-
Bug
-
Resolution: Done
-
Critical
-
Logging 6.0.0
-
False
-
None
-
False
-
NEW
-
NEW
-
Release Note Not Required
-
-
-
Log Collection - Sprint 257
Description of problem:
CLO 6.0 can not be deployed in 4.14. CustomResourceDefinition clusterlogforwarders.observability.openshift.io can not be installed. openshift-operator-lifecycle-manager catalog-operator report error below.
time="2024-07-23T06:57:52Z" level=info msg="added to bundle, Kind=ClusterRole" configmap=openshift-marketplace/b0773329f4d7c966c047797a36d8d1a783cb52ef4d84ba02549cfebda958f19 key=collect-audit-logs_rbac.authorization.k8s.io_v1_clusterrole.yaml E0723 06:57:52.624825 1 queueinformer_operator.go:319] sync {"update" "openshift-logging/install-mvm27"} failed: CustomResourceDefinition.apiextensions.k8s.io "clusterlogforwarders.observability.openshift.io" is invalid: spec.validation.openAPIV3Schema.x-kubernetes-validations[0].rule: Invalid value: apiextensions.ValidationRule{Rule:"matches(self.metadata.name,'^[a-z][a-z0-9-]{1,61}[a-z0-9]$')", Message:"Name must be a valid DNS1035 label", MessageExpression:""}: compilation failed: ERROR: <input>:1:8: found no matching overload for 'matches' applied to '(string, string)' | matches(self.metadata.name,'^[a-z][a-z0-9-]{1,61}[a-z0-9]$')
Version-Release number of selected component (if applicable):
Logging 6.0.0
Openshift 4.14.33
How reproducible:
Always
Steps to Reproduce:
1) deploy CLO on OCP 4.14
2) check the CSV status.
3) check the catalog-operator and olm-operator pods logs
Actual results:
$oc get csv cluster-logging.v6.0.0 -o json |jq '.status.requirementStatus'
[ { "group": "operators.coreos.com", "kind": "ClusterServiceVersion", "message": "CSV minKubeVersion (1.18.3) less than server version (v1.27.15+6147456)", "name": "cluster-logging.v6.0.0", "status": "Present", "version": "v1alpha1" }, { "group": "apiextensions.k8s.io", "kind": "CustomResourceDefinition", "message": "CRD is not present", "name": "clusterlogforwarders.observability.openshift.io", "status": "NotPresent", "version": "v1" }, { "group": "apiextensions.k8s.io", "kind": "CustomResourceDefinition", "message": "CRD is not present", "name": "logfilemetricexporters.logging.openshift.io", "status": "NotPresent", "version": "v1" }, { "group": "", "kind": "ServiceAccount", "message": "Service account does not exist", "name": "cluster-logging-operator", "status": "NotPresent", "version": "v1" } ]
$oc -n openshift-operator-lifecycle-manager logs catalog-operator-d66884676-cwz6s
time="2024-07-23T06:57:52Z" level=info msg="added to bundle, Kind=ClusterRole" configmap=openshift-marketplace/b0773329f4d7c966c047797a36d8d1a783cb52ef4d84ba02549cfebda958f19 key=collect-audit-logs_rbac.authorization.k8s.io_v1_clusterrole.yaml E0723 06:57:52.624825 1 queueinformer_operator.go:319] sync {"update" "openshift-logging/install-mvm27"} failed: CustomResourceDefinition.apiextensions.k8s.io "clusterlogforwarders.observability.openshift.io" is invalid: spec.validation.openAPIV3Schema.x-kubernetes-validations[0].rule: Invalid value: apiextensions.ValidationRule{Rule:"matches(self.metadata.name,'^[a-z][a-z0-9-]{1,61}[a-z0-9]$')", Message:"Name must be a valid DNS1035 label", MessageExpression:""}: compilation failed: ERROR: <input>:1:8: found no matching overload for 'matches' applied to '(string, string)' | matches(self.metadata.name,'^[a-z][a-z0-9-]{1,61}[a-z0-9]$')
$oc -n openshift-operator-lifecycle-manager logs olm-operator-787c9d4f87-lwml8
time="2024-07-23T07:05:20Z" level=info msg="requirements were not met" csv=cluster-logging.v6.0.0 id=lrvvI namespace=openshift-logging phase=Pending time="2024-07-23T07:05:20Z" level=info msg="couldn't ensure RBAC in target namespaces" csv=cluster-logging.v6.0.0 error="no owned roles found" id=86f5c namespace=openshift-logging phase=Pending {"level":"error","ts":"2024-07-23T07:07:40Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"cluster-logging.v6.0.0","namespace":"openshift-logging"},"namespace":"openshift-logging","name":"cluster-logging.v6.0.0","reconcileID":"0be2a820-62d0-442a-b9f4-a692532c10a9","error":"Deployment.apps \"cluster-logging-operator\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:324\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:265\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:226"} time="2024-07-23T07:09:23Z" level=info msg="requirements were not met" csv=cluster-logging.v6.0.0 id=+/lkK namespace=openshift-logging phase=Pending time="2024-07-23T07:09:23Z" level=info msg="couldn't ensure RBAC in target namespaces" csv=cluster-logging.v6.0.0 error="no owned roles found" id=BGMlv namespace=openshift-logging phase=Pending E0723 07:09:23.904214 1 queueinformer_operator.go:319] sync {"update" "openshift-logging/cluster-logging.v6.0.0"} failed: no owned roles found time="2024-07-23T07:09:23Z" level=info msg="requirements were not met" csv=cluster-logging.v6.0.0 id=mmS2L namespace=openshift-logging phase=Pending time="2024-07-23T07:09:23Z" level=info msg="couldn't ensure RBAC in target namespaces" csv=cluster-logging.v6.0.0 error="no owned roles found" id=Y0oJS namespace=opensh
$oc -n openshift-operator-lifecycle-manager logs olm-operator-787c9d4f87-lwml8
time="2024-07-23T07:05:20Z" level=info msg="requirements were not met" csv=cluster-logging.v6.0.0 id=lrvvI namespace=openshift-logging phase=Pending time="2024-07-23T07:05:20Z" level=info msg="couldn't ensure RBAC in target namespaces" csv=cluster-logging.v6.0.0 error="no owned roles found" id=86f5c namespace=openshift-logging phase=Pending {"level":"error","ts":"2024-07-23T07:07:40Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"cluster-logging.v6.0.0","namespace":"openshift-logging"},"namespace":"openshift-logging","name":"cluster-logging.v6.0.0","reconcileID":"0be2a820-62d0-442a-b9f4-a692532c10a9","error":"Deployment.apps \"cluster-logging-operator\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:324\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:265\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:226"} time="2024-07-23T07:09:23Z" level=info msg="requirements were not met" csv=cluster-logging.v6.0.0 id=+/lkK namespace=openshift-logging phase=Pending time="2024-07-23T07:09:23Z" level=info msg="couldn't ensure RBAC in target namespaces" csv=cluster-logging.v6.0.0 error="no owned roles found" id=BGMlv namespace=openshift-logging phase=Pending E0723 07:09:23.904214 1 queueinformer_operator.go:319] sync {"update" "openshift-logging/cluster-logging.v6.0.0"} failed: no owned roles found time="2024-07-23T07:09:23Z" level=info msg="requirements were not met" csv=cluster-logging.v6.0.0 id=mmS2L namespace=openshift-logging phase=Pending