.k8s.io
     Name:       multus-whereabouts
     Resource:   clusterrolebindings
     Group:      rbac.authorization.k8s.io
     Name:       whereabouts-cni
     Resource:   clusterroles
     Group:      
     Name:       cni-binary-copy-script
     Namespace:  openshift-multus
     Resource:   configmaps
     Group:      apps
     Name:       multus
     Namespace:  openshift-multus
     Resource:   daemonsets
     Group:      
     Name:       metrics-daemon-sa
     Namespace:  openshift-multus
     Resource:   serviceaccounts
     Group:      rbac.authorization.k8s.io
     Name:       metrics-daemon-role
     Resource:   clusterroles
     Group:      rbac.authorization.k8s.io
     Name:       metrics-daemon-sa-rolebinding
     Resource:   clusterrolebindings
     Group:      apps
     Name:       network-metrics-daemon
     Namespace:  openshift-multus
     Resource:   daemonsets
     Group:      monitoring.coreos.com
     Name:       monitor-network
     Namespace:  openshift-multus
     Resource:   servicemonitors
     Group:      
     Name:       network-metrics-service
     Namespace:  openshift-multus
     Resource:   services
     Group:      rbac.authorization.k8s.io
     Name:       prometheus-k8s
     Namespace:  openshift-multus
     Resource:   roles
     Group:      rbac.authorization.k8s.io
     Name:       prometheus-k8s
     Namespace:  openshift-multus
     Resource:   rolebindings
     Group:      
     Name:       multus-admission-controller
     Namespace:  openshift-multus
     Resource:   services
     Group:      rbac.authorization.k8s.io
     Name:       multus-admission-controller-webhook
     Resource:   clusterroles
     Group:      rbac.authorization.k8s.io
     Name:       multus-admission-controller-webhook
     Resource:   clusterrolebindings
     Group:      admissionregistration.k8s.io
     Name:       multus.openshift.io
     Resource:   validatingwebhookconfigurations
     Group:      apps
     Name:       multus-admission-controller
     Namespace:  openshift-multus
     Resource:   daemonsets
     Group:      monitoring.coreos.com
     Name:       monitor-multus-admission-controller
     Namespace:  openshift-multus
     Resource:   servicemonitors
     Group:      rbac.authorization.k8s.io
     Name:       prometheus-k8s
     Namespace:  openshift-multus
     Resource:   roles
     Group:      rbac.authorization.k8s.io
     Name:       prometheus-k8s
     Namespace:  openshift-multus
     Resource:   rolebindings
     Group:      monitoring.coreos.com
     Name:       prometheus-k8s-rules
     Namespace:  openshift-multus
     Resource:   prometheusrules
     Group:      
     Name:       openshift-sdn
     Resource:   namespaces
     Group:      apiextensions.k8s.io
     Name:       clusternetworks.network.openshift.io
     Resource:   customresourcedefinitions
     Group:      apiextensions.k8s.io
     Name:       hostsubnets.network.openshift.io
     Resource:   customresourcedefinitions
     Group:      apiextensions.k8s.io
     Name:       netnamespaces.network.openshift.io
     Resource:   customresourcedefinitions
     Group:      apiextensions.k8s.io
     Name:       egressnetworkpolicies.network.openshift.io
     Resource:   customresourcedefinitions
     Group:      rbac.authorization.k8s.io
     Name:       openshift-sdn
     Resource:   clusterroles
     Group:      
     Name:       sdn
     Namespace:  openshift-sdn
     Resource:   serviceaccounts
     Group:      rbac.authorization.k8s.io
     Name:       openshift-sdn
     Resource:   clusterrolebindings
     Group:      
     Name:       sdn-controller
     Namespace:  openshift-sdn
     Resource:   serviceaccounts
     Group:      rbac.authorization.k8s.io
     Name:       openshift-sdn-controller
     Resource:   clusterroles
     Group:      rbac.authorization.k8s.io
     Name:       openshift-sdn-controller
     Resource:   clusterrolebindings
     Group:      rbac.authorization.k8s.io
     Name:       openshift-sdn-controller-leaderelection
     Namespace:  openshift-sdn
     Resource:   roles
     Group:      rbac.authorization.k8s.io
     Name:       openshift-sdn-controller-leaderelection
     Namespace:  openshift-sdn
     Resource:   rolebindings
     Group:      network.openshift.io
     Name:       default
     Resource:   clusternetworks
     Group:      flowcontrol.apiserver.k8s.io
     Name:       openshift-sdn
     Resource:   flowschemas
     Group:      monitoring.coreos.com
     Name:       networking-rules
     Namespace:  openshift-sdn
     Resource:   prometheusrules
     Group:      apps
     Name:       sdn-controller
     Namespace:  openshift-sdn
     Resource:   daemonsets
     Group:      monitoring.coreos.com
     Name:       monitor-sdn
     Namespace:  openshift-sdn
     Resource:   servicemonitors
     Group:      
     Name:       sdn
     Namespace:  openshift-sdn
     Resource:   services
     Group:      rbac.authorization.k8s.io
     Name:       prometheus-k8s
     Namespace:  openshift-sdn
     Resource:   roles
     Group:      rbac.authorization.k8s.io
     Name:       prometheus-k8s
     Namespace:  openshift-sdn
     Resource:   rolebindings
     Group:      
     Name:       openshift-host-network
     Resource:   namespaces
     Group:      
     Name:       host-network-namespace-quotas
     Namespace:  openshift-host-network
     Resource:   resourcequotas
     Group:      
     Name:       sdn-config
     Namespace:  openshift-sdn
     Resource:   configmaps
     Group:      apps
     Name:       sdn
     Namespace:  openshift-sdn
     Resource:   daemonsets
     Group:      
     Name:       openshift-network-diagnostics
     Resource:   namespaces
     Group:      
     Name:       network-diagnostics
     Namespace:  openshift-network-diagnostics
     Resource:   serviceaccounts
     Group:      rbac.authorization.k8s.io
     Name:       network-diagnostics
     Namespace:  openshift-network-diagnostics
     Resource:   roles
     Group:      rbac.authorization.k8s.io
     Name:       network-diagnostics
     Namespace:  openshift-network-diagnostics
     Resource:   rolebindings
     Group:      rbac.authorization.k8s.io
     Name:       network-diagnostics
     Resource:   clusterroles
     Group:      rbac.authorization.k8s.io
     Name:       network-diagnostics
     Resource:   clusterrolebindings
     Group:      rbac.authorization.k8s.io
     Name:       network-diagnostics
     Namespace:  kube-system
     Resource:   rolebindings
     Group:      apps
     Name:       network-check-source
     Namespace:  openshift-network-diagnostics
     Resource:   deployments
     Group:      
     Name:       network-check-source
     Namespace:  openshift-network-diagnostics
     Resource:   services
     Group:      monitoring.coreos.com
     Name:       network-check-source
     Namespace:  openshift-network-diagnostics
     Resource:   servicemonitors
     Group:      apps
     Name:       network-check-target
     Namespace:  openshift-network-diagnostics
     Resource:   daemonsets
     Group:      
     Name:       network-check-target
     Namespace:  openshift-network-diagnostics
     Resource:   services
     Group:      
     Name:       openshift-network-operator
     Resource:   namespaces
     Group:      operator.openshift.io
     Name:       cluster
     Resource:   networks
     Group:      networking.k8s.io
     Name:       
     Resource:   NetworkPolicy
     Group:      k8s.ovn.org
     Name:       
     Resource:   EgressFirewall
     Group:      k8s.ovn.org
     Name:       
     Resource:   EgressIP
   Versions:
     Name:     operator
     Version:  4.7.16
 Events:       <none>

Expected results:
All operators will be updated.

Additional info:

Comment 2 Alexander Constantinescu 2021-06-16 13:56:51 UTC

*** This bug has been marked as a duplicate of bug 1967388 ***


Note You need to log in before you can comment on or make changes to this bug.