Uploaded image for project: 'OpenShift Logging'
  1. OpenShift Logging
  2. LOG-5146

LokiStack is in degraded condition with InvalidObjectStorageSecret issue on GCP STS cluster

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Not a Bug
    • Icon: Undefined Undefined
    • None
    • Logging 5.9.0
    • Log Storage

      Description:
      LokiStack status is degraded with InvalidObjectStorageSecret issue. As per the documenation on the story, Lokistack should be able to stand up with gcs bucket name and key.json

      spec:
        managementState: Managed
        rules:
          enabled: true
          namespaceSelector:
            matchLabels:
              openshift.io/cluster-monitoring: 'true'
          selector:
            matchLabels:
              openshift.io/cluster-monitoring: 'true'
        size: 1x.demo
        storage:
          schemas:
            - effectiveDate: '2023-10-15'
              version: v13
          secret:
            name: logging-loki-gcp-cloud-credentials
            type: gcs
        storageClassName: standard-csi
        tenants:
          mode: openshift-logging
      status:
        components: {}
        conditions:
          - lastTransitionTime: '2024-02-27T15:56:19Z'
            message: 'Invalid object storage secret contents: missing secret field: audience'
            reason: InvalidObjectStorageSecret
            status: 'True'
            type: Degraded
        storage: {}
      $ oc extract secret/logging-loki-gcp-cloud-credentials -n openshift-logging
      key.json
      bucketname
      $ cat key.json 
      {
        "type": "external_account",
        "audience": "<hidden>",
        "subject_token_type": "urn:ietf:params:oauth:token-type:jwt",
        "token_url": "https://sts.googleapis.com/v1/token",
        "credential_source": {
          "file": "/var/run/secrets/gcp/serviceaccount/token",
          "format":
      {       "type": "text"     }
        },
        "service_account_impersonation_url": "<hidden>"
      }                      
      

      How reproducible: Always

      Steps to reproduce:
      1) Deploy Loki Operator v5.9.
      2) Create serviceaccount under your GCP project and perform policy binding (add roles to subjects: <lokistack_name> and <lokistack_name>-ruler service accounts)
      3) Create credentials config and output it to a credentials file.
      4) Use the credentials file and bucket to create object storage secret.
      5) Provision LokiStack CR with object storage secret.

      Expected Result: LokiStack should stand up and run successfully with credential_source mounted on Loki components.

      Actual Result: LokiStack is degraded.

            Unassigned Unassigned
            rhn-support-kbharti Kabir Bharti
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: