Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-41690

4.16 EUS upgrade gets stuck on networking because it's waiting to render manifests

XMLWordPrintable

    • Critical
    • None
    • False
    • Hide

      None

      Show
      None

      Description of problem:
      During 4.14 to 4.16 EUS upgrade, after master nodes upgrade from 4.15 to 4.16, networking is in progressing state for 30 minutes because it's waiting to render manifests.

      === Upgrade Status 00:37:21 ===
      = Control Plane =
      Assessment:      Completed
      Target Version:  4.16.0-0.nightly-2024-09-06-042551 (from 4.15.0-0.nightly-2024-09-06-042541)
      Completion:      100%
      Duration:        1h26m
      Operator Status: 33 Healthy
      Control Plane Nodes
      NAME                                  ASSESSMENT   PHASE     VERSION                              EST   MESSAGE
      ci-op-j8ks1vmg-9a81a-nvtgt-master-0   Completed    Updated   4.16.0-0.nightly-2024-09-06-042551   -     
      ci-op-j8ks1vmg-9a81a-nvtgt-master-1   Completed    Updated   4.16.0-0.nightly-2024-09-06-042551   -     
      ci-op-j8ks1vmg-9a81a-nvtgt-master-2   Completed    Updated   4.16.0-0.nightly-2024-09-06-042551   -     
      = Worker Upgrade =
      = Worker Pool =
      Worker Pool:     worker
      Assessment:      Excluded
      Completion:      0%
      Worker Status:   3 Total, 3 Available, 0 Progressing, 3 Outdated, 0 Draining, 3 Excluded, 0 Degraded
      Worker Pool Nodes
      NAME                                        ASSESSMENT   PHASE    VERSION   EST   MESSAGE
      ci-op-j8ks1vmg-9a81a-nvtgt-worker-1-q6ksf   Excluded     Paused   4.14.35   -     
      ci-op-j8ks1vmg-9a81a-nvtgt-worker-2-j5lhl   Excluded     Paused   4.14.35   -     
      ci-op-j8ks1vmg-9a81a-nvtgt-worker-3-dlf7r   Excluded     Paused   4.14.35   -     
      = Update Health =
      SINCE   LEVEL     IMPACT           MESSAGE
      -       Warning   Update Stalled   Outdated nodes in a paused pool 'worker' will not be updated
      Upgrade checking end at 2024-09-07 00:37:22 - succeed
      
      Make sure every operator's PROGRESSING column is False
      Some operator's PROGRESSING is True
      network                                    4.16.0-0.nightly-2024-09-06-042551   True        True          False      5h54m   Waiting to render manifests
      "True"
      ...
      Make sure every operator's PROGRESSING column is False
      Some operator's PROGRESSING is True
      network                                    4.16.0-0.nightly-2024-09-06-042551   True        True          False      6h28m   Waiting to render manifests
      "True"
      

      Version-Release number of selected component (if applicable):
      4.16.0-0.nightly-2024-09-06-042551

      How reproducible:
      Always

      Steps to Reproduce:

      1. 4.14 to 4.16 EUS upgrade on a OVN cluster

      2.

      3.

      Actual results:
      Network gets stuck in 4.16 because it's waiting to render manifests

      Expected results:
      Upgrade succeeds

      Additional info:
      It's reproducible in 4.14 to 4.17 and 4.15 to 4.17 CPOU (EUS) upgrades

      Must gather is available on https://drive.google.com/file/d/1GlqrkehFoIG9KY700v8dR1S4CFOXE4bv/view?usp=sharing

      Please fill in the following template while reporting a bug and provide as much relevant information as possible. Doing so will give us the best chance to find a prompt resolution.

      Affected Platforms:

      Is it an

      1. internal CI failure
      2. customer issue / SD
      3. internal RedHat testing failure

      If it is an internal RedHat testing failure:

      • Please share a kubeconfig or creds to a live cluster for the assignee to debug/troubleshoot along with reproducer steps (specially if it's a telco use case like ICNI, secondary bridges or BM+kubevirt).

      If it is a CI failure:

      • Did it happen in different CI lanes? If so please provide links to multiple failures with the same error instance
      • Did it happen in both sdn and ovn jobs? If so please provide links to multiple failures with the same error instance
      • Did it happen in other platforms (e.g. aws, azure, gcp, baremetal etc) ? If so please provide links to multiple failures with the same error instance
      • When did the failure start happening? Please provide the UTC timestamp of the networking outage window from a sample failure run
      • If it's a connectivity issue,
      • What is the srcNode, srcIP and srcNamespace and srcPodName?
      • What is the dstNode, dstIP and dstNamespace and dstPodName?
      • What is the traffic path? (examples: pod2pod? pod2external?, pod2svc? pod2Node? etc)

      If it is a customer / SD issue:

      • Provide enough information in the bug description that Engineering doesn’t need to read the entire case history.
      • Don’t presume that Engineering has access to Salesforce.
      • Do presume that Engineering will access attachments through supportshell.
      • Describe what each relevant attachment is intended to demonstrate (failed pods, log errors, OVS issues, etc).
      • Referring to the attached must-gather, sosreport or other attachment, please provide the following details:
        • If the issue is in a customer namespace then provide a namespace inspect.
        • If it is a connectivity issue:
          • What is the srcNode, srcNamespace, srcPodName and srcPodIP?
          • What is the dstNode, dstNamespace, dstPodName and dstPodIP?
          • What is the traffic path? (examples: pod2pod? pod2external?, pod2svc? pod2Node? etc)
          • Please provide the UTC timestamp networking outage window from must-gather
          • Please provide tcpdump pcaps taken during the outage filtered based on the above provided src/dst IPs
        • If it is not a connectivity issue:
          • Describe the steps taken so far to analyze the logs from networking components (cluster-network-operator, OVNK, SDN, openvswitch, ovs-configure etc) and the actual component where the issue was seen based on the attached must-gather. Please attach snippets of relevant logs around the window when problem has happened if any.
      • When showing the results from commands, include the entire command in the output.  
      • For OCPBUGS in which the issue has been identified, label with “sbr-triaged”
      • For OCPBUGS in which the issue has not been identified and needs Engineering help for root cause, label with “sbr-untriaged”
      • Do not set the priority, that is owned by Engineering and will be set when the bug is evaluated
      • Note: bugs that do not meet these minimum standards will be closed with label “SDN-Jira-template”
      • For guidance on using this template please see
        OCPBUGS Template Training for Networking  components

              jtanenba@redhat.com Jacob Tanenbaum
              yanyang@redhat.com Yang Yang
              Anurag Saxena Anurag Saxena
              Votes:
              0 Vote for this issue
              Watchers:
              10 Start watching this issue

                Created:
                Updated: