Uploaded image for project: 'Red Hat Advanced Cluster Management'
  1. Red Hat Advanced Cluster Management
  2. ACM-8275

tls: failed to verify certificate: x509: certificate signed by unknown authority error msg's in submariner-lighthouse-agent pod

XMLWordPrintable

    • Submariner Sprint 2023-12, Submariner Sprint 2023-13
    • Moderate
    • No

      Description of problem:

      tls: failed to verify certificate: x509: certificate signed by unknown authority error msg's in submariner-lighthouse-agent pod

      Version-Release number of selected component (if applicable):

      ACM:- 2.9

      submariner:- 0.16.0 (image tag brew.registry.redhat.io/rh-osbs/iib:594788)

      How reproducible:

      Steps to Reproduce:

      1. Deploy RDR cluster using OpenshiftSDN
      2. Run workload 
      3. Restart worker node
      4. check logs of submariner-lighthouse-agent pod

      Actual results:

      E1016 14:50:51.886268       1 queue.go:106] Local ServiceImport: Failed to process object with key "submariner-operator/volsync-rsync-tls-dst-busybox-pvc-15-e4-appset-ns-dnd-prsurve-dev-1" using function (workqueue.ProcessFunc)(0x13e4ae0): error distributing resource "submariner-operator/volsync-rsync-tls-dst-busybox-pvc-15-e4-appset-ns-dnd-prsurve-dev-1": error creating or updating resource: error retrieving "volsync-rsync-tls-dst-busybox-pvc-15-e4-appset-ns": Get "https://##redacted-api-server##/apis/multicluster.x-k8s.io/v1alpha1/namespaces/submariner-broker/serviceimports/volsync-rsync-tls-dst-busybox-pvc-15-e4-appset-ns": tls: failed to verify certificate: x509: certificate signed by unknown authority

      Expected results:

      There should not be any failure

      Additional info:

              skitt@redhat.com Stephen Kitt
              prsurve@redhat.com Pratik Surve
              Maxim Babushkin Maxim Babushkin
              Votes:
              0 Vote for this issue
              Watchers:
              7 Start watching this issue

                Created:
                Updated:
                Resolved: