-
Bug
-
Resolution: Done
-
Major
-
OSSM 2.0.11, OSSM 2.1.5, OSSM 2.2.2
-
None
-
False
-
None
-
False
-
Sprint 56, Sprint 57, Sprint 58 - week 1
annotations:
authorization.k8s.io/decision: allow
authorization.k8s.io/reason: 'RBAC: allowed by ClusterRoleBinding "servicemeshoperator.v2.1.3-d8576fd89"
of ClusterRole "servicemeshoperator.v2.1.3-d8576fd89" to ServiceAccount "istio-operator/openshift-operators"'
k8s.io/deprecated: 'true'
k8s.io/removed-release: '1.25'
apiVersion: audit.k8s.io/v1
auditID: 0a5fa7b4-ca90-4a30-8231-37c491eb5535
kind: Event
level: Metadata
objectRef:
apiGroup: autoscaling
apiVersion: v2beta1
resource: horizontalpodautoscalers
requestReceivedTimestamp: '2022-06-14T20:07:30.020603Z'
requestURI: /apis/autoscaling/v2beta1/horizontalpodautoscalers?labelSelector=app.kubernetes.io%2Fmanaged-by%3Dmaistra-istio-operator%2Capp.kubernetes.io%2Fversion%21%3D2.1.3-2.el8-1%2Cmaistra.io%2Fowner%3Distio-system
responseStatus:
code: 200
metadata: {}
sourceIPs:
- 10.1.156.46
stage: ResponseComplete
stageTimestamp: '2022-06-14T20:07:30.044304Z'
user:
extra:
authentication.kubernetes.io/pod-name:
- istio-operator-75bd956695-54495
authentication.kubernetes.io/pod-uid:
- dfee1215-7d08-48ff-a7f5-389b1d09c20e
groups:
- system:serviceaccounts
- system:serviceaccounts:openshift-operators
- system:authenticated
uid: df5e10f8-aa6d-4a3b-a36f-7c9f98d11300
username: system:serviceaccount:openshift-operators:istio-operator
userAgent: istio-operator/v0.0.0 (linux/amd64) kubernetes/3859571
verb: list
Version of all relevant components (if applicable):
cnv-qe-jenkins@cnv-qe-infra-01:~/anat/cnv-tests$ oc get csv
NAME DISPLAY VERSION REPLACES PHASE
jaeger-operator.v1.34.1-5 Red Hat OpenShift distributed tracing platform 1.34.1-5 jaeger-operator.v1.30.2 Succeeded
kiali-operator.v1.36.10 Kiali Operator 1.36.10 kiali-operator.v1.36.9 Succeeded
servicemeshoperator.v2.1.3 Red Hat OpenShift Service Mesh 2.1.3-0 servicemeshoperator.v2.1.2 Succeeded
Steps to reproduce:
Get deprecated API calls:
1. get audit logs:
oc adm node-logs --role=master --path=kube-apiserver
2. Look for deprecated calls in each log, for example:
oc adm node-logs cnv-qe-infra-21.cnvqe2.lab.eng.rdu2.redhat.com --path=kube-apiserver/audit-2022-06-16T19-22-41.798.log | grep '"k8s.io/deprecated":"true"'