Uploaded image for project: 'OpenShift Hosted Control Plane'
  1. OpenShift Hosted Control Plane
  2. HOSTEDCP-1849

Impact statement request for OCPBUGS-37486 Cannot reach to kubernetes.default.svc.cluster.local from workers of Hosted Cluster

XMLWordPrintable

    • Icon: Spike Spike
    • Resolution: Done
    • Icon: Critical Critical
    • None
    • None
    • None
    • False
    • None
    • False
    • 0
    • 0
    • 0

      Impact statement for the OCPBUGS-37486 series:

      Which 4.y.z to 4.y'.z' updates increase vulnerability?

      (4.14.z and 4.15.(z<17)) updating into 4.15.(17<=z<25).

      4.15 to 4.16 has no exposure, because graph-data#5352 landed before 4.16.0's GA, so no exposed GA 4.16.z releases (4.16.(z<6)) bake in updates from any unexposed 4.15 releases (4.15.(z<17)).

      Which types of clusters?

      Hosted/HyperShift clusters where HostedCluster spec.networking.apiServer.port is 443.

      What is the impact? Is it serious enough to warrant removing update recommendations?

      Trouble with Pods on compute Nodes connecting to the internal Kubernetes API service via the service IP.

      How involved is remediation?

      Setting a different spec.networking.apiServer.port? Or updating to a fixed release? Nothing from subject-matter experts yet in the remediation space yet, as far as I'm aware.

      Is this a regression?

      Yes.  Introduced:

      Fixed:

              agarcial@redhat.com Alberto Garcia Lamela
              dhurta@redhat.com David Hurta
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: