Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-34846

Ingress autoscaling was blocked due to token of the created serviceaccount thanos was none

XMLWordPrintable

    • Important
    • No
    • 5
    • OSDOCS Sprint 256
    • 1
    • Rejected
    • False
    • Hide

      None

      Show
      None

      Description of problem:

      need the Service Account's token to define a TriggerAuthentication for the Ingress autoscaling. But token of the created serviceaccount thanos was none

      Version-Release number of selected component (if applicable):

          4.16.0-0.nightly-2024-06-03-060250

      How reproducible:

          100%

      Steps to Reproduce:

      1.
      % oc get clusterversion
      NAME      VERSION                              AVAILABLE   PROGRESSING   SINCE   STATUS
      version   4.16.0-0.nightly-2024-06-03-060250   True        False         4h52m   Cluster version is 4.16.0-0.nightly-2024-06-03-060250     
      
      2.
      % oc -n openshift-ingress-operator create serviceaccount thanos
      serviceaccount/thanos created     
      
      3. The "Tokens" of the serviceaccount thanos is none
      % oc -n openshift-ingress-operator  describe serviceaccount thanos
      Name:                thanos
      Namespace:           openshift-ingress-operator
      Labels:              <none>
      Annotations:         openshift.io/internal-registry-pull-secret-ref: thanos-dockercfg-wct9m
      Image pull secrets:  thanos-dockercfg-wct9m
      Mountable secrets:   thanos-dockercfg-wct9m
      Tokens:              <none>
      Events:              <none>
      %    

      Actual results:

          The "Tokens" of the serviceaccount thanos is none

      Expected results:

          The "Tokens" should be as "thanos-token-thcr4" as before

      Additional info:

          

              rhn-support-jdohmann Jesse Dohmann
              shudili@redhat.com Shudi Li
              Shudi Li Shudi Li
              Votes:
              0 Vote for this issue
              Watchers:
              7 Start watching this issue

                Created:
                Updated:
                Resolved: