github.com/openshift/installer@v1.4.17/docs/user/openstack/known-issues.md (about) 1 # Known Issues and Workarounds 2 3 We have been tracking a few issues and FAQs from our users, and are documenting them here along with the known workarounds and solutions. For issues that still have open bugs, we have attached the links to where the engineering team is tracking their progress. As changes occur, we will update both this document and the issue trackers with the latest information. 4 5 ## HTTPS CommonName deprecation 6 7 With OpenShift v4.10, HTTPS certificates must include the names for the server in the `Subject Alternative Names` field. Legacy certificates will be rejected with the following error message: 8 9 > x509: certificate relies on legacy Common Name field, use SANs instead 10 11 In order to validate your OpenStack infrastructure prior to installation or upgrade to v4.10, please refer to the [dedicated instructions](invalid-https-certificates.md). 12 13 ## Resources With Duplicate Names 14 15 Since the installer requires the *Name* of your external network and Red Hat Core OS image, if you have other networks or images with the same name, it will choose one randomly from the set. This is not a reliable way to run the installer. We highly recommend that you resolve this with your cluster administrator by creating unique names for your resources in openstack. 16 17 ## Soft-anti-affinity 18 19 A long-standing OpenStack Compute issue prevents the soft anti-affinity 20 policy to correctly apply when instances are created in parallel. To maximize 21 the chances that the default soft-anti-affinity setting applies, the Installer 22 generates the Control plane instances sequentially. However, there is no 23 guarantee that other machines, and in particular Compute nodes, are created 24 sequentially. This applies both to install-time machine building, and day 2 25 operations (e.g. MachineSet scale-out). 26 27 **When it is a requirement that machines land on distinct Compute hosts, 28 explicitly set `serverGroupPolicy` to `anti-affinity`.** 29 30 ## Extended installation times 31 32 Depending on the infrastructure performance, the installation may take longer than what the global installer timeout expects. In those cases, the installer will fail, but the cluster might still converge to a working state. In case of timeout, if such a case is suspected, it is advised to check the cluster health manually after some time: 33 34 ```shell 35 $ openshift-install wait-for install-complete 36 ``` 37 38 ## External Network Overlap 39 40 If your external network's CIDR range is the same as one of the default network ranges, then you will need to change the matching network range by running the installer with a custom `install-config.yaml`. If users are experiencing unusual networking problems, please contact your cluster administrator and validate that none of your network CIDRs are overlapping with the external network. We were unfortunately unable to support validation for this due to a lack of support in gophercloud, and even if we were, it is likely that the CIDR range of the floating ip would only be accessible cluster administrators. The default network CIDR are as follows: 41 42 ```txt 43 machineNetwork: 44 - cidr: "10.0.0.0/16" 45 serviceNetwork: 46 - "172.30.0.0/16" 47 clusterNetwork: 48 - cidr: "10.128.0.0/14" 49 ``` 50 51 ## Lack of default DNS servers on created subnets 52 53 Some OpenStack clouds do not set default DNS servers for the newly created subnets. In this case, the bootstrap node may fail to resolve public name records to download the OpenShift images or resolve the OpenStack API endpoints. 54 55 If you are having this problem in the IPI installer, you will need to set the [`externalDNS` property in `install-config.yaml`](./customization.md#cluster-scoped-properties). 56 57 Alternatively, for UPI, you will need to [set the subnet DNS resolvers](./install_upi.md#subnet-dns-optional). 58 59 ## Deleting machine when instance stuck in provisioning state 60 61 The machine controller can get stuck in a delete loop when it tries to delete a machine that is stuck in the provisioning state in OpenStack. This is a bug with OpenStack 62 because despite the instance existing, it returns a `Not Found` error when the controller attempts to delete it. If you have determined that the proper course of action is to delete the machine, you will first have to manually remove any [finalizers](https://kubernetes.io/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#finalizers) from that machine's object. This can be done with the `oc edit` tool. Machines can be found and edited like this: 63 64 ```sh 65 oc get machine -n openshift-machine-api 66 oc edit machine -n openshift-machine-api <name> 67 ``` 68 69 Once the finalizers are removed, you can delete it. 70 71 ```sh 72 oc delete machine -n openshift-machine-api <machine> 73 ``` 74 75 ## Cinder availability zones 76 77 OpenShift does not currently support Cinder availability zones. When attaching a volume to a Nova machine, the Cloud Provider will look for available storage in the same Availability Zone (or better said: in a Cinder availability Zone with the same name as the Nova availability zone of the corresponding machine). 78 79 In 4.6, [it is possible to control what Availability Zone each machine will be created in][nova-az-setting]. Cloud Provider can be instructed to ignore the corresponding machine's AZ (and thus pick storage regardless of the zones) by adding the `ignore-volume-az = yes` directive in its configuration, under the `[BlockStorage]` section of the `cloud-provider-config` configmap: 80 81 ```sh 82 oc edit cm cloud-provider-config -n openshift-config 83 ``` 84 85 ```txt 86 [BlockStorage] 87 ignore-volume-az = yes 88 ``` 89 90 Then it is required to create and use a new Storage Class that has the `availability` parameter set to your Cinder availability zone name, as below: 91 92 ```txt 93 allowVolumeExpansion: true 94 apiVersion: storage.k8s.io/v1 95 kind: StorageClass 96 metadata: 97 name: sc-availability 98 provisioner: kubernetes.io/cinder 99 parameters: 100 availability: <Cinder_AZ> 101 reclaimPolicy: Delete 102 volumeBindingMode: WaitForFirstConsumer 103 ``` 104 105 [nova-az-setting]: ../openstack#setting-nova-availability-zones 106 107 ## Problems when changing the Machine spec for master node 108 109 Changing the Machine spec (e.g. the image name) for master node will delete the instance in OpenStack and the machine status will change to `phase: failed with errorMessage: Can't find created instance`. 110 This is a known limitation in cluster-api-provider-openstack where we don't support that action. 111 To recover from a scenario where one or multiple master nodes are in failed status, you will have to follow the [restore procedure](https://docs.openshift.com/container-platform/4.6/backup_and_restore/replacing-unhealthy-etcd-member.html#restore-replace-stopped-etcd-member_replacing-unhealthy-etcd-member) to scale-up master nodes to reach quorum again. 112 113 Even if master node was removed in Nova, it can still appear when you run `oc get machines -n openshift-machine-api`. 114 To delete it, you can run: `oc delete machine --force=true -n openshift-machine-api <$NODE-NAME>` 115 116 ## Changing user domain for image registry 117 118 When users change their user domain name or ID globally they hit an issue with the image registry, when the operator doesn't update its configuration accordingly. It leads to the fact that the operator can't authenticate in OpenStack Swift and becomes degraded. 119 120 ```sh 121 $ oc logs cluster-image-registry-operator-748f8f9855-fhblt -c cluster-image-registry-operator --tail=20 122 123 I0303 17:32:15.100153 14 controller.go:291] object changed: *v1.Config, Name=cluster (status=true): changed:status.conditions.0.lastTransitionTime={"2021-03-03T17:32:14Z" -> "2021-03-03T17:32:15Z"} 124 I0303 17:32:15.603731 14 controller.go:291] object changed: *v1.Config, Name=cluster (status=true): 125 E0303 17:32:15.610609 14 controller.go:330] unable to sync: unable to sync storage configuration: Failed to authenticate provider client: Authentication failed, requeuing 126 I0303 17:32:15.644501 14 controller.go:291] object changed: *v1.Config, Name=cluster (status=true): 127 E0303 17:32:15.650130 14 controller.go:330] unable to sync: unable to sync storage configuration: Failed to authenticate provider client: Authentication failed, requeuing 128 ``` 129 130 This issue was fixed in 4.8, which means that all new deployments work correctly and update image registry configuration in the case of credentials change. For older versions, and for clusters that have been upgraded to 4.8, you need to manually clean the config and delete the incorrect values. 131 132 To do so, execute `oc edit configs.imageregistry.operator.openshift.io/cluster` and manually remove `domain` or `domainID` in the `.spec.storage.swift` section. Alternatively you can use the `oc patch` command: 133 134 ```sh 135 $ oc patch configs.imageregistry.operator.openshift.io/cluster --type 'json' -p='[{"op": "remove", "path": "/spec/storage/swift/domain"}]' 136 config.imageregistry.operator.openshift.io/cluster patched 137 ``` 138 139 # Known Issues specific to User-Provisioned Installations 140 141 ## Stale resources 142 143 The teardown playbooks provided for UPI installation will not delete: 144 - Cinder volumes from PVs 145 - Swift container for image registry (bootstrap container is correctly deleted) 146 147 These objects have to be manually removed after running the teardown playbooks. 148 149 ## Limitations of creating external load balancers using pre-defined FIPs 150 151 On most clouds, the default policy prevents non-admin users from creating 152 a floating IP that has a specific address. Such policies cause the cloud provider 153 to fail handling floating IP assignment to load balancers if a floating IP address 154 is present in the service specification. 155 156 You can pre-create a floating IP and pass the address of it in the service 157 specification if using the external cloud provider. The in-tree cloud 158 provider does not support this. 159 Alternatively, you can [relax the Neutron policy][policy-change-steps] 160 to allow non-admin users to create FIPs with a specific IP address. 161 162 [policy-change-steps]: https://access.redhat.com/solutions/6069071