-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Installer failed to create DNS records when using STS token #1010
Comments
This belongs to the ingress operator. The installer doesn't actually create these records. Would you mind moving the issue over there? |
opened issue on https://github.com/openshift/cluster-ingress-operator regarding the invalid reporting of the clusteroperator status. But I think expired creds is not a bug in ingress operator completely, it is partially as ingress operator assumes valid creds are being provided by installer. So I think we should keep this open here. |
@dgoodwin we need that baby creds-minter :P |
We're getting closer! https://github.com/openshift/cloud-credential-operator @joelddiaz is working on code the installer could consume to pre-flight check if the creds given can (a) mint other creds, or failing that (b) power everything in the cluster. |
@dgoodwin this is done, right? |
/close |
@sdodson: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Version
0.9.0
Platform (aws|libvirt|openstack):
AWS
What happened?
After performing an installation I am prompted to log into the OpenShift web console. After waiting 10 minutes, the corresponding DNS records for
console-openshift-console.apps....
had not been created.What you expected to happen?
Proper DNS records to be created for the relevant route resources.
How to reproduce it (as minimally and precisely as possible)?
NOTE: This installation was performed using an STS token. The installation was executed in a controlled environment requiring the use of audited privilege escalation by users.
Anything else we need to know?
Route resources were created correctly:
Ingress operator pod is running:
Ingress operator shows 403 failures (likely due to a combination of token expiration and not minting any relevant credentials needed for it's own operation):
ingress-operator.log
References
Loosely related to:
The text was updated successfully, but these errors were encountered: