Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-24410

Need to update kms-provider policy manually when setting kms backup key in the HostedCluster CR

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • 4.15
    • HyperShift
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • None
    • Critical
    • No
    • None
    • None
    • Rejected
    • Hypershift Sprint 247
    • 1
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Description of problem:

      When setting kms backup key in the HostedCluster CR, need to manually update resource of kms-provider policy on AWS console, so kms-provider has permission to backup key.
      
      slack discussion:
        https://redhat-internal.slack.com/archives/G01QS0P2F6W/p1701719512687199

      Version-Release number of selected component (if applicable):

          

      How reproducible:

          

      Steps to Reproduce:

      1. generate KeyA and KeyB
      2. Create a cluster with activeKey=KeyA
      3. create a secret on the guest cluster and decode it
      4. Set activeKey=KeyB, backupKey=KeyA in the HC     

      Actual results:

          A container in the kube-apiserver pod is not ready

      Expected results:

          kube-apiserver gets to ready state

      Additional info:

          Status of the new kube-apiserver pod
      status:
        conditions:
        - lastProbeTime: null
          lastTransitionTime: "2023-12-04T19:29:51Z"
          status: "True"
          type: Initialized
        - lastProbeTime: null
          lastTransitionTime: "2023-12-04T19:29:49Z"
          message: 'containers with unready status: [kube-apiserver]'
          reason: ContainersNotReady
          status: "False"
          type: Ready
        - lastProbeTime: null
          lastTransitionTime: "2023-12-04T19:29:49Z"
          message: 'containers with unready status: [kube-apiserver]'
          reason: ContainersNotReady
          status: "False"
          type: ContainersReady
        - lastProbeTime: null
          lastTransitionTime: "2023-12-04T19:29:49Z"
          status: "True"
          type: PodScheduled 

      Modifying the the permission directly in AWS adding keyB resolves the issue

              Unassigned Unassigned
              rhn-support-jiezhao Jie Zhao
              None
              None
              Jie Zhao Jie Zhao
              None
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated: