-
Bug
-
Resolution: Won't Do
-
Undefined
-
None
-
4.13.z, 4.14.z
-
No
-
Rejected
-
False
-
Description of problem:
When dnses.operator.openshift.io.spec.upstreamResolvers.protocolStrategy: TCP is set in OpenShift 4.13/4.14, the authentication, console and ingress operators go into a degraded state
Version-Release number of selected component (if applicable):
4.13.41, 4.14.25
How reproducible:
Steps to Reproduce:
1. Set dnses.operator.openshift.io.spec.upstreamResolvers.protocolStrategy: TCP 2. Upgrade to 4.13/4.14 3. Observer operators in degraded state
Actual results:
ClusterOperators: clusteroperator/authentication is not available (OAuthServerRouteEndpointAccessibleControllerAvailable: Get "https://oauth-openshift.apps.aro.domain/healthz": context deadline exceeded (Client.Timeout exceeded while awaiting headers)) because OAuthServerRouteEndpointAccessibleControllerDegraded: Get "https://oauth-openshift.apps.aro.domain/healthz": context deadline exceeded (Client.Timeout exceeded while awaiting headers) clusteroperator/console is not available (DeploymentAvailable: 0 replicas available for console deployment RouteHealthAvailable: failed to GET route (https://console-openshift-console.apps.aro.domain): Get "https://console-openshift-console.apps.aro.domain": context deadline exceeded (Client.Timeout exceeded while awaiting headers)) because RouteHealthDegraded: failed to GET route (https://console-openshift-console.apps.aro.domain): Get "https://console-openshift-console.apps.aro.domain": context deadline exceeded (Client.Timeout exceeded while awaiting headers) clusteroperator/ingress is degraded because The "default" ingress controller reports Degraded=True: DegradedConditions: One or more other status conditions indicate a degraded state: CanaryChecksSucceeding=False (CanaryChecksRepetitiveFailures: Canary route checks for the default ingress controller are failing)
Expected results:
This should function properly with TCP set
Additional info: