Uploaded image for project: 'Red Hat OpenShift Dev Spaces (formerly CodeReady Workspaces) '
  1. Red Hat OpenShift Dev Spaces (formerly CodeReady Workspaces)
  2. CRW-967

Installation of CRW with OS OAuth by crwctl with operator installer failed because operator was unable to get openshift oauth

XMLWordPrintable

    • Workaround Exists
    • Hide

      1) Execute "oc delete clusterrole codeready-operator"

      2) reinstall CRW 2.2.0

      Show
      1) Execute "oc delete clusterrole codeready-operator" 2) reinstall CRW 2.2.0
    • Hide

      Command to install:

      command 1
      crwctl/bin/crwctl server:start --che-operator-cr-yaml=/mnt/hudson_workspace/workspace/install-crw-using-crwctl/custom-resource.yaml --che-operator-image=quay.io/crw/crw-2-rhel8-operator:latest --listr-renderer=verbose -n crw-crwctl-tls-oauth
      
      #
      #  Copyright (c) 2012-2019 Red Hat, Inc.
      #    This program and the accompanying materials are made
      #    available under the terms of the Eclipse Public License 2.0
      #    which is available at https://www.eclipse.org/legal/epl-2.0/
      #
      #  SPDX-License-Identifier: EPL-2.0
      #
      #  Contributors:
      #    Red Hat, Inc. - initial API and implementation
      
      # CR is based on https://raw.githubusercontent.com/redhat-developer/codeready-workspaces-chectl/master/docs/custom-resource.yaml
      
      apiVersion: org.eclipse.che/v1
      kind: CheCluster
      metadata:
        name: codeready-workspaces
      spec:
        server:
          # server image used in Che deployment
          cheImage: 'quay.io/crw/server-rhel8'
          # image pull policy used in Che deployment
          cheImageTag: 'latest'
          # image:tag used in Devfile registry deployment
          devfileRegistryImage: 'quay.io/crw/devfileregistry-rhel8:latest'
          # image:tag used in plugin registry deployment
          pluginRegistryImage: 'quay.io/crw/pluginregistry-rhel8:latest'
          # defaults to `che`. When set to `codeready`, CodeReady Workspaces is deployed
          # the difference is in images, labels, exec commands
          cheFlavor: 'codeready'
          # specifies a custom cluster role to user for the Che workspaces
          # Uses the default roles if left blank.
          cheWorkspaceClusterRole: ''
          # when set to true the operator will attempt to get a secret in OpenShift router namespace
          # to add it to Java trust store of Che server. Requires cluster-admin privileges for operator service account
          selfSignedCert: true
          # Name of the config-map with public certificates to add to Java trust store of the Che server.
          serverTrustStoreConfigMapName: ''
          gitSelfSignedCert: false
          # TLS mode for Che. Make sure you either have public cert, or set selfSignedCert to true
          tlsSupport: true
          # protocol+hostname of a proxy server. Automatically added as JAVA_OPTS and https(s)_proxy
          # to Che server and workspaces containers
          proxyURL: ''
          # port of a proxy server
          proxyPort: ''
          # username for a proxy server
          proxyUser: ''
          # password for a proxy user
          proxyPassword: ''
          # a list of non-proxy hosts. Use | as delimiter, eg localhost|my.host.com|123.42.12.32
          nonProxyHosts: ''
          # sets mem request for server deployment. Defaults to 512Mi
          serverMemoryRequest: ''
          # sets mem limit for server deployment. Defaults to 1Gi
          serverMemoryLimit: ''
          # sets default namespace where new workspaces will be created
          workspaceNamespaceDefault: ''
          # defines if user is able to specify namespace different from the default
          allowUserDefinedWorkspaceNamespaces: false
          customCheProperties:
            CHE_LIMITS_USER_WORKSPACES_RUN_COUNT: '-1'
            CHE_WORKSPACE_AGENT_DEV_INACTIVE__STOP__TIMEOUT__MS: '900000'
            CHE_DOCKER_ALWAYS__PULL__IMAGE: 'true'
            CHE_WORKSPACE_PLUGIN__BROKER_METADATA_IMAGE: 'quay.io/crw/pluginbroker-metadata-rhel8:latest'
            CHE_WORKSPACE_PLUGIN__BROKER_ARTIFACTS_IMAGE: 'quay.io/crw/pluginbroker-artifacts-rhel8:latest'
            CHE_SERVER_SECURE__EXPOSER_JWTPROXY_IMAGE: 'quay.io/crw/jwtproxy-rhel8:latest'
            CHE_FACTORY_DEFAULT__EDITOR: 'eclipse/che-theia/latest'
            CHE_FACTORY_DEFAULT__PLUGINS: 'eclipse/che-machine-exec-plugin/latest'
            CHE_WORKSPACE_DEVFILE_DEFAULT__EDITOR: 'eclipse/che-theia/latest'
            CHE_WORKSPACE_DEVFILE_DEFAULT__EDITOR_PLUGINS: 'eclipse/che-machine-exec-plugin/latest'
      
        database:
          # when set to true, the operator skips deploying Postgres, and passes connection details of existing DB to Che server
          # otherwise a Postgres deployment is created
          externalDb: false
          # Postgres Database hostname that Che server uses to connect to. Defaults to postgres
          chePostgresHostName: ''
          # Postgres Database port that Che server uses to connect to. Defaults to 5432
          chePostgresPort: ''
          # Postgres user that Che server when making a db connection. Defaults to pgche
          chePostgresUser: ''
          # password of a postgres user. Auto-generated when left blank
          chePostgresPassword: ''
          # Postgres database name that Che server uses to connect to. Defaults to dbche
          chePostgresDb: ''
          # Postgres deployment in format image:tag. Defaults to registry.redhat.io/rhscl/postgresql-96-rhel7 (see pkg/deploy/defaults.go for latest tag)
          postgresImage: ''
      
        storage:
          # persistent volume claim strategy for Che server. Can be common (all workspaces PVCs in one volume),
          # per-workspace (one PVC per workspace for all declared volumes) and unique (one PVC per declared volume). Defaults to common
          pvcStrategy: 'per-workspace'
          # size of a persistent volume claim for workspaces. Defaults to 1Gi
          pvcClaimSize: '1Gi'
          # instruct Che server to launch a special pod to precreate a subpath in a PV
          preCreateSubPaths: true
          # image:tag for preCreateSubPaths jobs
          pvcJobsImage: ''
          # keep blank unless you need to use a non default storage class for Postgres PVC
          postgresPVCStorageClassName: ''
          # keep blank unless you need to use a non default storage class for workspace PVC(s)
          workspacePVCStorageClassName: ''
      
        auth:
          # instructs operator on whether or not to deploy Keycloak/RH SSO instance. When set to true provision connection details
          externalIdentityProvider: false
          # retrieved from respective route/ingress unless explicitly specified in CR (when ExternalKeycloak is true)
          identityProviderURL: ''
          # password for keycloak database user. Auto generated if left blank
          keycloakPostgresPassword: ''
          # desired admin username of Keycloak admin user (applicable only when externalIdentityProvider is false)
          identityProviderAdminUserName: 'admin'
          # desired password of Keycloak admin user (applicable only when externalIdentityProvider is false)
          identityProviderPassword: 'admin'
          # name of a keycloak realm. This realm will be created, when externalIdentityProvider is true, otherwise passed to Che server
          identityProviderRealm: ''
          # id of a keycloak client. This client will be created, when externalIdentityProvider is false, otherwise passed to Che server
          identityProviderClientId: ''
          # instructs an Operator to enable OpenShift v3 identity provider in Keycloak,
          # as well as create respective oAuthClient and configure Che configMap accordingly
          openShiftoAuth: true
          # name of oAuthClient used in OpenShift v3 identity provider in Keycloak realm. Auto generated if left blank
          oAuthClientName: ''
          # secret used in oAuthClient. Auto generated if left blank
          oAuthSecret: ''
          # image:tag used in Keycloak deployment
          identityProviderImage: ''
      
        metrics:
          # Enables '/metrics' endpoint of Che server.
          enable: false
      

      or

      command 2
      /mnt/hudson_workspace/workspace/install-crw-using-crwctl/crwctl/bin/crwctl server:start --self-signed-cert --os-oauth --che-operator-image=quay.io/crw/crw-2-rhel8-operator:latest --listr-renderer=verbose -n crw-crwctl-tls-oauth
      

      Test environment:

      Error hasn't been reproduced:

      • when installing WITHOUT OS OAuth support;
      • when installing with OS OAuth support by using OperatorHub.
      Show
      Command to install: command 1 crwctl/bin/crwctl server:start --che- operator -cr-yaml=/mnt/hudson_workspace/workspace/install-crw-using-crwctl/custom-resource.yaml --che- operator -image=quay.io/crw/crw-2-rhel8- operator :latest --listr-renderer=verbose -n crw-crwctl-tls-oauth # # Copyright (c) 2012-2019 Red Hat, Inc. # This program and the accompanying materials are made # available under the terms of the Eclipse Public License 2.0 # which is available at https://www.eclipse.org/legal/epl-2.0/ # # SPDX-License-Identifier: EPL-2.0 # # Contributors: # Red Hat, Inc. - initial API and implementation # CR is based on https://raw.githubusercontent.com/redhat-developer/codeready-workspaces-chectl/master/docs/custom-resource.yaml apiVersion: org.eclipse.che/v1 kind: CheCluster metadata: name: codeready-workspaces spec: server: # server image used in Che deployment cheImage: 'quay.io/crw/server-rhel8' # image pull policy used in Che deployment cheImageTag: 'latest' # image:tag used in Devfile registry deployment devfileRegistryImage: 'quay.io/crw/devfileregistry-rhel8:latest' # image:tag used in plugin registry deployment pluginRegistryImage: 'quay.io/crw/pluginregistry-rhel8:latest' # defaults to `che`. When set to `codeready`, CodeReady Workspaces is deployed # the difference is in images, labels, exec commands cheFlavor: 'codeready' # specifies a custom cluster role to user for the Che workspaces # Uses the default roles if left blank. cheWorkspaceClusterRole: '' # when set to true the operator will attempt to get a secret in OpenShift router namespace # to add it to Java trust store of Che server. Requires cluster-admin privileges for operator service account selfSignedCert: true # Name of the config-map with public certificates to add to Java trust store of the Che server. serverTrustStoreConfigMapName: '' gitSelfSignedCert: false # TLS mode for Che. Make sure you either have public cert, or set selfSignedCert to true tlsSupport: true # protocol+hostname of a proxy server. Automatically added as JAVA_OPTS and https(s)_proxy # to Che server and workspaces containers proxyURL: '' # port of a proxy server proxyPort: '' # username for a proxy server proxyUser: '' # password for a proxy user proxyPassword: '' # a list of non-proxy hosts. Use | as delimiter, eg localhost|my.host.com|123.42.12.32 nonProxyHosts: '' # sets mem request for server deployment. Defaults to 512Mi serverMemoryRequest: '' # sets mem limit for server deployment. Defaults to 1Gi serverMemoryLimit: '' # sets default namespace where new workspaces will be created workspaceNamespaceDefault: '' # defines if user is able to specify namespace different from the default allowUserDefinedWorkspaceNamespaces: false customCheProperties: CHE_LIMITS_USER_WORKSPACES_RUN_COUNT: '-1' CHE_WORKSPACE_AGENT_DEV_INACTIVE__STOP__TIMEOUT__MS: '900000' CHE_DOCKER_ALWAYS__PULL__IMAGE: 'true' CHE_WORKSPACE_PLUGIN__BROKER_METADATA_IMAGE: 'quay.io/crw/pluginbroker-metadata-rhel8:latest' CHE_WORKSPACE_PLUGIN__BROKER_ARTIFACTS_IMAGE: 'quay.io/crw/pluginbroker-artifacts-rhel8:latest' CHE_SERVER_SECURE__EXPOSER_JWTPROXY_IMAGE: 'quay.io/crw/jwtproxy-rhel8:latest' CHE_FACTORY_DEFAULT__EDITOR: 'eclipse/che-theia/latest' CHE_FACTORY_DEFAULT__PLUGINS: 'eclipse/che-machine-exec-plugin/latest' CHE_WORKSPACE_DEVFILE_DEFAULT__EDITOR: 'eclipse/che-theia/latest' CHE_WORKSPACE_DEVFILE_DEFAULT__EDITOR_PLUGINS: 'eclipse/che-machine-exec-plugin/latest' database: # when set to true, the operator skips deploying Postgres, and passes connection details of existing DB to Che server # otherwise a Postgres deployment is created externalDb: false # Postgres Database hostname that Che server uses to connect to. Defaults to postgres chePostgresHostName: '' # Postgres Database port that Che server uses to connect to. Defaults to 5432 chePostgresPort: '' # Postgres user that Che server when making a db connection. Defaults to pgche chePostgresUser: '' # password of a postgres user. Auto-generated when left blank chePostgresPassword: '' # Postgres database name that Che server uses to connect to. Defaults to dbche chePostgresDb: '' # Postgres deployment in format image:tag. Defaults to registry.redhat.io/rhscl/postgresql-96-rhel7 (see pkg/deploy/defaults.go for latest tag) postgresImage: '' storage: # persistent volume claim strategy for Che server. Can be common (all workspaces PVCs in one volume), # per-workspace (one PVC per workspace for all declared volumes) and unique (one PVC per declared volume). Defaults to common pvcStrategy: 'per-workspace' # size of a persistent volume claim for workspaces. Defaults to 1Gi pvcClaimSize: '1Gi' # instruct Che server to launch a special pod to precreate a subpath in a PV preCreateSubPaths: true # image:tag for preCreateSubPaths jobs pvcJobsImage: '' # keep blank unless you need to use a non default storage class for Postgres PVC postgresPVCStorageClassName: '' # keep blank unless you need to use a non default storage class for workspace PVC(s) workspacePVCStorageClassName: '' auth: # instructs operator on whether or not to deploy Keycloak/RH SSO instance. When set to true provision connection details externalIdentityProvider: false # retrieved from respective route/ingress unless explicitly specified in CR (when ExternalKeycloak is true) identityProviderURL: '' # password for keycloak database user. Auto generated if left blank keycloakPostgresPassword: '' # desired admin username of Keycloak admin user (applicable only when externalIdentityProvider is false) identityProviderAdminUserName: 'admin' # desired password of Keycloak admin user (applicable only when externalIdentityProvider is false) identityProviderPassword: 'admin' # name of a keycloak realm. This realm will be created, when externalIdentityProvider is true, otherwise passed to Che server identityProviderRealm: '' # id of a keycloak client. This client will be created, when externalIdentityProvider is false, otherwise passed to Che server identityProviderClientId: '' # instructs an Operator to enable OpenShift v3 identity provider in Keycloak, # as well as create respective oAuthClient and configure Che configMap accordingly openShiftoAuth: true # name of oAuthClient used in OpenShift v3 identity provider in Keycloak realm. Auto generated if left blank oAuthClientName: '' # secret used in oAuthClient. Auto generated if left blank oAuthSecret: '' # image:tag used in Keycloak deployment identityProviderImage: '' metrics: # Enables '/metrics' endpoint of Che server. enable: false or command 2 /mnt/hudson_workspace/workspace/install-crw-using-crwctl/crwctl/bin/crwctl server:start --self-signed-cert --os-oauth --che- operator -image=quay.io/crw/crw-2-rhel8- operator :latest --listr-renderer=verbose -n crw-crwctl-tls-oauth Test environment: crwctl/2.2.0-RC1-quay.8527595 linux-x64 node-v10.19.0 CRW 2.2.0.RC1 with OS OAuth and TLS support OCP 4.5 and 3.11 CRC 1.12.0+6710aff, with OpenShift version: 4.4.8 (embedded in binary)   Error hasn't been reproduced: when installing WITHOUT OS OAuth support; when installing with OS OAuth support by using OperatorHub.

      Installation of CRW 2.2.0.RC1 by crwctl failed because operator had encountered error:

      operator logs
      time="2020-06-15T07:30:56Z" level=info msg="Starting the Cmd"
      time="2020-06-15T07:30:56Z" level=error msg="Unable to get openshift oauth. Cause: oauths.config.openshift.io \"cluster\" is forbidden: User \"system:serviceaccount:crw-crwctl-tls-oauth:codeready-operator\" cannot get resource \"oauths\" in API group \"config.openshift.io\" at the cluster scope"
      time="2020-06-15T07:30:56Z" level=info msg="Updating codeready-workspaces CR with status: Reason: InstallOrUpdateFailed"
      time="2020-06-15T07:30:56Z" level=info msg="Custom resource codeready-workspaces updated"
      time="2020-06-15T07:30:56Z" level=info msg="Updating codeready-workspaces CR with status: Message: Unable to get openshift oauth. Cause: oauths.config.openshift.io \"cluster\" is forbidden: User \"system:serviceaccount:crw-crwctl-tls-oauth:codeready-operator\" cannot get resource \"oauths\" in API group \"config.openshift.io\" at the cluster scope"
      time="2020-06-15T07:30:56Z" level=info msg="Custom resource codeready-workspaces updated"
      time="2020-06-15T07:30:57Z" level=error msg="Unable to get openshift oauth. Cause: oauths.config.openshift.io \"cluster\" is forbidden: User \"system:serviceaccount:crw-crwctl-tls-oauth:codeready-operator\" cannot get resource \"oauths\" in API group \"config.openshift.io\" at the cluster scope"
      
      crwctl logs
      10:30:40 + /mnt/hudson_workspace/workspace/install-crw-using-crwctl/crwctl/bin/crwctl server:start --che-operator-cr-yaml=/mnt/hudson_workspace/workspace/install-crw-using-crwctl/custom-resource.yaml --che-operator-image=quay.io/crw/crw-2-rhel8-operator:latest --listr-renderer=verbose -n crw-crwctl-tls-oauth
      10:30:40 › Current Kubernetes context: 'default/api-ocp43-codereadyqe-com:6443/admin'
      10:30:40 [03:30:39] Verify Kubernetes API [started]
      10:30:40 [03:30:39] Verify Kubernetes API...OK [title changed]
      10:30:40 [03:30:39] Verify Kubernetes API...OK (it's OpenShift) [title changed]
      10:30:40 [03:30:39] Verify Kubernetes API...OK (it's OpenShift) [completed]
      10:30:40 [03:30:39]   Looking for an already existing CodeReady Workspaces instance [started]
      10:30:40 [03:30:39] Verify if CodeReady Workspaces is deployed into namespace "crw-crwctl-tls-oauth" [started]
      10:30:40 [03:30:39] Verify if CodeReady Workspaces is deployed into namespace "crw-crwctl-tls-oauth"...it is not [title changed]
      10:30:40 [03:30:39] Verify if CodeReady Workspaces is deployed into namespace "crw-crwctl-tls-oauth"...it is not [completed]
      10:30:40 [03:30:39]   Looking for an already existing CodeReady Workspaces instance [completed]
      10:30:40  ›   Warning: --che-operator-cr-yaml is used. The following flag(s) will be 
      10:30:40  ›   ignored: --tls	--cheimage
      10:30:40 [03:30:39]   Openshift preflight checklist [started]
      10:30:40 [03:30:39] Verify if oc is installed [started]
      10:30:40 [03:30:39] Verify if oc is installed...done. [title changed]
      10:30:40 [03:30:39] Verify if oc is installed...done. [completed]
      10:30:40 [03:30:39] Verify if openshift is running [started]
      10:30:40 [03:30:39] Verify if openshift is running...done. [title changed]
      10:30:40 [03:30:39] Verify if openshift is running...done. [completed]
      10:30:40 [03:30:39] Check OpenShift version [started]
      10:30:41 [03:30:39] Check OpenShift version: 4.x [title changed]
      10:30:41 [03:30:39] Check OpenShift version: 4.x [completed]
      10:30:41 [03:30:39] Check Kubernetes version [started]
      10:30:41 [03:30:39] Check Kubernetes version: Unknown. [title changed]
      10:30:41 [03:30:39] Check Kubernetes version: Unknown. [completed]
      10:30:41 [03:30:39]   Openshift preflight checklist [completed]
      10:30:41 [03:30:39] Verify Openshift oauth. [started]
      10:30:41 [03:30:39] Verify Openshift oauth....done. [title changed]
      10:30:41 [03:30:39] Verify Openshift oauth....done. [completed]
      10:30:41 CodeReady Workspaces logs will be available in '/tmp/crwctl-logs/1592206239051'
      10:30:41 [03:30:39] Start following logs [started]
      10:30:41 [03:30:39] Start following Operator logs [started]
      10:30:41 [03:30:39] Start following Operator logs...done [title changed]
      10:30:41 [03:30:39] Start following Operator logs...done [completed]
      10:30:41 [03:30:39] Start following CodeReady Workspaces logs [started]
      10:30:41 [03:30:39] Start following CodeReady Workspaces logs...done [title changed]
      10:30:41 [03:30:39] Start following CodeReady Workspaces logs...done [completed]
      10:30:41 [03:30:39] Start following Postgres logs [started]
      10:30:41 [03:30:39] Start following Postgres logs...done [title changed]
      10:30:41 [03:30:39] Start following Postgres logs...done [completed]
      10:30:41 [03:30:39] Start following Keycloak logs [started]
      10:30:41 [03:30:39] Start following Keycloak logs...done [title changed]
      10:30:41 [03:30:39] Start following Keycloak logs...done [completed]
      10:30:41 [03:30:39] Start following Plugin registry logs [started]
      10:30:41 [03:30:39] Start following Plugin registry logs...done [title changed]
      10:30:41 [03:30:39] Start following Plugin registry logs...done [completed]
      10:30:41 [03:30:39] Start following Devfile registry logs [started]
      10:30:41 [03:30:39] Start following Devfile registry logs...done [title changed]
      10:30:41 [03:30:39] Start following Devfile registry logs...done [completed]
      10:30:41 [03:30:39] Start following logs [completed]
      10:30:41 [03:30:39] Start following events [started]
      10:30:41 [03:30:39] Start following namespace events [started]
      10:30:41 [03:30:39] Start following namespace events...done [title changed]
      10:30:41 [03:30:39] Start following namespace events...done [completed]
      10:30:41 [03:30:39] Start following events [completed]
      10:30:41 [03:30:39]   Running the CodeReady Workspaces operator [started]
      10:30:41 [03:30:39] Copying operator resources [started]
      10:30:41 [03:30:39] Copying operator resources...done. [title changed]
      10:30:41 [03:30:39] Copying operator resources...done. [completed]
