Uploaded image for project: 'Red Hat Advanced Cluster Management'
  1. Red Hat Advanced Cluster Management
  2. ACM-8748

[Bug] logLevel=Debug causes audit pod crash in Gatekeeper-operator

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done-Errata
    • Icon: Major Major
    • Gatekeeper 3.14.0
    • Gatekeeper 3.14.0
    • GRC
    • None
    • 2
    • False
    • None
    • False
    • GRC Sprint 2023-22
    • Critical
    • No

      Description of problem:

      Maybe it affects the v3.11 gatekeeper-operator so should investigate.

      Also, Webhook.loglevel should be investigated

      Setting logLevel=Debug causes gatekeeper-audit pod crash in Gatekeeper-operator

      Version-Release number of selected component (if applicable):

      How reproducible:

      Steps to Reproduce:

      1.  Set audit.logLevel=Debug in gatekeeper
      2.  audit Pod loop crash - recreate
      3.  There is logs  "odd number argument... "

       

       
      1:35:07Z", "group": "batch", "version": "v1", "kind": "CronJob"}
      2023-11-25T01:35:07.552Z        dpanic  controller      odd number of arguments passed as key-value pairs for logging   {"process": "audit", "audit_id": "2023-11-25T01:35:07Z", "ignored key": "CronJob"}
      github.com/open-policy-agent/gatekeeper/v3/pkg/audit.(*Manager).auditResources
              /go/src/github.com/open-policy-agent/gatekeeper/pkg/audit/manager.go:474
      github.com/open-policy-agent/gatekeeper/v3/pkg/audit.(*Manager).audit
              /go/src/github.com/open-policy-agent/gatekeeper/pkg/audit/manager.go:256
      github.com/open-policy-agent/gatekeeper/v3/pkg/audit.(*Manager).auditManagerLoop
              /go/src/github.com/open-policy-agent/gatekeeper/pkg/audit/manager.go:730
      2023-11-25T01:35:07.552Z        info    controller      auditing is complete    {"process": "audit", "audit_id": "2023-11-25T01:35:07Z", "event_type": "audit_finished"}
      panic: odd number of arguments passed as key-value pairs for logging
      goroutine 258 [running]:
      go.uber.org/zap/zapcore.CheckWriteAction.OnWrite(0xc0?, 0x1?, {0x1?, 0x0?, 0x0?})
              /go/src/github.com/open-policy-agent/gatekeeper/vendor/go.uber.org/zap/zapcore/entry.go:198 +0x78
      go.uber.org/zap/zapcore.(*CheckedEntry).Write(0x40005184e0, {0x4000a53ac0, 0x1, 0x1})
              /go/src/github.com/open-policy-agent/gatekeeper/vendor/go.uber.org/zap/zapcore/entry.go:264 +0x2c0
      go.uber.org/zap.(*Logger).DPanic(0x1f59142?, {0x1fe59bf?, 0x1a9a100?}, {0x4000a53ac0, 0x1, 0x1})
              /go/src/github.com/open-policy-agent/gatekeeper/vendor/go.uber.org/zap/logger.go:248 +0x54
      github.com/go-logr/zapr.(*zapLogger).handleFields(0x4000a571a0, 0x1, {0x40009c4aa0, 0x5, 0x4000cd5208?}, {0x0?, 0x0, 0x1da1ec0?})
              /go/src/github.com/open-policy-agent/gatekeeper/vendor/github.com/go-logr/zapr/zapr.go:147 +0xa30
      github.com/go-logr/zapr.(*zapLogger).Info(0x4000a571a0, 0x1, {0x1f78664?, 0x0?}, {0x40009c4aa0, 0x5, 0x5})
              /go/src/github.com/open-policy-agent/gatekeeper/vendor/github.com/go-logr/zapr/zapr.go:210 +0x80
      github.com/go-logr/logr.Logger.Info({
      {0x2546870?, 0x4000a571a0?}
      , 0x4000cd55c0?}, {0x1f78664, 0x19}, {0x40009c4aa0, 0x5, 0x5})
              /go/src/github.com/open-policy-agent/gatekeeper/vendor/github.com/go-logr/logr/logr.go:278 +0xb8
      github.com/open-policy-agent/gatekeeper/v3/pkg/audit.(*Manager).auditResources(0x40000eafa0, {0x2541b98, 0x40008779a0}, {0x4000bf5e90, 0x1, 0x0?}, 0x0?, 0x0?, 0x4000486280?, {0x40010824e0, ...})
              /go/src/github.com/open-policy-agent/gatekeeper/pkg/audit/manager.go:474 +0x1450
      github.com/open-policy-agent/gatekeeper/v3/pkg/audit.(*Manager).audit(0x40000eafa0, {0x2541b98, 0x40008779a0})
              /go/src/github.com/open-policy-agent/gatekeeper/pkg/audit/manager.go:256 +0x6f0
      github.com/open-policy-agent/gatekeeper/v3/pkg/audit.(*Manager).auditManagerLoop(0x40000eafa0, {0x2541b98, 0x40008779a0})
              /go/src/github.com/open-policy-agent/gatekeeper/pkg/audit/manager.go:730 +0xd0
      created by github.com/open-policy-agent/gatekeeper/v3/pkg/audit.(*Manager).Start in goroutine 171
              /go/src/github.com/open-policy-agent/gatekeeper/pkg/audit/manager.go:740 +0xd4 
      

       

            yikim@redhat.com Yi Rae Kim
            yikim@redhat.com Yi Rae Kim
            Derek Ho Derek Ho
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: