-
Bug
-
Resolution: Obsolete
-
Minor
-
None
-
RH-SSO-7.5.1
-
False
-
None
-
False
-
I believe we have found the root cause and Steps to Reproduce for the Jira KEYCLOAK-18602:
- When you have a PostgreSQL Database in another project/namespace and you try to use the ClusterIP address, the RH SSO Operator is not allowed to change the endpoints object for keycloak-postgresql.
- However if you use another IP address from outside the OCP cluster (e.g. a RHEL VM in the same Network with PostgreSQL installed) it allows the above.
It's likely the root cause is the following extracted from the OCP 3.11 Documentation (which seems to apply to OCP 4.X as well):
Note that OpenShift Container Platform will not let most users manually create an Endpoints object that points to an IP address in the network blocks reserved for pod and service IPs. Only cluster admins or other users with permission to create resources under endpoints/restricted can create such Endpoint objects.
Suggestions:
- Have the RH SSO Operator with the necessary permissions as the above.
- If not possible or not desired, mention in the Documentation that for when externalizing to a PostgreSQL Database located in another project/namespace inside OpenShift, the format <POD>.<NAMESPACE>.svc.cluster.local should be used instead of the ClusterIP address.