Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-35737

encryption-config secrets are not getting deleted automatically

XMLWordPrintable

    • Important
    • No
    • False
    • Hide

      None

      Show
      None

      Description of problem:

      We have seen when customer enabled the ETCD encryption, due to this every week encryption-config generated for kube-apiserver which is increasing the secret count in openshift-kube-apiserver namespace. Which is not getting deleted automatically after some time or new key generation. 

      We have seen this issue in every version of OCP cluster. 

      As of now we are suggesting to delete these secrets using the KCS: https://access.redhat.com/solutions/7039646

      As per the document the encryption config secrets rotates every week. 

      https://docs.openshift.com/container-platform/4.12/security/encrypting-etcd.html#enabling-etcd-encryption_encrypting-etcd

      Those should be deleted automatically in every-version. 

      We have seen those grows so much which increases the load of the master node. 

      Few examples of cases: 03839575, 03844152, 03841579

      There are many other examples.  

              jchaloup@redhat.com Jan Chaloupka
              rhn-support-vsolanki Vimal Solanki
              Ke Wang Ke Wang
              Votes:
              1 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: