Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 2042552

Summary: Kubedescheduler version is missing from the operator logs
Product: OpenShift Container Platform Reporter: RamaKasturi <knarra>
Component: kube-schedulerAssignee: Maciej Szulik <maszulik>
Status: CLOSED DUPLICATE QA Contact: RamaKasturi <knarra>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 4.8CC: aos-bugs, mfojtik
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-01-21 15:45:01 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description RamaKasturi 2022-01-19 17:13:34 UTC
This bug was initially created as a copy of Bug #2041466

I am copying this bug because: 



Description of problem:
I see that kubedescheduler operator version is missing from the descheduler operator logs

oc logs -f descheduler-operator-594868c9b7-m2bmd -n openshift-kube-descheduler-operator
W0117 09:20:40.684846       1 cmd.go:213] Using insecure, self-signed certificates
I0117 09:20:41.067457       1 observer_polling.go:159] Starting file observer
I0117 09:20:42.092376       1 builder.go:262] openshift-cluster-kube-descheduler-operator version -
W0117 09:20:42.550827       1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected.
W0117 09:20:42.550839       1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected.


Version-Release number of selected component (if applicable):
[knarra@knarra verification-tests]$ oc get clusterversion

Kube-descheduler operator : 4.8.0-202112141153


How reproducible:
Always

Steps to Reproduce:
1. Install 4.8 cluster
2. Install 4.8 descheduler operator
3. Run the command "oc logs -f <descheduler_operator_pod> -n openshift-kube-descheduler-operator"

Actual results:
Descheduler version info is missing in the logs

   [knarra@knarra verification-tests]$ oc logs -f descheduler-operator-594868c9b7-m2bmd -n openshift-kube-descheduler-operator
W0117 09:20:40.684846       1 cmd.go:213] Using insecure, self-signed certificates
I0117 09:20:41.067457       1 observer_polling.go:159] Starting file observer
I0117 09:20:42.092376       1 builder.go:262] openshift-cluster-kube-descheduler-operator version -
W0117 09:20:42.550827       1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected.
W0117 09:20:42.550839       1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected.
W0117 09:20:42.551252       1 builder.go:321] unable to get cluster infrastructure status, using HA cluster values for leader election: infrastructures.config.openshift.io "cluster" is forbidden: User "system:serviceaccount:openshift-kube-descheduler-operator:openshift-descheduler" cannot get resource "infrastructures" in API group "config.openshift.io" at the cluster scope


Expected results:
Descheduler version should be reported correctly

Additional info:

Comment 1 RamaKasturi 2022-01-19 17:14:13 UTC
4.8 descheduler operator logs:
===================================
[knarra@knarra openshift-client-linux-4.7.0-0.nightly-2022-01-18-181356]$ oc logs -f descheduler-operator-748978bbbf-qtfkz -n openshift-kube-descheduler-operator
W0119 16:15:58.913225       1 cmd.go:204] Using insecure, self-signed certificates
I0119 16:15:59.291737       1 observer_polling.go:159] Starting file observer
I0119 16:15:59.325768       1 builder.go:240] openshift-cluster-kube-descheduler-operator version -
W0119 16:15:59.774114       1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected.
W0119 16:15:59.774147       1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected.
I0119 16:15:59.774637       1 leaderelection.go:243] attempting to acquire leader lease openshift-kube-descheduler-operator/openshift-cluster-kube-descheduler-operator-lock...
I0119 16:15:59.778928       1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController
I0119 16:15:59.778944       1 shared_informer.go:240] Waiting for caches to sync for RequestHeaderAuthRequestController
I0119 16:15:59.778962       1 configmap_cafile_content.go:202] Starting client-ca::kube-system::extension-apiserver-authentication::client-ca-file
I0119 16:15:59.778967       1 shared_informer.go:240] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
I0119 16:15:59.778981       1 configmap_cafile_content.go:202] Starting client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
I0119 16:15:59.778987       1 shared_informer.go:240] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
I0119 16:15:59.779699       1 secure_serving.go:197] Serving securely on [::]:8443
I0119 16:15:59.779786       1 dynamic_serving_content.go:130] Starting serving-cert::/tmp/serving-cert-209773164/tls.crt::/tmp/serving-cert-209773164/tls.key
I0119 16:15:59.779810       1 tlsconfig.go:240] Starting DynamicServingCertificateController
I0119 16:15:59.788599       1 leaderelection.go:253] successfully acquired lease openshift-kube-descheduler-operator/openshift-cluster-kube-descheduler-operator-lock
I0119 16:15:59.788932       1 event.go:282] Event(v1.ObjectReference{Kind:"ConfigMap", Namespace:"openshift-kube-descheduler-operator", Name:"openshift-cluster-kube-descheduler-operator-lock", UID:"7eacf215-22d5-439c-a3cc-1975777f3a8e", APIVersion:"v1", ResourceVersion:"153264", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' descheduler-operator-748978bbbf-qtfkz_a404d582-e9a6-4745-96dd-5a9ab56da689 became leader
I0119 16:15:59.801842       1 starter.go:79] Starting informers
I0119 16:15:59.801861       1 starter.go:83] Starting log level controller
I0119 16:15:59.801868       1 starter.go:85] Starting target config reconciler
I0119 16:15:59.801890       1 target_config_reconciler.go:398] Starting TargetConfigReconciler
I0119 16:15:59.802825       1 base_controller.go:66] Waiting for caches to sync for LoggingSyncer
I0119 16:15:59.802855       1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'FastControllerResync' Controller "LoggingSyncer" resync interval is set to 0s which might lead to client request throttling
I0119 16:15:59.879044       1 shared_informer.go:247] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 
I0119 16:15:59.879062       1 shared_informer.go:247] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 
I0119 16:15:59.879044       1 shared_informer.go:247] Caches are synced for RequestHeaderAuthRequestController 
I0119 16:15:59.902895       1 base_controller.go:72] Caches are synced for LoggingSyncer 
I0119 16:15:59.902914       1 base_controller.go:109] Starting #1 worker of LoggingSyncer controller ...
E0119 16:15:59.904183       1 target_config_reconciler.go:425] key failed with : customresourcedefinitions.apiextensions.k8s.io "kubedeschedulers.operator.openshift.io" is forbidden: User "system:serviceaccount:openshift-kube-descheduler-operator:openshift-descheduler" cannot update resource "customresourcedefinitions/status" in API group "apiextensions.k8s.io" at the cluster scope
I0119 16:15:59.946095       1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/metrics -n openshift-kube-descheduler-operator because it was missing
I0119 16:15:59.963174       1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-kube-descheduler-operator because it was missing
I0119 16:16:00.027296       1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-kube-descheduler-operator because it was missing
I0119 16:16:00.104687       1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceMonitorCreated' Created ServiceMonitor.monitoring.coreos.com/v1 because it was missing
I0119 16:16:00.177610       1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/cluster -n openshift-kube-descheduler-operator because it changed

Comment 2 Maciej Szulik 2022-01-21 15:45:01 UTC

*** This bug has been marked as a duplicate of bug 2042849 ***