Description of problem (please be detailed as possible and provide log snippests): It's a newly deployed cluster where busybox-workloads-1,2,3&6 are running on C1 and busybox-workloads4&5 are running on C2 for 3+ days. No failover/relocate operation has been performed yet. Version of all relevant components (if applicable): [amagrawa@amagrawa ~]$ oc version Client Version: 4.8.0-0.nightly-2021-05-08-132247 Server Version: 4.11.0-0.nightly-2022-08-04-081314 Kubernetes Version: v1.24.0+9546431 ODF 4.11.0-133 sh-4.4$ ceph -v ceph version 16.2.8-84.el8cp (c2980f2fd700e979d41b4bad2939bb90f0fe435c) pacific (stable) ACM 2.5.2 Does this issue impact your ability to continue to work with the product (please explain in detail what is the user impact)? Yes, failover/relocate operations can not be performed Is there any workaround available to the best of your knowledge? No Rate from 1 - 5 the complexity of the scenario you performed that caused this bug (1 - very simple, 5 - very complex)? Can this issue reproducible? Can this issue reproduce from the UI? If this is a regression, please provide more details to justify this: Steps to Reproduce: 1. Deploy a RDR setup with latency of 150ms 2. Run the workloads for 3-4 days 3. Check the mirroringstatus on both the managed clusters and also verify the submariner connectivity between the managed clusters (which should be fine). Actual results: Daemon health is in warning though connectivity between both the managed clusters is fine C1- [amagrawa@amagrawa ~]$ subctl show connections Cluster "api-amagrawa-c1-qe-rh-ocs-com:6443" ✓ Showing Connections GATEWAY CLUSTER REMOTE IP NAT CABLE DRIVER SUBNETS STATUS RTT avg. compute-1 amagrawa-c2 10.1.160.81 no libreswan 172.30.0.0/16, 10.128.0.0/14 connected 150.465665ms Cluster "amagrawa-c1" ✓ Showing Connections GATEWAY CLUSTER REMOTE IP NAT CABLE DRIVER SUBNETS STATUS RTT avg. compute-1 amagrawa-c2 10.1.160.81 no libreswan 172.30.0.0/16, 10.128.0.0/14 connected 150.465665ms [amagrawa@amagrawa ~]$ oc get pods -n submariner-operator NAME READY STATUS RESTARTS AGE my-catalog-source-ctn9h 1/1 Running 0 17h submariner-addon-545b6dd7fd-kvdss 1/1 Running 0 148m submariner-gateway-vx76m 1/1 Running 0 148m submariner-lighthouse-agent-866c47c9bf-j9v2c 1/1 Running 0 148m submariner-lighthouse-coredns-64c6b6f674-4655r 1/1 Running 0 148m submariner-lighthouse-coredns-64c6b6f674-mtdzr 1/1 Running 0 148m submariner-operator-7b69f86c9d-frl4l 1/1 Running 0 148m submariner-routeagent-5mw2l 1/1 Running 0 148m submariner-routeagent-7kvgq 1/1 Running 0 148m submariner-routeagent-86zqm 1/1 Running 0 148m submariner-routeagent-dlfb7 1/1 Running 0 148m submariner-routeagent-q9klc 1/1 Running 0 148m submariner-routeagent-sn5zp 1/1 Running 0 148m [amagrawa@amagrawa ~]$ subctl verify --only connectivity ~/Downloads/Kubeconfig/dr-c1/kubeconfig ~/Downloads/Kubeconfig/dr-c2/kubeconfig subctl verify with kubeconfig arguments is deprecated, please use --kubecontexts instead Performing the following verifications: connectivity Running Suite: Submariner E2E suite =================================== Random Seed: 1660643181 Will run 22 of 41 specs SSSSSSSS ------------------------------ S [SKIPPING] [1.502 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:58 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:65 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:37.588: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [2.485 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:58 when the pod is on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:69 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:39.983: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.713 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:58 when the pod is on a gateway and the remote service is on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:73 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:41.580: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.575 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod matching an egress IP namespace selector connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:78 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:85 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:43.350: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.583 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod matching an egress IP namespace selector connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:78 when the pod is on a gateway and the remote service is on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:89 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:44.900: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.948 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod matching an egress IP pod selector connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:94 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:101 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:46.583: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.904 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod matching an egress IP pod selector connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:94 when the pod is on a gateway and the remote service is on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:105 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:48.734: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.477 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod with HostNetworking connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:110 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:117 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:50.267: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.575 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod with HostNetworking connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:110 when the pod is on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:121 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:51.778: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.529 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote headless service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:126 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:133 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:53.353: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.540 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote headless service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:126 when the pod is on a gateway and the remote service is on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:137 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:54.869: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ •W0816 15:16:59.051908 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:17:05.277481 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:17:18.232261 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:17:24.379390 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:17:37.413467 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:17:43.574095 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:17:56.785000 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:18:02.908399 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:18:15.878526 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:18:22.378840 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:18:35.345449 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:18:41.818716 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:18:54.844350 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:19:01.370299 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:19:14.337468 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:19:20.811399 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:19:33.877162 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:19:40.567481 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": host namespaces (hostNetwork=true), allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:19:50.122595 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:19:56.406311 33581 warnings.go:67] would violate PodSecurity "restricted:v1.24": host namespaces (hostNetwork=true), allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •SSSSSSSSSSS Ran 11 of 41 Specs in 228.417 seconds SUCCESS! -- 11 Passed | 0 Failed | 0 Pending | 30 Skipped C2- [amagrawa@amagrawa ~]$ subctl show connections Cluster "amagrawa-c2" ✓ Showing Connections GATEWAY CLUSTER REMOTE IP NAT CABLE DRIVER SUBNETS STATUS RTT avg. compute-1 amagrawa-c1 10.1.160.105 no libreswan 172.31.0.0/16, 10.132.0.0/14 connected 150.482377ms Cluster "api-amagrawa-c2-qe-rh-ocs-com:6443" ✓ Showing Connections GATEWAY CLUSTER REMOTE IP NAT CABLE DRIVER SUBNETS STATUS RTT avg. compute-1 amagrawa-c1 10.1.160.105 no libreswan 172.31.0.0/16, 10.132.0.0/14 connected 150.482471ms [amagrawa@amagrawa ~]$ oc get pods -n submariner-operator NAME READY STATUS RESTARTS AGE my-catalog-source-bd52h 1/1 Running 0 4d submariner-addon-fdb797d77-74x4q 1/1 Running 0 148m submariner-gateway-psc5k 1/1 Running 0 148m submariner-lighthouse-agent-86b9fb55fb-x5wsp 1/1 Running 0 148m submariner-lighthouse-coredns-647c59b579-dhqt8 1/1 Running 0 148m submariner-lighthouse-coredns-647c59b579-z98fz 1/1 Running 0 148m submariner-operator-7b69f86c9d-jf2wk 1/1 Running 0 148m submariner-routeagent-8qlqn 1/1 Running 0 148m submariner-routeagent-gbf59 1/1 Running 0 148m submariner-routeagent-jlbqj 1/1 Running 0 148m submariner-routeagent-sdvlt 1/1 Running 0 148m submariner-routeagent-xlxps 1/1 Running 0 148m submariner-routeagent-zj59q 1/1 Running 0 148m [amagrawa@amagrawa ~]$ subctl verify --only connectivity ~/Downloads/Kubeconfig/dr-c2/kubeconfig ~/Downloads/Kubeconfig/dr-c1/kubeconfig subctl verify with kubeconfig arguments is deprecated, please use --kubecontexts instead Performing the following verifications: connectivity Running Suite: Submariner E2E suite =================================== Random Seed: 1660643188 Will run 22 of 41 specs S [SKIPPING] [1.850 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:58 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:65 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:47.177: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.594 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:58 when the pod is on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:69 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:49.127: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.476 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:58 when the pod is on a gateway and the remote service is on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:73 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:50.622: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.636 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod matching an egress IP namespace selector connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:78 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:85 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:52.136: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.528 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod matching an egress IP namespace selector connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:78 when the pod is on a gateway and the remote service is on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:89 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:53.727: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.552 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod matching an egress IP pod selector connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:94 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:101 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:55.266: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.451 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod matching an egress IP pod selector connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:94 when the pod is on a gateway and the remote service is on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:105 