-
Bug
-
Resolution: Done-Errata
-
Major
-
4.11
-
+
-
Important
-
None
-
5
-
Sprint 231, Sprint 232, Sprint 233, Sprint 234, Sprint 235, Sprint 236, Sprint 237
-
7
-
Rejected
-
False
-
-
-
Bug Fix
-
Done
-
Description of problem:
While/after upgrading to 4.11 2023-01-14 CoreDNS has a problem with UDP overflows so DNS lookups are very slow and cause the ingress operator upgrade to stall. We needed to work around with force_tcp following this: https://access.redhat.com/solutions/5984291
Version-Release number of selected component (if applicable):
How reproducible:
100%, but seems to depend on the network environemnt (excact cause unknown)
Steps to Reproduce:
1. install cluster with OKD 4.11-2022-12-02 or earlier 2. initiate upgrade to OKD 4.11-2023-01-14 3. upgrade will stall after upgrading CoreDNS
Actual results:
CoreDNS logs: [ERROR] plugin/errors: 2 oauth-openshift.apps.okd-admin.muc.lv1871.de. AAAA: dns: overflowing header size
Expected results:
Additional info:
- blocks
-
OCPBUGS-15225 while/after upgrading to OKD 4.11 2023-01-14 CoreDNS has a problem with UDP overflows
- Closed
- is cloned by
-
OCPBUGS-15225 while/after upgrading to OKD 4.11 2023-01-14 CoreDNS has a problem with UDP overflows
- Closed
-
OCPBUGS-15251 while/after upgrading to OKD 4.11 2023-01-14 CoreDNS has a problem with UDP overflows
- Closed
- is related to
-
OCPBUGS-33667 Add docs section for protocolStrategy
- New
-
OCPBUGS-15605 CoreDNS UDP bufsize unnecessarily restricted to 512
- Closed
- links to
-
RHEA-2023:5006 rpm