-
Bug
-
Resolution: Unresolved
-
Major
-
None
-
4.13.z
-
Important
-
None
-
Rejected
-
False
-
Description of problem:
The authentication cluster operator is going into degraded state when traffic goes to custom router pods created by custom ingress controller instead of the default router pods : ~~~ OAuthServerRouteEndpointAccessibleControllerAvailable: Get "https://oauth-openshift.apps.xxx.devcluster.openshift.com/healthz": x509: certificate is valid for *.apps-sharded.basedomain.example.net, not oauth-openshift.apps.xxx.devcluster.openshift.com ~~~
Version-Release number of selected component (if applicable):
Reproduced on 4.13
How reproducible:
100%
Steps to Reproduce:
1. Create a custom ingresscontroller in the cluster ~~~ $ cat ing.yaml apiVersion: operator.openshift.io/v1 kind: IngressController metadata: name: sharded namespace: openshift-ingress-operator spec: endpointPublishingStrategy: type: HostNetwork domain: apps-sharded.basedomain.example.net nodePlacement: routeSelector: matchLabels: type: sharded ~~~ 2. Change the replica of default router pod to 0 : ~~~ $ oc edit ingresscontroller default -n openshift-ingress-operator changed replicas: 0 ~~~ 3. Check if new router pods are running : ~~~ $ oc get pods -n openshift-ingress NAME READY STATUS RESTARTS AGE router-sharded-5c9898b495-7mrwt 1/1 Running 0 2m48s router-sharded-5c9898b495-sqvbs 1/1 Running 0 2m48s ~~~ 4. Check the status of authentication operator ~~~ $ oc get co authentication NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE authentication 4.13.0-0.nightly-2024-11-23-101305 False False False 45s OAuthServerRouteEndpointAccessibleControllerAvailable: Get "https://oauth-openshift.apps.xxx.devcluster.openshift.com/healthz": x509: certificate is valid for *.apps-sharded.basedomain.example.net, not oauth-openshift.apps.xxx.devcluster.openshift.com ~~~
Actual results:
The authentication cluster operator is going into degraded state if the request goes to custom router pods.
Expected results:
The authentication cluster operator should not go into degraded state if the request goes to custom router pods.
Additional info:
At customer's end : There are two ingresscontroller present in the cluster - one is default and another one is custom ingresscontroller. While upgrading the cluster, the authentication cluster operator went to degarded state.