Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-51190

kube-controller-manager-cert-syncer fatal errors go unnoticed

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Not a Bug
    • Icon: Undefined Undefined
    • None
    • 4.17
    • None
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Description of problem:

          When the kube-controller-manager cert-syncer container has bad kube-apiserver client credentials, the operator doesn't become degraded

      Version-Release number of selected component (if applicable):

          4.17

      How reproducible:

          Not trivial to reproduce, was caused by a bug in an external tool that modified the JWT token in a bad way

      Steps to Reproduce:

          1. Mess up the token used by cert-syncer

      Actual results:

          kube-controller-manager cert-syncer can't reach kube-apiserver, yet the operator doesn't become degraded in response

      Expected results:

          operator should notice the cert-syncer can't reach the kube-apiserver and become degraded to let the user know there's something wrong

      Additional info:

          It doesn't lead to any issue initially, but eventually the cert-syncer not syncing certs causes the certs to expire and the cluster starts falling apart.
      
      Could arguably be considered not a bug, since there's nothing in OCP to cause this naturally, but still thought it's a bit weird behavior from kcmo that should probably be adjusted - if cert-syncer is having a bad time, I would expect the operator to go degraded 

       

              aos-workloads-staff Workloads Team Bot Account
              otuchfel@redhat.com Omer Tuchfeld
              None
              None
              Ying Zhou Ying Zhou
              None
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: