-
Bug
-
Resolution: Done-Errata
-
Critical
-
4.14.0
-
No
-
Hypershift Sprint 244
-
1
-
Rejected
-
False
-
-
-
Bug Fix
-
Done
Description of problem:
HostedClusters with a .status.controlPlaneEndpoint.port: 443 unexepectedly also expose the KAS on port 6443. This causes four security group rules to be consumed per LoadBalancer service (443/6443 for router and 443/6443 for private-router) instead of just two (443 for router and 443 for private-router). This directly impacts the number of HostedClusters on a Management Cluster since there is a hard cap of 200 security group rules per security group.
Version-Release number of selected component (if applicable):
4.14.0
How reproducible:
100%
Steps to Reproduce:
1. Create a HostedCluster resulting in its .status.controlPlaneEndpoint.port: 443 2. Observe that the router/private-router LoadBalancer services expose both ports 6443 and 443
Actual results:
The router/private-router LoadBalancer services expose both ports 6443 and 443
Expected results:
The router/private-router LoadBalancer services exposes only port 443
Additional info:
- blocks
-
OCPBUGS-22898 HostedCluster with ControlPlaneEndpoint: 443 also exposes on 6443
- Closed
- is cloned by
-
OCPBUGS-22898 HostedCluster with ControlPlaneEndpoint: 443 also exposes on 6443
- Closed
- is duplicated by
-
HOSTEDCP-1268 Staging: HC stuck at installing
- Closed
- links to
-
RHEA-2023:7198 rpm
- mentioned in
-
Page Loading...
- mentioned on