Bug 2084610 - Newly added Kubevirt-plugin pod is missing resources.requests values (cpu/memory)
Summary: Newly added Kubevirt-plugin pod is missing resources.requests values (cpu/mem...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Container Native Virtualization (CNV)
Classification: Red Hat
Component: Installation
Version: 4.11.0
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: 4.11.0
Assignee: Oren Cohen
QA Contact: Debarati Basu-Nag
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-05-12 14:05 UTC by Debarati Basu-Nag
Modified: 2023-11-13 08:15 UTC (History)
3 users (show)

Fixed In Version: CNV v4.11.0-396, HCO v4.11.0-71
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-09-14 19:33:14 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github kubevirt hyperconverged-cluster-operator pull 1962 0 None open Add CPU and memory requests to console plugin deployment 2022-05-19 12:05:54 UTC
Red Hat Issue Tracker CNV-18221 0 None None None 2023-11-13 08:15:57 UTC
Red Hat Product Errata RHSA-2022:6526 0 None None None 2022-09-14 19:33:24 UTC

Comment 1 Oren Cohen 2022-05-17 14:44:12 UTC
We'll set cpu request of 10m, and memory request of 100Mi, similar to cli-downloads image, which is based on nginx as well.

Comment 2 Debarati Basu-Nag 2022-06-01 00:41:49 UTC
Verified against v4.11.0-426:

[cnv-qe-jenkins@c01-dbn-411-h54s6-executor ~]$ kubectl get pod kubevirt-plugin-56964467bd-p4mdd  -n openshift-cnv -o json | jq ".spec.containers[0]"
{
  "image": "registry.redhat.io/container-native-virtualization/kubevirt-console-plugin@sha256:b83184eb3aaae56b9f164366d7913d71cc8ba89c78b0f84c034ed2d66e52b7d3",
  "imagePullPolicy": "Always",
  "name": "kubevirt-plugin",
  "ports": [
    {
      "containerPort": 9443,
      "protocol": "TCP"
    }
  ],
  "resources": {
    "requests": {
      "cpu": "10m",
      "memory": "100Mi"
    }
  },
  "securityContext": {
    "allowPrivilegeEscalation": false,
    "capabilities": {
      "drop": [
        "ALL"
      ]
    },
    "runAsUser": 1000700000
  },
  "terminationMessagePath": "/dev/termination-log",
  "terminationMessagePolicy": "File",
  "volumeMounts": [
    {
      "mountPath": "/var/serving-cert",
      "name": "plugin-serving-cert",
      "readOnly": true
    },
    {
      "mountPath": "/etc/nginx/nginx.conf",
      "name": "nginx-conf",
      "readOnly": true,
      "subPath": "nginx.conf"
    },
    {
      "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount",
      "name": "kube-api-access-x8t5l",
      "readOnly": true
    }
  ]
}
[cnv-qe-jenkins@c01-dbn-411-h54s6-executor ~]$

Comment 5 errata-xmlrpc 2022-09-14 19:33:14 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: OpenShift Virtualization 4.11.0 Images security and bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:6526


Note You need to log in before you can comment on or make changes to this bug.