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:56.778: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.490 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod with HostNetworking connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:110 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:117 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:58.256: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.775 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod with HostNetworking connects via TCP to the globalIP of a remote service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:110 when the pod is on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:121 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:16:59.785: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.479 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote headless service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:126 when the pod is not on a gateway and the remote service is not on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:133 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:17:01.539: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ S [SKIPPING] [1.502 seconds] [dataplane-globalnet] Basic TCP connectivity tests across overlapping clusters without discovery github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:28 when a pod connects via TCP to the globalIP of a remote headless service github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:126 when the pod is on a gateway and the remote service is on a gateway github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:137 should have sent the expected data from the pod to the other pod [It] github.com/submariner-io/submariner.1/test/e2e/dataplane/tcp_gn_pod_connectivity.go:35 Aug 16 15:17:02.991: Globalnet is not enabled, skipping the test... github.com/submariner-io/shipyard.1/test/e2e/framework/logging.go:60 ------------------------------ W0816 15:17:04.922783 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:17:11.038580 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:17:18.951340 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:17:25.051205 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:17:38.003545 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:17:44.128352 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:17:57.136600 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:18:03.238854 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:18:16.166258 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:18:22.649201 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:18:35.560110 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:18:42.120452 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:18:55.205206 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:19:01.675255 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:19:14.684420 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:19:21.174959 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:19:40.566759 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:19:47.372032 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": host namespaces (hostNetwork=true), allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •W0816 15:19:55.624395 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": allowPrivilegeEscalation != false (container "tcp-check-listener" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-listener" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-listener" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-listener" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") W0816 15:20:02.085476 33601 warnings.go:67] would violate PodSecurity "restricted:v1.24": host namespaces (hostNetwork=true), allowPrivilegeEscalation != false (container "tcp-check-connector" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "tcp-check-connector" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "tcp-check-connector" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "tcp-check-connector" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") •SS•SSSSSSSSSSSSSSSSS Ran 11 of 41 Specs in 227.320 seconds SUCCESS! -- 11 Passed | 0 Failed | 0 Pending | 30 Skipped Though output from C1 is- [amagrawa@amagrawa ~]$ oc get cephblockpool ocs-storagecluster-cephblockpool -n openshift-storage -o jsonpath='{.status.mirroringStatus.summary}{"\n"}' {"daemon_health":"OK","health":"WARNING","image_health":"WARNING","states":{"unknown":109}} C2 is- [amagrawa@amagrawa ~]$ oc get cephblockpool ocs-storagecluster-cephblockpool -n openshift-storage -o jsonpath='{.status.mirroringStatus.summary}{"\n"}' {"daemon_health":"WARNING","health":"WARNING","image_health":"WARNING","states":{"starting_replay":56,"stopped":52,"unknown":1}} Expected results: Daemon health should be fine. Mirroring Status should not report any Warning. Additional info:
Is there a specific problem here other than the warning? If not, then it seems like clearing up this warning would be a GA issue (4.12) not a tech preview issue (4.11).
@srangana there is a new command "dr health" that can be used with the Krew "rook-ceph" plugin to test Ceph communication across storageclusters using opposite cluster "ceph status" as well as output the local cephblockpool "rbd -p <poolname> mirror pool status". Details found here how to install Krew "rook ceph" plugin and use "dr - health" https://github.com/rook/kubectl-rook-ceph#commands. Also new insight rule MR merged to be used by support to diagnosis connectivity issue. Details found here https://gitlab.cee.redhat.com/ccx/ccx-rules-ocp/-/merge_requests/941. Unfortunately the Insight rule is triggered "When Mirror daemon is in unhealthy status for more than 1m, "OdfMirrorDaemonStatus". Given this BZ https://bugzilla.redhat.com/show_bug.cgi?id=2133505 the "OdfMirrorDaemonStatus" may not fire thereby not triggering the Insight.
Not a TP blocker, Shyam please open a RHCS BZ
Moving it back to Assigned based upon above comments.