Uploaded image for project: 'OpenShift Logging'
  1. OpenShift Logging
  2. LOG-2840

[release-5.4] [OCP 4.11] CLO depends on automatically created SA token

    XMLWordPrintable

Details

    • False
    • None
    • False
    • NEW
    • VERIFIED
    • Hide
      Before this update, the cluster-logging-operator expected a secret to be automatically created by the cluster. Starting with OCP 4.11, this behavior changed which caused logging deployments to fail. With this update, the cluster-logging-operator resolves the issue by creating the secret if needed.
      Show
      Before this update, the cluster-logging-operator expected a secret to be automatically created by the cluster. Starting with OCP 4.11, this behavior changed which caused logging deployments to fail. With this update, the cluster-logging-operator resolves the issue by creating the secret if needed.
    • Log Storage - Sprint 222

    Description

      Kubernetes 1.24 changes the default behavior regarding Secrets of ServiceAccounts. This leads to the cluster-logging-operator depending on an automatically-created secret that no longer exists.

      Because this secret is used as a fallback for custom user-defined secrets in forwarder configurations the configuration generated by CLO on a OCP 4.11 cluster will be different than on previous versions leading to errors, if the contents of the fallback secret were expected by the client (be it the token or CA certificate).

      Attachments

        Activity

          People

            rojacob@redhat.com Robert Jacob
            rhn-support-ikanse Ishwar Kanse
            Ishwar Kanse Ishwar Kanse
            Votes:
            0 Vote for this issue
            Watchers:
            7 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: