-
Notifications
You must be signed in to change notification settings - Fork 629
operator cte-k8s-operator (1.5.10) #6020
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Dear @ssandur-thales, Errors (:bug:) must be fixed while warnings (:warning:) are informative, and fixing them might improve the quality of your solution.
|
f6cc6c4
to
54872f9
Compare
54872f9
to
29cd438
Compare
Hello, I am not able to figure out the reason why The operator deploy and operator upgrade tests are getting ImagePullBack errors? Could you please help me with this? |
The same operator has been certified in the RH certified-operators project via PR redhat-openshift-ecosystem/certified-operators#5597 |
29cd438
to
180aa7e
Compare
180aa7e
to
d7649f2
Compare
Signed-off-by: Suresh Sandur <suresh-s.sandur@thalesgroup.com>
d7649f2
to
96d701f
Compare
I found this in the logs of https://github.com/k8s-operatorhub/community-operators/actions/runs/14573282942/job/40874361228 for my PR. The error logs say: Whereas the pod is running in the test-upgrade namespace. Is that the cause for failure? |
Hello @haripate, @tomasbakk @Allda @mporrato, Please review the failure for this PR and let me know if any action needs to be taken from my side? From whatever is available, I do not think it is an Operator issue. There seems to be some issue with the test environment. |
@haripate @tomasbakk @mporrato @Allda , Helllo Folks, Can someone please help me with this PR. I need to know the issue that is causing the deploy/upgrade test to fail. Is there any change required from my side or it is an environment issue? |
What should I do to get a response??? |
Hey @ssandur-thales, the log you mentioned is not causing the failure, as this Ansible task is getting ignored. The issue seems to be in the upgrade operator tests. From the logs, it looks like the operator can't be upgraded from N-1 version to N. There is a suggestion at the end of the tests to debug the issue locally. Have you tried that and was it successful in your environment? The reason why the operator passed the certification in a different repository is that I believe there is no upgrade check at that test suite. |
hi @Allda, When I run the certification tests in my K8s cluster environment fail with OLM is already installed, If I uninstall OLM from my cluster and try the tests again, even then it fails. I have verified that the Operator upgrade happens. successfully if I simply do an upgrade outside of certification tests. |
I managed to get past the OLM issue. now my local test fail with name resolution error. `TASK [operator_push_image : Push image 'kind-registry:5000/test-operator/cte-k8s-operator:v1.5.10'] *** TASK [build_operator_version_bundle : Push bundle image with the timestamp] **** TASK [build_operator_version_bundle : Set 'result_rc' to false] **************** TASK [build_operator_version_bundle : Failing when bundle was not created or not pushed] *** The image was created, but push to kind-registry did not happen |
attaching the log output of the local test. Is there any setting with respect to Kind or network that I have to do on my K8s Cluster? Ihave followed the steps mentioned here --> https://k8s-operatorhub.github.io/community-operators/operator-test-suite/ Specifically running tests from a local directory. |
I was able to successfully complete the tests locally and found the reason for failure too. The cte-k8s-operator uses the kube-rbac-proxy image. Starting version v1.5.10 the image is pulled from registry.redhat.io instead from gcr.io/kubebuilder as in earlier versions. This is because of the deprecation notice for the latter. registry.redhat.io being a private registry requires authentication to pull images. The cte-k8s-operator expects a secret by name rh-kube-proxy-secret being created with credentials for registry.redhat.io in the namespace in which the operator is installed i.e. test-operators. In my local env, I ran the command to create the secret in a loop continuously till the test-operators namespace got created. How can this be achieved in the automated tests? |
@ssandur-thales, it's good to hear that you found a root cause. If your operator is using images from registries that require authentication (registry.redhat.io) I don't think there is a way how to make it work with k8s operators environment, as users would not be able to install it without the need to subsribe to the registry first. You can check out this guidance and pick any alternative solution: |
Hello @Allda, We did explore the option of copying the kube-rbac-proxy from gcr.io/kubebuilder to our docker.io repo which is public. However, the operator then wouldn't pass RH certification tests. They required pre-certified image only to be used and hence we switched to the image from registry.redhat.io. We have moved on to the upgrading the operator-sdk which eliminates the need for the kube-rbac-proxy image in the next version of the operator, however, even there the upgrade test would fail, because the upgrade path would be from 1.5.10 to 1.6.X Are you suggesting there is no way of getting this and the next version of the operator certified with community-operators project in this scenario? Is there an exception available? |
As far as I know, the Red Hat certification process doesn't enforce the usage of only certified content. There are plenty of examples: |
This is the response I got from Redhat Support, when I filed a case with them, then certification with my copied version of kube-rbac-proxy failed. `We recommend that you use either Red Hat provided containers or already-certified 3rd party containers in your operands. This is neither, nor would it pass certification as it's presently constituted. In addition, you should probably be using the Red Hat-supplied kube-rbac-policy container rather than one you have from some other source. We have up-to-date versions of this proxy that you can use. The Catalog entry is here: https://catalog.redhat.com/software/containers/openshift4/ose-kube-rbac-proxy-rhel9/652809a5244cb343fb4a4b66 |
Thanks submitting your Operator. Please check below list before you create your Pull Request.
New Submissions
Updates to existing Operators
ci.yaml
file according to the update instructions?replaces
property if you chosereplaces-mode
via theupdateGraph
property inci.yaml
?package.yaml
orannotations.yaml
?Your submission should not
Operator Description must contain (in order)
Operator Metadata should contain
Remember that you can preview your CSV here.
--
1 If you feel your Operator does not fit any of the pre-defined categories, file an issue against this repo and explain your need
2 For more information see here