Bug 2042552
| Summary: | Kubedescheduler version is missing from the operator logs | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | RamaKasturi <knarra> |
| Component: | kube-scheduler | Assignee: | Maciej Szulik <maszulik> |
| Status: | CLOSED DUPLICATE | QA Contact: | RamaKasturi <knarra> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 4.8 | CC: | aos-bugs, mfojtik |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-01-21 15:45:01 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
RamaKasturi
2022-01-19 17:13:34 UTC
4.8 descheduler operator logs:
===================================
[knarra@knarra openshift-client-linux-4.7.0-0.nightly-2022-01-18-181356]$ oc logs -f descheduler-operator-748978bbbf-qtfkz -n openshift-kube-descheduler-operator
W0119 16:15:58.913225 1 cmd.go:204] Using insecure, self-signed certificates
I0119 16:15:59.291737 1 observer_polling.go:159] Starting file observer
I0119 16:15:59.325768 1 builder.go:240] openshift-cluster-kube-descheduler-operator version -
W0119 16:15:59.774114 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected.
W0119 16:15:59.774147 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected.
I0119 16:15:59.774637 1 leaderelection.go:243] attempting to acquire leader lease openshift-kube-descheduler-operator/openshift-cluster-kube-descheduler-operator-lock...
I0119 16:15:59.778928 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController
I0119 16:15:59.778944 1 shared_informer.go:240] Waiting for caches to sync for RequestHeaderAuthRequestController
I0119 16:15:59.778962 1 configmap_cafile_content.go:202] Starting client-ca::kube-system::extension-apiserver-authentication::client-ca-file
I0119 16:15:59.778967 1 shared_informer.go:240] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
I0119 16:15:59.778981 1 configmap_cafile_content.go:202] Starting client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
I0119 16:15:59.778987 1 shared_informer.go:240] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
I0119 16:15:59.779699 1 secure_serving.go:197] Serving securely on [::]:8443
I0119 16:15:59.779786 1 dynamic_serving_content.go:130] Starting serving-cert::/tmp/serving-cert-209773164/tls.crt::/tmp/serving-cert-209773164/tls.key
I0119 16:15:59.779810 1 tlsconfig.go:240] Starting DynamicServingCertificateController
I0119 16:15:59.788599 1 leaderelection.go:253] successfully acquired lease openshift-kube-descheduler-operator/openshift-cluster-kube-descheduler-operator-lock
I0119 16:15:59.788932 1 event.go:282] Event(v1.ObjectReference{Kind:"ConfigMap", Namespace:"openshift-kube-descheduler-operator", Name:"openshift-cluster-kube-descheduler-operator-lock", UID:"7eacf215-22d5-439c-a3cc-1975777f3a8e", APIVersion:"v1", ResourceVersion:"153264", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' descheduler-operator-748978bbbf-qtfkz_a404d582-e9a6-4745-96dd-5a9ab56da689 became leader
I0119 16:15:59.801842 1 starter.go:79] Starting informers
I0119 16:15:59.801861 1 starter.go:83] Starting log level controller
I0119 16:15:59.801868 1 starter.go:85] Starting target config reconciler
I0119 16:15:59.801890 1 target_config_reconciler.go:398] Starting TargetConfigReconciler
I0119 16:15:59.802825 1 base_controller.go:66] Waiting for caches to sync for LoggingSyncer
I0119 16:15:59.802855 1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'FastControllerResync' Controller "LoggingSyncer" resync interval is set to 0s which might lead to client request throttling
I0119 16:15:59.879044 1 shared_informer.go:247] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
I0119 16:15:59.879062 1 shared_informer.go:247] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
I0119 16:15:59.879044 1 shared_informer.go:247] Caches are synced for RequestHeaderAuthRequestController
I0119 16:15:59.902895 1 base_controller.go:72] Caches are synced for LoggingSyncer
I0119 16:15:59.902914 1 base_controller.go:109] Starting #1 worker of LoggingSyncer controller ...
E0119 16:15:59.904183 1 target_config_reconciler.go:425] key failed with : customresourcedefinitions.apiextensions.k8s.io "kubedeschedulers.operator.openshift.io" is forbidden: User "system:serviceaccount:openshift-kube-descheduler-operator:openshift-descheduler" cannot update resource "customresourcedefinitions/status" in API group "apiextensions.k8s.io" at the cluster scope
I0119 16:15:59.946095 1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/metrics -n openshift-kube-descheduler-operator because it was missing
I0119 16:15:59.963174 1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-kube-descheduler-operator because it was missing
I0119 16:16:00.027296 1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-kube-descheduler-operator because it was missing
I0119 16:16:00.104687 1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceMonitorCreated' Created ServiceMonitor.monitoring.coreos.com/v1 because it was missing
I0119 16:16:00.177610 1 event.go:282] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-descheduler-operator", Name:"cluster", UID:"f713a879-19c3-4bdb-b2de-cc2aba83ea99", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/cluster -n openshift-kube-descheduler-operator because it changed
*** This bug has been marked as a duplicate of bug 2042849 *** |