Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-21725

[4.12] net/http: TLS handshake timeout - authentication is temporarily unavailable during rollback

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Can't Do
    • Icon: Undefined Undefined
    • None
    • 4.12.z
    • apiserver-auth
    • Moderate
    • No
    • False
    • Hide

      None

      Show
      None

      Description of problem:

      I'm seeing a lot of net/http: TLS handshake timeout in the 4.12 upgrade rollback CI. The test is installing 4.12.0, upgrading to the latest 4.12 nightly, at some random point, rolling back to 4.12.0.
      
      Looking at the authentication operator log, I'm seeing availability=false condition
      {"lastTransitionTime":"2023-10-12T11:06:32Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.ci-op-f4rgkvwn-d3cda.aws-2.ci.openshift.org/healthz\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},
      
      The job link is https://prow.ci.openshift.org/view/gs/origin-ci-test/logs/periodic-ci-openshift-release-master-nightly-4.12-e2e-aws-ovn-upgrade-rollback-oldest-supported/1712393399312584704
      

      Version-Release number of selected component (if applicable):

      
      

      How reproducible:

      Flaky
      

      Steps to Reproduce:

      1.
      2.
      3.
      

      Actual results:

      Auth is unavailable during rollback
      

      Expected results:

      Auth is available during rollback
      

      Additional info:

      
      

              slaznick@redhat.com Stanislav Láznička (Inactive)
              yanyang@redhat.com Yang Yang
              Xingxing Xia Xingxing Xia
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: