Bug 2176012 - [ODF 4.11] Move the defaults for rookceph operator from configmap to csv
Summary: [ODF 4.11] Move the defaults for rookceph operator from configmap to csv
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenShift Data Foundation
Classification: Red Hat Storage
Component: ocs-operator
Version: 4.11
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: ODF 4.11.7
Assignee: Nikhil Ladha
QA Contact: Joy John Pinto
URL:
Whiteboard:
Depends On:
Blocks: 2176356 2176357 2176359
TreeView+ depends on / blocked
 
Reported: 2023-03-07 07:17 UTC by Rakshith
Modified: 2023-08-09 17:00 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
: 2176356 2176357 2176359 (view as bug list)
Environment:
Last Closed: 2023-04-26 10:01:19 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github red-hat-storage ocs-operator pull 1648 0 None Merged Moving the defaults for rookceph operator from configmap to csv 2023-03-07 07:17:30 UTC
Github red-hat-storage ocs-operator pull 1954 0 None Merged Bug 2176012: [release-4.11] Moving the defaults for rookceph operator from configmap to csv 2023-03-28 06:22:04 UTC
Red Hat Product Errata RHSA-2023:2023 0 None None None 2023-04-26 10:01:29 UTC

Description Rakshith 2023-03-07 07:17:30 UTC
Description of problem (please be detailed as possible and provide log
snippests):

Currently upgraded cluster do not have CSI_LOG_LEVEL: 5 in rook-ceph-operator-config. 
This leads to csi pods having log level of 0, which makes it very hard to debug. 

Also, CSI_ENABLE_CSIADDONS is false by default and we need to enable it manually.

Both the above issues can be resolved by backporting pr https://github.com/red-hat-storage/ocs-operator/pull/1648 
and moving defaults to csv.

Actual results:
Upgraded cluster do not have necessary defaults.

Expected results:
Upgraded clusters will automatically get these defaults from csv.

Additional info:

Comment 9 Joy John Pinto 2023-04-06 09:28:55 UTC
Verified on a newly deployed ODF cluster

OCP 4.11.0-0.nightly-2023-04-05-140612 and ODF 4.11.7 provided by Red Hat

labels:
    app: rook-ceph-operator
    pod-template-hash: c8697fbb6
spec:
  restartPolicy: Always
  serviceAccountName: rook-ceph-system
  imagePullSecrets:
    - name: rook-ceph-system-dockercfg-dxhvx
  priority: 0
  schedulerName: default-scheduler
  enableServiceLinks: true
  terminationGracePeriodSeconds: 30
  preemptionPolicy: PreemptLowerPriority
  nodeName: ip-10-0-203-68.us-east-2.compute.internal
  securityContext: {}
  containers:
    - resources: {}
      terminationMessagePath: /dev/termination-log
      name: rook-ceph-operator
      env:
        - name: ROOK_CURRENT_NAMESPACE_ONLY
          value: 'true'
        - name: ROOK_ALLOW_MULTIPLE_FILESYSTEMS
          value: 'false'
        - name: ROOK_LOG_LEVEL
          value: INFO
        - name: ROOK_CEPH_STATUS_CHECK_INTERVAL
          value: 60s
        - name: ROOK_MON_HEALTHCHECK_INTERVAL
          value: 45s
        - name: ROOK_MON_OUT_TIMEOUT
          value: 600s
        - name: ROOK_DISCOVER_DEVICES_INTERVAL
          value: 60m
        - name: ROOK_HOSTPATH_REQUIRES_PRIVILEGED
          value: 'true'
        - name: ROOK_ENABLE_SELINUX_RELABELING
          value: 'true'
        - name: ROOK_ENABLE_FSGROUP
          value: 'true'
        - name: ROOK_ENABLE_FLEX_DRIVER
          value: 'false'
        - name: ROOK_ENABLE_DISCOVERY_DAEMON
          value: 'false'
        - name: ROOK_ENABLE_MACHINE_DISRUPTION_BUDGET
          value: 'false'
        - name: ROOK_DISABLE_DEVICE_HOTPLUG
          value: 'true'
        - name: ROOK_CSI_ALLOW_UNSUPPORTED_VERSION
          value: 'true'
        - name: ROOK_DISABLE_ADMISSION_CONTROLLER
          value: 'true'
        - name: CSI_VOLUME_REPLICATION_IMAGE
          value: >-
            quay.io/rhceph-dev/odf4-volume-replication-rhel8-operator@sha256:9ce0f6e3e6e81d74dcae39b4023be66d9e2278fb6cf087f7e992a624f8e771a2
        - name: ROOK_CSIADDONS_IMAGE
          value: >-
            quay.io/rhceph-dev/odf4-odf-csi-addons-sidecar-rhel8@sha256:9d6b25b2ddad1e12073d6945f6d3dd02cf4053fb8a18668a4fe87728e500cf3f
        - name: ROOK_CSI_NFS_IMAGE
          value: >-
            quay.io/rhceph-dev/openshift-ose-csi-driver-nfs@sha256:4d3e6560e89b8624f797b295240296bd137a375d59c73e7c4add1ee55911d126
        - name: CSI_PROVISIONER_TOLERATIONS
          value: |-

            - key: node.ocs.openshift.io/storage
              operator: Equal
              value: "true"
              effect: NoSchedule
        - name: CSI_PLUGIN_TOLERATIONS
          value: |-

            - key: node.ocs.openshift.io/storage
              operator: Equal
              value: "true"
              effect: NoSchedule
        - name: CSI_LOG_LEVEL
          value: '5'
        - name: CSI_ENABLE_CSIADDONS
          value: 'true'
        -

Comment 14 errata-xmlrpc 2023-04-26 10:01:19 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Important: Red Hat OpenShift Data Foundation 4.11.7 Bug Fix and security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2023:2023


Note You need to log in before you can comment on or make changes to this bug.