      10:30:41 [03:30:39] Create Namespace (crw-crwctl-tls-oauth) [started]
      10:30:41 [03:30:40] Create Namespace (crw-crwctl-tls-oauth)...done. [title changed]
      10:30:41 [03:30:40] Create Namespace (crw-crwctl-tls-oauth)...done. [completed]
      10:30:41 [03:30:40] Checking certificate [started]
      10:30:41 TLS mode is turned on, however we failed to determine whether self-signed certificate is used. 
      10:30:41                Please rerun crwctl with "--self-signed-cert" option if it is the case, otherwise CodeReady Workspaces will fail to start.
      10:30:41 [03:30:40] Checking certificate [completed]
      10:30:41 [03:30:40] Create ServiceAccount codeready-operator in namespace crw-crwctl-tls-oauth [started]
      10:30:41 [03:30:40] Create ServiceAccount codeready-operator in namespace crw-crwctl-tls-oauth...done. [title changed]
      10:30:41 [03:30:40] Create ServiceAccount codeready-operator in namespace crw-crwctl-tls-oauth...done. [completed]
      10:30:41 [03:30:40] Create Role codeready-operator in namespace crw-crwctl-tls-oauth [started]
      10:30:41 [03:30:40] Create Role codeready-operator in namespace crw-crwctl-tls-oauth...done. [title changed]
      10:30:41 [03:30:40] Create Role codeready-operator in namespace crw-crwctl-tls-oauth...done. [completed]
      10:30:41 [03:30:40] Create ClusterRole codeready-operator [started]
      10:30:41 [03:30:40] Create ClusterRole codeready-operator...It already exists. [title changed]
      10:30:41 [03:30:40] Create ClusterRole codeready-operator...It already exists. [completed]
      10:30:41 [03:30:40] Create RoleBinding codeready-operator in namespace crw-crwctl-tls-oauth [started]
      10:30:41 [03:30:40] Create RoleBinding codeready-operator in namespace crw-crwctl-tls-oauth...done. [title changed]
      10:30:41 [03:30:40] Create RoleBinding codeready-operator in namespace crw-crwctl-tls-oauth...done. [completed]
      10:30:41 [03:30:40] Create ClusterRoleBinding codeready-operator [started]
      10:30:41 [03:30:40] Create ClusterRoleBinding codeready-operator...done. [title changed]
      10:30:41 [03:30:40] Create ClusterRoleBinding codeready-operator...done. [completed]
      10:30:41 [03:30:40] Create CRD checlusters.org.eclipse.che [started]
      10:30:41 [03:30:40] Create CRD checlusters.org.eclipse.che...It already exists. [title changed]
      10:30:41 [03:30:40] Create CRD checlusters.org.eclipse.che...It already exists. [completed]
      10:30:41 [03:30:40] Waiting 5 seconds for the new Kubernetes resources to get flushed [started]
      10:30:47 [03:30:45] Waiting 5 seconds for the new Kubernetes resources to get flushed...done. [title changed]
      10:30:47 [03:30:45] Waiting 5 seconds for the new Kubernetes resources to get flushed...done. [completed]
      10:30:47 [03:30:45] Create deployment codeready-operator in namespace crw-crwctl-tls-oauth [started]
      10:30:47 [03:30:45] Create deployment codeready-operator in namespace crw-crwctl-tls-oauth...done. [title changed]
      10:30:47 [03:30:45] Create deployment codeready-operator in namespace crw-crwctl-tls-oauth...done. [completed]
      10:30:47 [03:30:45] Create the Custom Resource of type checlusters.org.eclipse.che in the namespace crw-crwctl-tls-oauth [started]
      10:30:47 [03:30:45] Create the Custom Resource of type checlusters.org.eclipse.che in the namespace crw-crwctl-tls-oauth...done. [title changed]
      10:30:47 [03:30:45] Create the Custom Resource of type checlusters.org.eclipse.che in the namespace crw-crwctl-tls-oauth...done. [completed]
      10:30:47 [03:30:45]   Running the CodeReady Workspaces operator [completed]
      10:30:47 [03:30:45]   Post installation checklist [started]
      10:30:47 [03:30:45] PostgreSQL pod bootstrap [started]
      10:30:47 [03:30:45] scheduling [started]
      10:35:56 [03:35:55] scheduling [failed]
      10:35:56 [03:35:55]  ERR_TIMEOUT: Timeout set to pod wait timeout 300000. podExist: false, currentPhase: undefined
      10:35:56 [03:35:55] PostgreSQL pod bootstrap [failed]
      10:35:56 [03:35:55]  ERR_TIMEOUT: Timeout set to pod wait timeout 300000. podExist: false, currentPhase: undefined
      10:35:56 [03:35:55]   Post installation checklist [failed]
      10:35:56 [03:35:55]  ERR_TIMEOUT: Timeout set to pod wait timeout 300000. podExist: false, currentPhase: undefined
      10:35:56     Error: Error: ERR_TIMEOUT: Timeout set to pod wait timeout 300000. 
      10:35:56    podExist: false, currentPhase: undefined
      10:35:56     Installation failed, check logs in '/tmp/crwctl-logs/1592206239051'
      

              abazko Anatolii Bazko
              dnochevn Dmytro Nochevnov
              Votes:
              0 Vote for this issue
              Watchers:
              7 Start watching this issue

                Created:
                Updated:
                Resolved: