Support
Getting support for OpenShift Container Platform
Abstract
Chapter 1. Support overview Copy linkLink copied to clipboard!
Red Hat offers cluster administrators tools for gathering data for your cluster, monitoring, and troubleshooting.
1.1. Get support Copy linkLink copied to clipboard!
Get support: Visit the Red Hat Customer Portal to review knowledge base articles, submit a support case, and review additional product documentation and resources.
1.2. Remote health monitoring issues Copy linkLink copied to clipboard!
Remote health monitoring issues: OpenShift Container Platform collects telemetry and configuration data about your cluster and reports it to Red Hat by using the Telemeter Client and the Insights Operator. Red Hat uses this data to understand and resolve issues in connected cluster. Similar to connected clusters, you can Use remote health monitoring in a restricted network. OpenShift Container Platform collects data and monitors health using the following:
Telemetry: The Telemetry Client gathers and uploads the metrics values to Red Hat every four minutes and thirty seconds. Red Hat uses this data to:
- Monitor the clusters.
- Roll out OpenShift Container Platform upgrades.
- Improve the upgrade experience.
Insight Operator: By default, OpenShift Container Platform installs and enables the Insight Operator, which reports configuration and component failure status every two hours. The Insight Operator helps to:
- Identify potential cluster issues proactively.
- Provide a solution and preventive action in Red Hat OpenShift Cluster Manager.
You can Review telemetry information.
If you have enabled remote health reporting, Use Insights to identify issues. You can optionally disable remote health reporting.
1.3. Gather data about your cluster Copy linkLink copied to clipboard!
Gather data about your cluster: Red Hat recommends gathering your debugging information when opening a support case. This helps Red Hat Support to perform a root cause analysis. A cluster administrator can use the following to gather data about your cluster:
-
The must-gather tool: Use the tool to collect information about your cluster and to debug the issues.
must-gather -
sosreport: Use the tool to collect configuration details, system information, and diagnostic data for debugging purposes.
sosreport - Cluster ID: Obtain the unique identifier for your cluster, when providing information to Red Hat Support.
-
Bootstrap node journal logs: Gather
bootkube.serviceunit logs and container logs from the bootstrap node to troubleshoot bootstrap-related issues.journald -
Cluster node journal logs: Gather unit logs and logs within
journaldon individual cluster nodes to troubleshoot node-related issues./var/log - A network trace: Provide a network packet trace from a specific OpenShift Container Platform cluster node or a container to Red Hat Support to help troubleshoot network-related issues.
-
Diagnostic data: Use the command to gather(?) diagnostic data about your cluster.
redhat-support-tool
1.4. Troubleshooting issues Copy linkLink copied to clipboard!
A cluster administrator can monitor and troubleshoot the following OpenShift Container Platform component issues:
Installation issues: OpenShift Container Platform installation proceeds through various stages. You can perform the following:
- Monitor the installation stages.
- Determine at which stage installation issues occur.
- Investigate multiple installation issues.
- Gather logs from a failed installation.
Node issues: A cluster administrator can verify and troubleshoot node-related issues by reviewing the status, resource usage, and configuration of a node. You can query the following:
- Kubelet’s status on a node.
- Cluster node journal logs.
Crio issues: A cluster administrator can verify CRI-O container runtime engine status on each cluster node. If you experience container runtime issues, perform the following:
- Gather CRI-O journald unit logs.
- Cleaning CRI-O storage.
Operating system issues: OpenShift Container Platform runs on Red Hat Enterprise Linux CoreOS. If you experience operating system issues, you can investigate kernel crash procedures. Ensure the following:
- Enable kdump.
- Test the kdump configuration.
- Analyze a core dump.
Network issues: To troubleshoot Open vSwitch issues, a cluster administrator can perform the following:
- Configure the Open vSwitch log level temporarily.
- Configure the Open vSwitch log level permanently.
- Display Open vSwitch logs.
Operator issues: A cluster administrator can do the following to resolve Operator issues:
- Verify Operator subscription status.
- Check Operator pod health.
- Gather Operator logs.
Pod issues: A cluster administrator can troubleshoot pod-related issues by reviewing the status of a pod and completing the following:
- Review pod and container logs.
- Start debug pods with root access.
Source-to-image issues: A cluster administrator can observe the S2I stages to determine where in the S2I process a failure occurred. Gather the following to resolve Source-to-Image (S2I) issues:
- Source-to-Image diagnostic data.
- Application diagnostic data to investigate application failure.
Storage issues: A multi-attach storage error occurs when the mounting volume on a new node is not possible because the failed node cannot unmount the attached volume. A cluster administrator can do the following to resolve multi-attach storage issues:
- Enable multiple attachments by using RWX volumes.
- Recover or delete the failed node when using an RWO volume.
Monitoring issues: A cluster administrator can follow the procedures on the troubleshooting page for monitoring. If the metrics for your user-defined projects are unavailable or if Prometheus is consuming a lot of disk space, check the following:
- Investigate why user-defined metrics are unavailable.
- Determine why Prometheus is consuming a lot of disk space.
Logging issues: A cluster administrator can follow the procedures on the troubleshooting page for OpenShift Logging issues. Check the following to resolve logging issues:
- OpenShift CLI (oc) issues: Investigate OpenShift CLI (oc) issues by increasing the log level.
Chapter 2. Managing your cluster resources Copy linkLink copied to clipboard!
You can apply global configuration options in OpenShift Container Platform. Operators apply these configuration settings across the cluster.
2.1. Interacting with your cluster resources Copy linkLink copied to clipboard!
You can interact with cluster resources by using the OpenShift CLI (
oc
oc api-resources
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have access to the web console or you have installed the CLI tool.
oc
Procedure
To see which configuration Operators have been applied, run the following command:
$ oc api-resources -o name | grep config.openshift.ioTo see what cluster resources you can configure, run the following command:
$ oc explain <resource_name>.config.openshift.ioTo see the configuration of custom resource definition (CRD) objects in the cluster, run the following command:
$ oc get <resource_name>.config -o yamlTo edit the cluster resource configuration, run the following command:
$ oc edit <resource_name>.config -o yaml
Chapter 3. Getting support Copy linkLink copied to clipboard!
3.1. Getting support Copy linkLink copied to clipboard!
If you experience difficulty with a procedure described in this documentation, or with OpenShift Container Platform in general, visit the Red Hat Customer Portal. From the Customer Portal, you can:
- Search or browse through the Red Hat Knowledgebase of articles and solutions relating to Red Hat products.
- Submit a support case to Red Hat Support.
- Access other product documentation.
To identify issues with your cluster, you can use Insights in OpenShift Cluster Manager. Insights provides details about issues and, if available, information on how to solve a problem.
If you have a suggestion for improving this documentation or have found an error, submit a Jira issue for the most relevant documentation component. Please provide specific details, such as the section name and OpenShift Container Platform version.
3.2. About the Red Hat Knowledgebase Copy linkLink copied to clipboard!
The Red Hat Knowledgebase provides rich content aimed at helping you make the most of Red Hat’s products and technologies. The Red Hat Knowledgebase consists of articles, product documentation, and videos outlining best practices on installing, configuring, and using Red Hat products. In addition, you can search for solutions to known issues, each providing concise root cause descriptions and remedial steps.
3.3. Searching the Red Hat Knowledgebase Copy linkLink copied to clipboard!
In the event of an OpenShift Container Platform issue, you can perform an initial search to determine if a solution already exists within the Red Hat Knowledgebase.
Prerequisites
- You have a Red Hat Customer Portal account.
Procedure
- Log in to the Red Hat Customer Portal.
In the main Red Hat Customer Portal search field, input keywords and strings relating to the problem, including:
- OpenShift Container Platform components (such as etcd)
- Related procedure (such as installation)
- Warnings, error messages, and other outputs related to explicit failures
- Click Search.
- Select the OpenShift Container Platform product filter.
- Select the Knowledgebase content type filter.
3.4. Submitting a support case Copy linkLink copied to clipboard!
Prerequisites
-
You have installed the OpenShift CLI ().
oc - You have a Red Hat Customer Portal account.
- You have access to OpenShift Cluster Manager.
Procedure
- Log in to the Red Hat Customer Portal and select SUPPORT CASES → Open a case.
- Select the appropriate category for your issue (such as Defect / Bug), product (OpenShift Container Platform), and product version (4.8, if this is not already autofilled).
- Review the list of suggested Red Hat Knowledgebase solutions for a potential match against the problem that is being reported. If the suggested articles do not address the issue, click Continue.
- Enter a concise but descriptive problem summary and further details about the symptoms being experienced, as well as your expectations.
- Review the updated list of suggested Red Hat Knowledgebase solutions for a potential match against the problem that is being reported. The list is refined as you provide more information during the case creation process. If the suggested articles do not address the issue, click Continue.
- Ensure that the account information presented is as expected, and if not, amend accordingly.
Check that the autofilled OpenShift Container Platform Cluster ID is correct. If it is not, manually obtain your cluster ID.
To manually obtain your cluster ID using the OpenShift Container Platform web console:
- Navigate to Home → Dashboards → Overview.
- Find the value in the Cluster ID field of the Details section.
Alternatively, it is possible to open a new support case through the OpenShift Container Platform web console and have your cluster ID autofilled.
- From the toolbar, navigate to (?) Help → Open Support Case.
- The Cluster ID value is autofilled.
To obtain your cluster ID using the OpenShift CLI (
), run the following command:oc$ oc get clusterversion -o jsonpath='{.items[].spec.clusterID}{"\n"}'
Complete the following questions where prompted and then click Continue:
- Where are you experiencing the behavior? What environment?
- When does the behavior occur? Frequency? Repeatedly? At certain times?
- What information can you provide around time-frames and the business impact?
-
Upload relevant diagnostic data files and click Continue. It is recommended to include data gathered using the command as a starting point, plus any issue specific data that is not collected by that command.
oc adm must-gather - Input relevant case management details and click Continue.
- Preview the case details and click Submit.
Chapter 4. Remote health monitoring with connected clusters Copy linkLink copied to clipboard!
4.1. About remote health monitoring Copy linkLink copied to clipboard!
OpenShift Container Platform collects telemetry and configuration data about your cluster and reports it to Red Hat by using the Telemeter Client and the Insights Operator. The data that is provided to Red Hat enables the benefits outlined in this document.
A cluster that reports data to Red Hat through Telemetry and the Insights Operator is considered a connected cluster.
Telemetry is the term that Red Hat uses to describe the information being sent to Red Hat by the OpenShift Container Platform Telemeter Client. Lightweight attributes are sent from connected clusters to Red Hat to enable subscription management automation, monitor the health of clusters, assist with support, and improve customer experience.
The Insights Operator gathers OpenShift Container Platform configuration data and sends it to Red Hat. The data is used to produce insights about potential issues that a cluster might be exposed to. These insights are communicated to cluster administrators on console.redhat.com/openshift.
More information is provided in this document about these two processes.
Telemetry and Insights Operator benefits
Telemetry and the Insights Operator enable the following benefits for end-users:
- Enhanced identification and resolution of issues. Events that might seem normal to an end-user can be observed by Red Hat from a broader perspective across a fleet of clusters. Some issues can be more rapidly identified from this point of view and resolved without an end-user needing to open a support case or file a Jira issue.
-
Advanced release management. OpenShift Container Platform offers the ,
candidate, andfastrelease channels, which enable you to choose an update strategy. The graduation of a release fromstabletofastis dependent on the success rate of updates and on the events seen during upgrades. With the information provided by connected clusters, Red Hat can improve the quality of releases tostablechannels and react more rapidly to issues found in thestablechannels.fast - Targeted prioritization of new features and functionality. The data collected provides insights about which areas of OpenShift Container Platform are used most. With this information, Red Hat can focus on developing the new features and functionality that have the greatest impact for our customers.
- A streamlined support experience. You can provide a cluster ID for a connected cluster when creating a support ticket on the Red Hat Customer Portal. This enables Red Hat to deliver a streamlined support experience that is specific to your cluster, by using the connected information. This document provides more information about that enhanced support experience.
- Predictive analytics. The insights displayed for your cluster on console.redhat.com/openshift are enabled by the information collected from connected clusters. Red Hat is investing in applying deep learning, machine learning, and artificial intelligence automation to help identify issues that OpenShift Container Platform clusters are exposed to.
4.1.1. About Telemetry Copy linkLink copied to clipboard!
Telemetry sends a carefully chosen subset of the cluster monitoring metrics to Red Hat. The Telemeter Client fetches the metrics values every four minutes and thirty seconds and uploads the data to Red Hat. These metrics are described in this document.
This stream of data is used by Red Hat to monitor the clusters in real-time and to react as necessary to problems that impact our customers. It also allows Red Hat to roll out OpenShift Container Platform upgrades to customers to minimize service impact and continuously improve the upgrade experience.
This debugging information is available to Red Hat Support and Engineering teams with the same restrictions as accessing data reported through support cases. All connected cluster information is used by Red Hat to help make OpenShift Container Platform better and more intuitive to use.
4.1.1.1. Information collected by Telemetry Copy linkLink copied to clipboard!
The following information is collected by Telemetry:
- The unique random identifier that is generated during an installation
- Version information, including the OpenShift Container Platform cluster version and installed update details that are used to determine update version availability
- Update information, including the number of updates available per cluster, the channel and image repository used for an update, update progress information, and the number of errors that occur in an update
- The name of the provider platform that OpenShift Container Platform is deployed on and the data center location
- Sizing information about clusters, machine types, and machines, including the number of CPU cores and the amount of RAM used for each
- The number of etcd members and the number of objects stored in the etcd cluster
- The OpenShift Container Platform framework components installed in a cluster and their condition and status
- Usage information about components, features, and extensions
- Usage details about Technology Previews and unsupported configurations
- Information about degraded software
-
Information about nodes that are marked as
NotReady - Events for all namespaces listed as "related objects" for a degraded Operator
- Configuration details that help Red Hat Support to provide beneficial support for customers, including node configuration at the cloud infrastructure level, hostnames, IP addresses, Kubernetes pod names, namespaces, and services
- Information about the validity of certificates
- Number of application builds by build strategy type
Telemetry does not collect identifying information such as user names or passwords. Red Hat does not intend to collect personal information. If Red Hat discovers that personal information has been inadvertently received, Red Hat will delete such information. To the extent that any telemetry data constitutes personal data, please refer to the Red Hat Privacy Statement for more information about Red Hat’s privacy practices.
4.1.2. About the Insights Operator Copy linkLink copied to clipboard!
The Insights Operator periodically gathers configuration and component failure status and, by default, reports that data every two hours to Red Hat. This information enables Red Hat to assess configuration and deeper failure data than is reported through Telemetry.
Users of OpenShift Container Platform can display the report of each cluster in the Insights Advisor service on Red Hat Hybrid Cloud Console. If any issues have been identified, Insights provides further details and, if available, steps on how to solve a problem.
The Insights Operator does not collect identifying information, such as user names, passwords, or certificates. See Red Hat Insights Data & Application Security for information about Red Hat Insights data collection and controls.
Red Hat uses all connected cluster information to:
- Identify potential cluster issues and provide a solution and preventive actions in the Insights Advisor service on Red Hat Hybrid Cloud Console
- Improve OpenShift Container Platform by providing aggregated and critical information to product and support teams
- Make OpenShift Container Platform more intuitive
4.1.2.1. Information collected by the Insights Operator Copy linkLink copied to clipboard!
The following information is collected by the Insights Operator:
- General information about your cluster and its components to identify issues that are specific to your OpenShift Container Platform version and environment
- Configuration files, such as the image registry configuration, of your cluster to determine incorrect settings and issues that are specific to parameters you set
- Errors that occur in the cluster components
- Progress information of running updates, and the status of any component upgrades
- Details of the platform that OpenShift Container Platform is deployed on, such as Amazon Web Services, and the region that the cluster is located in
- Cluster workload information transformed into discreet Secure Hash Algorithm (SHA) values, which allows Red Hat to assess workloads for security and version vulnerabilities without disclosing sensitive details
-
If an Operator reports an issue, information is collected about core OpenShift Container Platform pods in the and
openshift-*projects. This includes state, resource, security context, volume information, and more.kube-*
4.1.3. Understanding Telemetry and Insights Operator data flow Copy linkLink copied to clipboard!
The Telemeter Client collects selected time series data from the Prometheus API. The time series data is uploaded to api.openshift.com every four minutes and thirty seconds for processing.
The Insights Operator gathers selected data from the Kubernetes API and the Prometheus API into an archive. The archive is uploaded to console.redhat.com every two hours for processing. The Insights Operator also downloads the latest Insights analysis from console.redhat.com. This is used to populate the Insights status pop-up that is included in the Overview page in the OpenShift Container Platform web console.
All of the communication with Red Hat occurs over encrypted channels by using Transport Layer Security (TLS) and mutual certificate authentication. All of the data is encrypted in transit and at rest.
Access to the systems that handle customer data is controlled through multi-factor authentication and strict authorization controls. Access is granted on a need-to-know basis and is limited to required operations.
Telemetry and Insights Operator data flow
4.1.4. Additional details about how remote health monitoring data is used Copy linkLink copied to clipboard!
The information collected to enable remote health monitoring is detailed in Information collected by Telemetry and Information collected by the Insights Operator.
As further described in the preceding sections of this document, Red Hat collects data about your use of the Red Hat Product(s) for purposes such as providing support and upgrades, optimizing performance or configuration, minimizing service impacts, identifying and remediating threats, troubleshooting, improving the offerings and user experience, responding to issues, and for billing purposes if applicable.
Collection safeguards
Red Hat employs technical and organizational measures designed to protect the telemetry and configuration data.
Sharing
Red Hat may share the data collected through Telemetry and the Insights Operator internally within Red Hat to improve your user experience. Red Hat may share telemetry and configuration data with its business partners in an aggregated form that does not identify customers to help the partners better understand their markets and their customers’ use of Red Hat offerings or to ensure the successful integration of products jointly supported by those partners.
Third parties
Red Hat may engage certain third parties to assist in the collection, analysis, and storage of the Telemetry and configuration data.
User control / enabling and disabling telemetry and configuration data collection
You may disable OpenShift Container Platform Telemetry and the Insights Operator by following the instructions in Opting out of remote health reporting.
4.2. Showing data collected by remote health monitoring Copy linkLink copied to clipboard!
As an administrator, you can review the metrics collected by Telemetry and the Insights Operator.
4.2.1. Showing data collected by Telemetry Copy linkLink copied to clipboard!
You can see the cluster and components time series data captured by Telemetry.
Prerequisites
-
Install the OpenShift CLI ().
oc -
You must log in to the cluster with a user that has either the role or the
cluster-adminrole.cluster-monitoring-view
Procedure
Find the URL for the Prometheus service that runs in the OpenShift Container Platform cluster:
$ oc get route prometheus-k8s -n openshift-monitoring -o jsonpath="{.spec.host}"- Navigate to the URL.
Enter this query in the Expression input box and press Execute:
{__name__=~"cluster:usage:.*|count:up0|count:up1|cluster_version|cluster_version_available_updates|cluster_operator_up|cluster_operator_conditions|cluster_version_payload|cluster_installer|cluster_infrastructure_provider|cluster_feature_set|instance:etcd_object_counts:sum|ALERTS|code:apiserver_request_total:rate:sum|cluster:capacity_cpu_cores:sum|cluster:capacity_memory_bytes:sum|cluster:cpu_usage_cores:sum|cluster:memory_usage_bytes:sum|openshift:cpu_usage_cores:sum|openshift:memory_usage_bytes:sum|workload:cpu_usage_cores:sum|workload:memory_usage_bytes:sum|cluster:virt_platform_nodes:sum|cluster:node_instance_type_count:sum|cnv:vmi_status_running:count|node_role_os_version_machine:cpu_capacity_cores:sum|node_role_os_version_machine:cpu_capacity_sockets:sum|subscription_sync_total|csv_succeeded|csv_abnormal|ceph_cluster_total_bytes|ceph_cluster_total_used_raw_bytes|ceph_health_status|job:ceph_osd_metadata:count|job:kube_pv:count|job:ceph_pools_iops:total|job:ceph_pools_iops_bytes:total|job:ceph_versions_running:count|job:noobaa_total_unhealthy_buckets:sum|job:noobaa_bucket_count:sum|job:noobaa_total_object_count:sum|noobaa_accounts_num|noobaa_total_usage|console_url|cluster:network_attachment_definition_instances:max|cluster:network_attachment_definition_enabled_instance_up:max|insightsclient_request_send_total|cam_app_workload_migrations|cluster:apiserver_current_inflight_requests:sum:max_over_time:2m|cluster:telemetry_selected_series:count",alertstate=~"firing|"}This query replicates the request that Telemetry makes against a running OpenShift Container Platform cluster’s Prometheus service and returns the full set of time series captured by Telemetry.
4.2.2. Showing data collected by the Insights Operator Copy linkLink copied to clipboard!
You can review the data that is collected by the Insights Operator.
Prerequisites
-
Access to the cluster as a user with the role.
cluster-admin
Procedure
Find the name of the currently running pod for the Insights Operator:
$ INSIGHTS_OPERATOR_POD=$(oc get pods --namespace=openshift-insights -o custom-columns=:metadata.name --no-headers --field-selector=status.phase=Running)Copy the recent data archives collected by the Insights Operator:
$ oc cp openshift-insights/$INSIGHTS_OPERATOR_POD:/var/lib/insights-operator ./insights-data
The recent Insights Operator archives are now available in the
insights-data
4.3. Opting out of remote health reporting Copy linkLink copied to clipboard!
You may choose to opt out of reporting health and usage data for your cluster.
To opt out of remote health reporting, you must:
- Modify the global cluster pull secret to disable remote health reporting.
- Update the cluster to use this modified pull secret.
4.3.1. Consequences of disabling remote health reporting Copy linkLink copied to clipboard!
In OpenShift Container Platform, customers can opt out of reporting usage information. However, connected clusters allow Red Hat to react more quickly to problems and better support our customers, as well as better understand how product upgrades impact clusters. Connected clusters also help to simplify the subscription and entitlement process and enable the Red Hat OpenShift Cluster Manager service to provide an overview of your clusters and their subscription status.
Red Hat strongly recommends leaving health and usage reporting enabled for pre-production and test clusters even if it is necessary to opt out for production clusters. This allows Red Hat to be a participant in qualifying OpenShift Container Platform in your environments and react more rapidly to product issues.
Some of the consequences of opting out of having a connected cluster are:
- Red Hat will not be able to monitor the success of product upgrades or the health of your clusters without a support case being opened.
- Red Hat will not be able to use configuration data to better triage customer support cases and identify which configurations our customers find important.
- The Red Hat OpenShift Cluster Manager will not show data about your clusters including health and usage information.
- Your subscription entitlement information must be manually entered via console.redhat.com without the benefit of automatic usage reporting.
In restricted networks, Telemetry and Insights data can still be reported through appropriate configuration of your proxy.
4.3.2. Modifying the global cluster pull secret to disable remote health reporting Copy linkLink copied to clipboard!
You can modify your existing global cluster pull secret to disable remote health reporting. This disables both Telemetry and the Insights Operator.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin
Procedure
Download the global cluster pull secret to your local file system.
$ oc extract secret/pull-secret -n openshift-config --to=.-
In a text editor, edit the file that was downloaded.
.dockerconfigjson Remove the
JSON entry, for example:cloud.openshift.com"cloud.openshift.com":{"auth":"<hash>","email":"<email_address>"}- Save the file.
You can now update your cluster to use this modified pull secret.
4.3.3. Updating the global cluster pull secret Copy linkLink copied to clipboard!
You can update the global pull secret for your cluster by either replacing the current pull secret or appending a new pull secret.
The procedure is required when users use a separate registry to store images than the registry used during installation.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin
Procedure
Optional: To append a new pull secret to the existing pull secret, complete the following steps:
Enter the following command to download the pull secret:
$ oc get secret/pull-secret -n openshift-config --template='{{index .data ".dockerconfigjson" | base64decode}}' ><pull_secret_location>1 - 1
- Provide the path to the pull secret file.
Enter the following command to add the new pull secret:
$ oc registry login --registry="<registry>" \1 --auth-basic="<username>:<password>" \2 --to=<pull_secret_location>3 Alternatively, you can perform a manual update to the pull secret file.
Enter the following command to update the global pull secret for your cluster:
$ oc set data secret/pull-secret -n openshift-config --from-file=.dockerconfigjson=<pull_secret_location>1 - 1
- Provide the path to the new pull secret file.
This update is rolled out to all nodes, which can take some time depending on the size of your cluster.
NoteAs of OpenShift Container Platform 4.7.4, changes to the global pull secret no longer trigger a node drain or reboot.
4.4. Using Insights to identify issues with your cluster Copy linkLink copied to clipboard!
Insights repeatedly analyzes the data Insights Operator sends. Users of OpenShift Container Platform can display the report in the Insights Advisor service on Red Hat Hybrid Cloud Console.
4.4.1. About Red Hat Insights Advisor for OpenShift Container Platform Copy linkLink copied to clipboard!
You can use Insights Advisor to assess and monitor the health of your OpenShift Container Platform clusters. Whether you are concerned about individual clusters, or with your whole infrastructure, it is important to be aware of your exposure to issues that can affect service availability, fault tolerance, performance, or security.
Insights repeatedly analyzes the data that Insights Operator sends using a database of recommendations, which are sets of conditions that can leave your OpenShift Container Platform clusters at risk. Your data is then uploaded to the Insights Advisor service on Red Hat Hybrid Cloud Console where you can perform the following actions:
- See clusters impacted by a specific recommendation.
- Use robust filtering capabilities to refine your results to those recommendations.
- Learn more about individual recommendations, details about the risks they present, and get resolutions tailored to your individual clusters.
- Share results with other stakeholders.
4.4.2. Understanding Insights Advisor recommendations Copy linkLink copied to clipboard!
Insights Advisor bundles information about various cluster states and component configurations that can negatively affect the service availability, fault tolerance, performance, or security of your clusters. This information set is called a recommendation in Insights Advisor and includes the following information:
- Name: A concise description of the recommendation
- Added: When the recommendation was published to the Insights Advisor archive
- Category: Whether the issue has the potential to negatively affect service availability, fault tolerance, performance, or security
- Total risk: A value derived from the likelihood that the condition will negatively affect your infrastructure, and the impact on operations if that were to happen
- Clusters: A list of clusters on which a recommendation is detected
- Description: A brief synopsis of the issue, including how it affects your clusters
- Link to associated topics: More information from Red Hat about the issue
4.4.3. Displaying potential issues with your cluster Copy linkLink copied to clipboard!
This section describes how to display the Insights report in Insights Advisor on Red Hat Hybrid Cloud Console.
Note that Insights repeatedly analyzes your cluster and shows the latest results. These results can change, for example, if you fix an issue or a new issue has been detected.
Prerequisites
- Your cluster is registered on Red Hat Hybrid Cloud Console.
- Remote health reporting is enabled, which is the default.
- You are logged in to Red Hat Hybrid Cloud Console.
Procedure
Navigate to Advisor → Recommendations on Red Hat Hybrid Cloud Console.
Depending on the result, Insights Advisor displays one of the following:
- No matching recommendations found, if Insights did not identify any issues.
- A list of issues Insights has detected, grouped by risk (low, moderate, important, and critical).
- No clusters yet, if Insights has not yet analyzed the cluster. The analysis starts shortly after the cluster has been installed, registered, and connected to the internet.
If any issues are displayed, click the > icon in front of the entry for more details.
Depending on the issue, the details can also contain a link to more information from Red Hat about the issue.
4.4.4. Displaying all Insights Advisor recommendations Copy linkLink copied to clipboard!
The Recommendations view, by default, only displays the recommendations that are detected on your clusters. However, you can view all of the recommendations in the advisor archive.
Prerequisites
- Remote health reporting is enabled, which is the default.
- Your cluster is registered on Red Hat Hybrid Cloud Console.
- You are logged in to Red Hat Hybrid Cloud Console.
Procedure
- Navigate to Advisor → Recommendations on Red Hat Hybrid Cloud Console.
Click the X icons next to the Clusters Impacted and Status filters.
You can now browse through all of the potential recommendations for your cluster.
4.4.5. Disabling Insights Advisor recommendations Copy linkLink copied to clipboard!
You can disable specific recommendations that affect your clusters, so that they no longer appear in your reports. It is possible to disable a recommendation for a single cluster or all of your clusters.
Disabling a recommendation for all of your clusters also applies to any future clusters.
Prerequisites
- Remote health reporting is enabled, which is the default.
- Your cluster is registered on Red Hat Hybrid Cloud Console.
- You are logged in to Red Hat Hybrid Cloud Console.
Procedure
- Navigate to Advisor → Recommendations on Red Hat Hybrid Cloud Console.
- Click the name of the recommendation to disable. You are directed to the single recommendation page.
To disable the recommendation for a single cluster:
-
Click the Options menu
for that cluster, and then click Disable recommendation for cluster.
- Enter a justification note and click Save.
-
Click the Options menu
To disable the recommendation for all of your clusters:
- Click Actions → Disable recommendation.
- Enter a justification note and click Save.
4.4.6. Enabling a previously disabled Insights Advisor recommendation Copy linkLink copied to clipboard!
When a recommendation is disabled for all clusters, you will no longer see the recommendation in Insights Advisor. You can change this behavior.
Prerequisites
- Remote health reporting is enabled, which is the default.
- Your cluster is registered on Red Hat Hybrid Cloud Console.
- You are logged in to Red Hat Hybrid Cloud Console.
Procedure
- Navigate to Advisor → Recommendations on Red Hat Hybrid Cloud Console.
- Filter the recommendations by Status → Disabled.
- Locate the recommendation to enable.
-
Click the Options menu
, and then click Enable recommendation.
4.4.7. Displaying the Insights status in the web console Copy linkLink copied to clipboard!
Insights repeatedly analyzes your cluster and you can display the status of identified potential issues of your cluster in the OpenShift Container Platform web console. This status shows the number of issues in the different categories and, for further details, links to the reports in OpenShift Cluster Manager.
Prerequisites
- Your cluster is registered in OpenShift Cluster Manager.
- Remote health reporting is enabled, which is the default.
- You are logged in to the OpenShift Container Platform web console.
Procedure
- Navigate to Home → Overview in the OpenShift Container Platform web console.
Click Insights on the Status card.
The pop-up window lists potential issues grouped by risk. Click the individual categories or View all recommendations in Insights Advisor to display more details.
4.5. Using Insights Operator Copy linkLink copied to clipboard!
The Insights Operator periodically gathers configuration and component failure status and, by default, reports that data every two hours to Red Hat. This information enables Red Hat to assess configuration and deeper failure data than is reported through Telemetry. Users of OpenShift Container Platform can display the report in the Insights Advisor service on Red Hat Hybrid Cloud Console.
4.5.1. Downloading your Insights Operator archive Copy linkLink copied to clipboard!
Insights Operator stores gathered data in an archive located in the
openshift-insights
Prerequisites
-
Access to the cluster as a user with the role.
cluster-admin
Procedure
Find the name of the running pod for the Insights Operator:
$ oc get pods --namespace=openshift-insights -o custom-columns=:metadata.name --no-headers --field-selector=status.phase=RunningCopy the recent data archives collected by the Insights Operator:
$ oc cp openshift-insights/<insights_operator_pod_name>:/var/lib/insights-operator ./insights-data1 - 1
- Replace
<insights_operator_pod_name>with the pod name output from the preceding command.
The recent Insights Operator archives are now available in the
insights-data
4.5.2. Viewing Insights Operator gather durations Copy linkLink copied to clipboard!
You can view the time it takes for the Insights Operator to gather the information contained in the archive. This helps you to understand Insights Operator resource usage and issues with Insights Advisor.
Prerequisites
- A recent copy of your Insights Operator archive.
Procedure
From your archive, open
./insights-operator/gathers.jsonThe file contains a list of Insights Operator gather operations:
{ "name": "clusterconfig/authentication", "duration_in_ms": 730,1 "records_count": 1, "errors": null, "panic": null }- 1
duration_in_msis the amount of time in milliseconds for each gather operation.
- Inspect each gather operation for abnormalities.
4.6. Using remote health reporting in a restricted network Copy linkLink copied to clipboard!
You can manually gather and upload Insights Operator archives to diagnose issues from a restricted network.
To use the Insights Operator in a restricted network, you must:
- Create a copy of your Insights Operator archive.
- Upload the Insights Operator archive to console.redhat.com.
Additionally, you can choose to obfuscate the Insights Operator data before upload.
4.6.1. Running an Insights Operator gather operation Copy linkLink copied to clipboard!
You must run a gather operation to create an Insights Operator archive.
Prerequisites
-
You are logged in to OpenShift Container Platform as .
cluster-admin
Procedure
Create a file named
using this template:gather-job.yamlapiVersion: batch/v1 kind: Job metadata: name: insights-operator-job annotations: config.openshift.io/inject-proxy: insights-operator spec: backoffLimit: 6 ttlSecondsAfterFinished: 600 template: spec: restartPolicy: OnFailure serviceAccountName: operator nodeSelector: beta.kubernetes.io/os: linux node-role.kubernetes.io/master: "" tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 900 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 900 volumes: - name: snapshots emptyDir: {} - name: service-ca-bundle configMap: name: service-ca-bundle optional: true initContainers: - name: insights-operator image: quay.io/openshift/origin-insights-operator:latest terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - name: snapshots mountPath: /var/lib/insights-operator - name: service-ca-bundle mountPath: /var/run/configmaps/service-ca-bundle readOnly: true ports: - containerPort: 8443 name: https resources: requests: cpu: 10m memory: 70Mi args: - gather - -v=4 - --config=/etc/insights-operator/server.yaml containers: - name: sleepy image: quay.io/openshift/origin-base:latest args: - /bin/sh - -c - sleep 10m volumeMounts: [{name: snapshots, mountPath: /var/lib/insights-operator}]Copy your
image version:insights-operator$ oc get -n openshift-insights deployment insights-operator -o yamlPaste your image version in
:gather-job.yamlinitContainers: - name: insights-operator image: <your_insights_operator_image_version> terminationMessagePolicy: FallbackToLogsOnError volumeMounts:Create the gather job:
$ oc apply -n openshift-insights -f gather-job.yamlFind the name of the job pod:
$ oc describe -n openshift-insights job/insights-operator-jobExample output
Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal SuccessfulCreate 7m18s job-controller Created pod: insights-operator-job-<your_job>where
is the name of the pod.insights-operator-job-<your_job>Verify that the operation has finished:
$ oc logs -n openshift-insights insights-operator-job-<your_job> insights-operatorExample output
I0407 11:55:38.192084 1 diskrecorder.go:34] Wrote 108 records to disk in 33msSave the created archive:
$ oc cp openshift-insights/insights-operator-job-<your_job>:/var/lib/insights-operator ./insights-dataClean up the job:
$ oc delete -n openshift-insights job insights-operator-job
4.6.2. Uploading an Insights Operator archive Copy linkLink copied to clipboard!
You can manually upload an Insights Operator archive to console.redhat.com to diagnose potential issues.
Prerequisites
-
You are logged in to OpenShift Container Platform as .
cluster-admin - You have a workstation with unrestricted internet access.
- You have created a copy of the Insights Operator archive.
Procedure
Download the
file:dockerconfig.json$ oc extract secret/pull-secret -n openshift-config --to=.Copy your
"cloud.openshift.com"token from the"auth"file:dockerconfig.json{ "auths": { "cloud.openshift.com": { "auth": "<your_token>", "email": "asd@redhat.com" } }Upload the archive to console.redhat.com:
$ curl -v -H "User-Agent: insights-operator/one10time200gather184a34f6a168926d93c330 cluster/<cluster_id>" -H "Authorization: Bearer <your_token>" -F "upload=@<path_to_archive>; type=application/vnd.redhat.openshift.periodic+tar" https://console.redhat.com/api/ingress/v1/uploadwhere
is your cluster ID,<cluster_id>is the token from your pull secret, and<your_token>is the path to the Insights Operator archive.<path_to_archive>If the operation is successful, the command returns a
and"request_id":"account_number"Example output
* Connection #0 to host console.redhat.com left intact {"request_id":"393a7cf1093e434ea8dd4ab3eb28884c","upload":{"account_number":"6274079"}}%
Verification steps
- Log in to https://console.redhat.com/openshift.
- Click the Clusters menu in the left pane.
- To display the details of the cluster, click the cluster name.
Open the Insights Advisor tab of the cluster.
If the upload was successful, the tab displays one of the following:
- Your cluster passed all recommendations, if Insights Advisor did not identify any issues.
- A list of issues that Insights Advisor has detected, prioritized by risk (low, moderate, important, and critical).
4.6.3. Enabling Insights Operator data obfuscation Copy linkLink copied to clipboard!
You can enable obfuscation to mask sensitive and identifiable IPv4 addresses and cluster base domains that the Insights Operator sends to console.redhat.com.
Although this feature is available, Red Hat recommends keeping obfuscation disabled for a more effective support experience.
Obfuscation assigns non-identifying values to cluster IPv4 addresses, and uses a translation table that is retained in memory to change IP addresses to their obfuscated versions throughout the Insights Operator archive before uploading the data to console.redhat.com.
For cluster base domains, obfuscation changes the base domain to a hardcoded substring. For example,
cluster-api.openshift.example.com
cluster-api.<CLUSTER_BASE_DOMAIN>
The following procedure enables obfuscation using the
support
openshift-config
Prerequisites
-
You are logged in to the OpenShift Container Platform web console as .
cluster-admin
Procedure
- Navigate to Workloads → Secrets.
- Select the openshift-config project.
- Search for the support secret using the Search by name field. If it does not exist, click Create → Key/value secret to create it.
-
Click the Options menu
, and then click Edit Secret.
- Click Add Key/Value.
-
Create a key named with a value of
enableGlobalObfuscation, and click Save.true - Navigate to Workloads → Pods
-
Select the project.
openshift-insights -
Find the pod.
insights-operator -
To restart the pod, click the Options menu
insights-operator
, and then click Delete Pod.
Verification
- Navigate to Workloads → Secrets.
- Select the openshift-insights project.
- Search for the obfuscation-translation-table secret using the Search by name field.
If the
obfuscation-translation-table
Alternatively, you can inspect
/insights-operator/gathers.json
"is_global_obfuscation_enabled": true
Chapter 5. Gathering data about your cluster Copy linkLink copied to clipboard!
When opening a support case, it is helpful to provide debugging information about your cluster to Red Hat Support.
It is recommended to provide:
5.1. About the must-gather tool Copy linkLink copied to clipboard!
The
oc adm must-gather
- Resource definitions
- Service logs
By default, the
oc adm must-gather
./must-gather.local
Alternatively, you can collect specific information by running the command with the appropriate arguments as described in the following sections:
To collect data related to one or more specific features, use the
argument with an image, as listed in a following section.--imageFor example:
$ oc adm must-gather --image=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8:v4.9.0To collect the audit logs, use the
argument, as described in a following section.-- /usr/bin/gather_audit_logsFor example:
$ oc adm must-gather -- /usr/bin/gather_audit_logsNoteAudit logs are not collected as part of the default set of information to reduce the size of the files.
When you run
oc adm must-gather
must-gather.local
For example:
NAMESPACE NAME READY STATUS RESTARTS AGE
...
openshift-must-gather-5drcj must-gather-bklx4 2/2 Running 0 72s
openshift-must-gather-5drcj must-gather-s8sdh 2/2 Running 0 72s
...
5.1.1. Gathering data about your cluster for Red Hat Support Copy linkLink copied to clipboard!
You can gather debugging information about your cluster by using the
oc adm must-gather
Prerequisites
-
Access to the cluster as a user with the role.
cluster-admin -
The OpenShift Container Platform CLI () installed.
oc
Procedure
Navigate to the directory where you want to store the
data.must-gatherNoteIf your cluster is using a restricted network, you must take additional steps. If your mirror registry has a trusted CA, you must first add the trusted CA to the cluster. For all clusters on restricted networks, you must import the default
image as an image stream.must-gather$ oc import-image is/must-gather -n openshiftRun the
command:oc adm must-gather$ oc adm must-gatherNoteBecause this command picks a random control plane node by default, the pod might be scheduled to a control plane node that is in the
andNotReadystate.SchedulingDisabledIf this command fails, for example, if you cannot schedule a pod on your cluster, then use the
command to gather information for particular resources.oc adm inspectNoteContact Red Hat Support for the recommended resources to gather.
Create a compressed file from the
directory that was just created in your working directory. For example, on a computer that uses a Linux operating system, run the following command:must-gather$ tar cvaf must-gather.tar.gz must-gather.local.5421342344627712289/1 - 1
- Make sure to replace
must-gather-local.5421342344627712289/with the actual directory name.
- Attach the compressed file to your support case on the Red Hat Customer Portal.
5.1.2. Gathering data about specific features Copy linkLink copied to clipboard!
You can gather debugging information about specific features by using the
oc adm must-gather
--image
--image-stream
must-gather
| Image | Purpose |
|---|---|
|
| Data collection for OpenShift Virtualization. |
|
| Data collection for OpenShift Serverless. |
|
| Data collection for Red Hat OpenShift Service Mesh. |
|
| Data collection for the Migration Toolkit for Containers. |
|
| Data collection for Red Hat OpenShift Container Storage. |
|
| Data collection for OpenShift Logging. |
|
| Data collection for Local Storage Operator. |
To collect the default
must-gather
--image-stream=openshift/must-gather
Prerequisites
-
Access to the cluster as a user with the role.
cluster-admin -
The OpenShift Container Platform CLI () installed.
oc
Procedure
-
Navigate to the directory where you want to store the data.
must-gather Run the
command with one or moreoc adm must-gatheror--imagearguments. For example, the following command gathers both the default cluster data and information specific to OpenShift Virtualization:--image-stream$ oc adm must-gather \ --image-stream=openshift/must-gather \1 --image=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8:v4.8.72 You can use the
tool with additional arguments to gather data that is specifically related to OpenShift Logging and the Red Hat OpenShift Logging Operator in your cluster. For OpenShift Logging, run the following command:must-gather$ oc adm must-gather --image=$(oc -n openshift-logging get deployment.apps/cluster-logging-operator \ -o jsonpath='{.spec.template.spec.containers[?(@.name == "cluster-logging-operator")].image}')Example 5.1. Example
must-gatheroutput for OpenShift Logging├── cluster-logging │ ├── clo │ │ ├── cluster-logging-operator-74dd5994f-6ttgt │ │ ├── clusterlogforwarder_cr │ │ ├── cr │ │ ├── csv │ │ ├── deployment │ │ └── logforwarding_cr │ ├── collector │ │ ├── fluentd-2tr64 │ ├── eo │ │ ├── csv │ │ ├── deployment │ │ └── elasticsearch-operator-7dc7d97b9d-jb4r4 │ ├── es │ │ ├── cluster-elasticsearch │ │ │ ├── aliases │ │ │ ├── health │ │ │ ├── indices │ │ │ ├── latest_documents.json │ │ │ ├── nodes │ │ │ ├── nodes_stats.json │ │ │ └── thread_pool │ │ ├── cr │ │ ├── elasticsearch-cdm-lp8l38m0-1-794d6dd989-4jxms │ │ └── logs │ │ ├── elasticsearch-cdm-lp8l38m0-1-794d6dd989-4jxms │ ├── install │ │ ├── co_logs │ │ ├── install_plan │ │ ├── olmo_logs │ │ └── subscription │ └── kibana │ ├── cr │ ├── kibana-9d69668d4-2rkvz ├── cluster-scoped-resources │ └── core │ ├── nodes │ │ ├── ip-10-0-146-180.eu-west-1.compute.internal.yaml │ └── persistentvolumes │ ├── pvc-0a8d65d9-54aa-4c44-9ecc-33d9381e41c1.yaml ├── event-filter.html ├── gather-debug.log └── namespaces ├── openshift-logging │ ├── apps │ │ ├── daemonsets.yaml │ │ ├── deployments.yaml │ │ ├── replicasets.yaml │ │ └── statefulsets.yaml │ ├── batch │ │ ├── cronjobs.yaml │ │ └── jobs.yaml │ ├── core │ │ ├── configmaps.yaml │ │ ├── endpoints.yaml │ │ ├── events │ │ │ ├── elasticsearch-im-app-1596020400-gm6nl.1626341a296c16a1.yaml │ │ │ ├── elasticsearch-im-audit-1596020400-9l9n4.1626341a2af81bbd.yaml │ │ │ ├── elasticsearch-im-infra-1596020400-v98tk.1626341a2d821069.yaml │ │ │ ├── elasticsearch-im-app-1596020400-cc5vc.1626341a3019b238.yaml │ │ │ ├── elasticsearch-im-audit-1596020400-s8d5s.1626341a31f7b315.yaml │ │ │ ├── elasticsearch-im-infra-1596020400-7mgv8.1626341a35ea59ed.yaml │ │ ├── events.yaml │ │ ├── persistentvolumeclaims.yaml │ │ ├── pods.yaml │ │ ├── replicationcontrollers.yaml │ │ ├── secrets.yaml │ │ └── services.yaml │ ├── openshift-logging.yaml │ ├── pods │ │ ├── cluster-logging-operator-74dd5994f-6ttgt │ │ │ ├── cluster-logging-operator │ │ │ │ └── cluster-logging-operator │ │ │ │ └── logs │ │ │ │ ├── current.log │ │ │ │ ├── previous.insecure.log │ │ │ │ └── previous.log │ │ │ └── cluster-logging-operator-74dd5994f-6ttgt.yaml │ │ ├── cluster-logging-operator-registry-6df49d7d4-mxxff │ │ │ ├── cluster-logging-operator-registry │ │ │ │ └── cluster-logging-operator-registry │ │ │ │ └── logs │ │ │ │ ├── current.log │ │ │ │ ├── previous.insecure.log │ │ │ │ └── previous.log │ │ │ ├── cluster-logging-operator-registry-6df49d7d4-mxxff.yaml │ │ │ └── mutate-csv-and-generate-sqlite-db │ │ │ └── mutate-csv-and-generate-sqlite-db │ │ │ └── logs │ │ │ ├── current.log │ │ │ ├── previous.insecure.log │ │ │ └── previous.log │ │ ├── elasticsearch-cdm-lp8l38m0-1-794d6dd989-4jxms │ │ ├── elasticsearch-im-app-1596030300-bpgcx │ │ │ ├── elasticsearch-im-app-1596030300-bpgcx.yaml │ │ │ └── indexmanagement │ │ │ └── indexmanagement │ │ │ └── logs │ │ │ ├── current.log │ │ │ ├── previous.insecure.log │ │ │ └── previous.log │ │ ├── fluentd-2tr64 │ │ │ ├── fluentd │ │ │ │ └── fluentd │ │ │ │ └── logs │ │ │ │ ├── current.log │ │ │ │ ├── previous.insecure.log │ │ │ │ └── previous.log │ │ │ ├── fluentd-2tr64.yaml │ │ │ └── fluentd-init │ │ │ └── fluentd-init │ │ │ └── logs │ │ │ ├── current.log │ │ │ ├── previous.insecure.log │ │ │ └── previous.log │ │ ├── kibana-9d69668d4-2rkvz │ │ │ ├── kibana │ │ │ │ └── kibana │ │ │ │ └── logs │ │ │ │ ├── current.log │ │ │ │ ├── previous.insecure.log │ │ │ │ └── previous.log │ │ │ ├── kibana-9d69668d4-2rkvz.yaml │ │ │ └── kibana-proxy │ │ │ └── kibana-proxy │ │ │ └── logs │ │ │ ├── current.log │ │ │ ├── previous.insecure.log │ │ │ └── previous.log │ └── route.openshift.io │ └── routes.yaml └── openshift-operators-redhat ├── ...Run the
command with one or moreoc adm must-gatheror--imagearguments. For example, the following command gathers both the default cluster data and information specific to KubeVirt:--image-stream$ oc adm must-gather \ --image-stream=openshift/must-gather \1 --image=quay.io/kubevirt/must-gather2 Create a compressed file from the
directory that was just created in your working directory. For example, on a computer that uses a Linux operating system, run the following command:must-gather$ tar cvaf must-gather.tar.gz must-gather.local.5421342344627712289/1 - 1
- Make sure to replace
must-gather-local.5421342344627712289/with the actual directory name.
- Attach the compressed file to your support case on the Red Hat Customer Portal.
5.1.3. Gathering audit logs Copy linkLink copied to clipboard!
You can gather audit logs, which are a security-relevant chronological set of records documenting the sequence of activities that have affected the system by individual users, administrators, or other components of the system. You can gather audit logs for:
- etcd server
- Kubernetes API server
- OpenShift OAuth API server
- OpenShift API server
Procedure
Run the
command with theoc adm must-gatherflag:-- /usr/bin/gather_audit_logs$ oc adm must-gather -- /usr/bin/gather_audit_logsCreate a compressed file from the
directory that was just created in your working directory. For example, on a computer that uses a Linux operating system, run the following command:must-gather$ tar cvaf must-gather.tar.gz must-gather.local.4722904036990062481 - 1
- Replace
must-gather-local.472290403699006248with the actual directory name.
- Attach the compressed file to your support case on the Red Hat Customer Portal.
5.2. Obtaining your cluster ID Copy linkLink copied to clipboard!
When providing information to Red Hat Support, it is helpful to provide the unique identifier for your cluster. You can have your cluster ID autofilled by using the OpenShift Container Platform web console. You can also manually obtain your cluster ID by using the web console or the OpenShift CLI (
oc
Prerequisites
-
Access to the cluster as a user with the role.
cluster-admin -
Access to the web console or the OpenShift CLI () installed.
oc
Procedure
To open a support case and have your cluster ID autofilled using the web console:
- From the toolbar, navigate to (?) Help → Open Support Case.
- The Cluster ID value is autofilled.
To manually obtain your cluster ID using the web console:
- Navigate to Home → Dashboards → Overview.
- The value is available in the Cluster ID field of the Details section.
To obtain your cluster ID using the OpenShift CLI (
), run the following command:oc$ oc get clusterversion -o jsonpath='{.items[].spec.clusterID}{"\n"}'
5.3. About sosreport Copy linkLink copied to clipboard!
sosreport
sosreport
In some support interactions, Red Hat Support may ask you to collect a
sosreport
oc adm must-gather
5.4. Generating a sosreport archive for an OpenShift Container Platform cluster node Copy linkLink copied to clipboard!
The recommended way to generate a
sosreport
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have SSH access to your hosts.
-
You have installed the OpenShift CLI ().
oc - You have a Red Hat standard or premium Subscription.
- You have a Red Hat Customer Portal account.
- You have an existing Red Hat Support case ID.
Procedure
Obtain a list of cluster nodes:
$ oc get nodesEnter into a debug session on the target node. This step instantiates a debug pod called
:<node_name>-debug$ oc debug node/my-cluster-nodeTo enter into a debug session on the target node that is tainted with the
effect, add a toleration to a dummy namespace, and start the debug pod in the dummy namespace:NoExecute$ oc new-project dummy$ oc patch namespace dummy --type=merge -p '{"metadata": {"annotations": { "scheduler.alpha.kubernetes.io/defaultTolerations": "[{\"operator\": \"Exists\"}]"}}}'$ oc debug node/my-cluster-nodeSet
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,
operations will be impacted. In such situations, it is possible to access nodes usingocinstead.ssh core@<node>.<cluster_name>.<base_domain>Start a
container, which includes the required binaries and plugins to runtoolbox:sosreport# toolboxNoteIf an existing
pod is already running, thetoolboxcommand outputstoolbox. Remove the running toolbox container with'toolbox-' already exists. Trying to start…and spawn a new toolbox container, to avoid issues withpodman rm toolbox-plugins.sosreportCollect a
archive.sosreportRun the
command and enable thesosreportandcrio.allCRI-O container enginecrio.logsplugins:sosreport# sosreport -k crio.all=on -k crio.logs=on1 - 1
-kenables you to definesosreportplugin parameters outside of the defaults.
- Press Enter when prompted, to continue.
-
Provide the Red Hat Support case ID. adds the ID to the archive’s file name.
sosreport The
output provides the archive’s location and checksum. The following sample output references support case IDsosreport:01234567Your sosreport has been generated and saved in: /host/var/tmp/sosreport-my-cluster-node-01234567-2020-05-28-eyjknxt.tar.xz1 The checksum is: 382ffc167510fd71b4f12a4f40b97a4e- 1
- The
sosreportarchive’s file path is outside of thechrootenvironment because the toolbox container mounts the host’s root directory at/host.
Provide the
archive to Red Hat Support for analysis, using one of the following methods.sosreportUpload the file to an existing Red Hat support case directly from an OpenShift Container Platform cluster.
From within the toolbox container, run
to attach the archive directly to an existing Red Hat support case. This example uses support case IDredhat-support-tool:01234567# redhat-support-tool addattachment -c 01234567 /host/var/tmp/my-sosreport.tar.xz1 - 1
- The toolbox container mounts the host’s root directory at
/host. Reference the absolute path from the toolbox container’s root directory, including/host/, when specifying files to upload through theredhat-support-toolcommand.
Upload the file to an existing Red Hat support case.
Concatenate the
archive by running thesosreportcommand and redirect the output to a file. This command assumes you have exited the previousoc debug node/<node_name>session:oc debug$ oc debug node/my-cluster-node -- bash -c 'cat /host/var/tmp/sosreport-my-cluster-node-01234567-2020-05-28-eyjknxt.tar.xz' > /tmp/sosreport-my-cluster-node-01234567-2020-05-28-eyjknxt.tar.xz1 - 1
- The debug container mounts the host’s root directory at
/host. Reference the absolute path from the debug container’s root directory, including/host, when specifying target files for concatenation.
NoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Transferring a
archive from a cluster node by usingsosreportis not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,scpoperations will be impacted. In such situations, it is possible to copy aocarchive from a node by runningsosreport.scp core@<node>.<cluster_name>.<base_domain>:<file_path> <local_path>- Navigate to an existing support case within https://access.redhat.com/support/cases/.
- Select Attach files and follow the prompts to upload the file.
5.5. Querying bootstrap node journal logs Copy linkLink copied to clipboard!
If you experience bootstrap-related issues, you can gather
bootkube.service
journald
Prerequisites
- You have SSH access to your bootstrap node.
- You have the fully qualified domain name of the bootstrap node.
Procedure
Query
bootkube.serviceunit logs from a bootstrap node during OpenShift Container Platform installation. Replacejournaldwith the bootstrap node’s fully qualified domain name:<bootstrap_fqdn>$ ssh core@<bootstrap_fqdn> journalctl -b -f -u bootkube.serviceNoteThe
log on the bootstrap node outputs etcdbootkube.serviceerrors, indicating that the bootstrap server is unable to connect to etcd on control plane nodes (also known as the master nodes). After etcd has started on each control plane node and the nodes have joined the cluster, the errors should stop.connection refusedCollect logs from the bootstrap node containers using
on the bootstrap node. Replacepodmanwith the bootstrap node’s fully qualified domain name:<bootstrap_fqdn>$ ssh core@<bootstrap_fqdn> 'for pod in $(sudo podman ps -a -q); do sudo podman logs $pod; done'
5.6. Querying cluster node journal logs Copy linkLink copied to clipboard!
You can gather
journald
/var/log
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc - You have SSH access to your hosts.
Procedure
Query
kubeletunit logs from OpenShift Container Platform cluster nodes. The following example queries control plane nodes (also known as the master nodes) only:journald$ oc adm node-logs --role=master -u kubelet1 - 1
- Replace
kubeletas appropriate to query other unit logs.
Collect logs from specific subdirectories under
on cluster nodes./var/log/Retrieve a list of logs contained within a
subdirectory. The following example lists files in/var/log/on all control plane nodes:/var/log/openshift-apiserver/$ oc adm node-logs --role=master --path=openshift-apiserverInspect a specific log within a
subdirectory. The following example outputs/var/log/contents from all control plane nodes:/var/log/openshift-apiserver/audit.log$ oc adm node-logs --role=master --path=openshift-apiserver/audit.logIf the API is not functional, review the logs on each node using SSH instead. The following example tails
:/var/log/openshift-apiserver/audit.log$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo tail -f /var/log/openshift-apiserver/audit.logNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. Before attempting to collect diagnostic data over SSH, review whether the data collected by running
and otheroc adm must gathercommands is sufficient instead. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,ocoperations will be impacted. In such situations, it is possible to access nodes usingoc.ssh core@<node>.<cluster_name>.<base_domain>
5.7. Collecting a network trace from an OpenShift Container Platform node or container Copy linkLink copied to clipboard!
When investigating potential network-related OpenShift Container Platform issues, Red Hat Support might request a network packet trace from a specific OpenShift Container Platform cluster node or from a specific container. The recommended method to capture a network trace in OpenShift Container Platform is through a debug pod.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc - You have a Red Hat standard or premium Subscription.
- You have a Red Hat Customer Portal account.
- You have an existing Red Hat Support case ID.
- You have SSH access to your hosts.
Procedure
Obtain a list of cluster nodes:
$ oc get nodesEnter into a debug session on the target node. This step instantiates a debug pod called
:<node_name>-debug$ oc debug node/my-cluster-nodeSet
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,
operations will be impacted. In such situations, it is possible to access nodes usingocinstead.ssh core@<node>.<cluster_name>.<base_domain>From within the
environment console, obtain the node’s interface names:chroot# ip adStart a
container, which includes the required binaries and plugins to runtoolbox:sosreport# toolboxNoteIf an existing
pod is already running, thetoolboxcommand outputstoolbox. To avoid'toolbox-' already exists. Trying to start…issues, remove the running toolbox container withtcpdumpand spawn a new toolbox container.podman rm toolbox-Initiate a
session on the cluster node and redirect output to a capture file. This example usestcpdumpas the interface name:ens5$ tcpdump -nn -s 0 -i ens5 -w /host/var/tmp/my-cluster-node_$(date +%d_%m_%Y-%H_%M_%S-%Z).pcap1 - 1
- The
tcpdumpcapture file’s path is outside of thechrootenvironment because the toolbox container mounts the host’s root directory at/host.
If a
capture is required for a specific container on the node, follow these steps.tcpdumpDetermine the target container ID. The
command precedes thechroot hostcommand in this step because the toolbox container mounts the host’s root directory atcrictl:/host# chroot /host crictl psDetermine the container’s process ID. In this example, the container ID is
:a7fe32346b120# chroot /host crictl inspect --output yaml a7fe32346b120 | grep 'pid' | awk '{print $2}'Initiate a
session on the container and redirect output to a capture file. This example usestcpdumpas the container’s process ID and49628as the interface name. Theens5command enters the namespace of a target process and runs a command in its namespace. because the target process in this example is a container’s process ID, thensentercommand is run in the container’s namespace from the host:tcpdump# nsenter -n -t 49628 -- tcpdump -nn -i ens5 -w /host/var/tmp/my-cluster-node-my-container_$(date +%d_%m_%Y-%H_%M_%S-%Z).pcap.pcap1 - 1
- The
tcpdumpcapture file’s path is outside of thechrootenvironment because the toolbox container mounts the host’s root directory at/host.
Provide the
capture file to Red Hat Support for analysis, using one of the following methods.tcpdumpUpload the file to an existing Red Hat support case directly from an OpenShift Container Platform cluster.
From within the toolbox container, run
to attach the file directly to an existing Red Hat Support case. This example uses support case IDredhat-support-tool:01234567# redhat-support-tool addattachment -c 01234567 /host/var/tmp/my-tcpdump-capture-file.pcap1 - 1
- The toolbox container mounts the host’s root directory at
/host. Reference the absolute path from the toolbox container’s root directory, including/host/, when specifying files to upload through theredhat-support-toolcommand.
Upload the file to an existing Red Hat support case.
Concatenate the
archive by running thesosreportcommand and redirect the output to a file. This command assumes you have exited the previousoc debug node/<node_name>session:oc debug$ oc debug node/my-cluster-node -- bash -c 'cat /host/var/tmp/my-tcpdump-capture-file.pcap' > /tmp/my-tcpdump-capture-file.pcap1 - 1
- The debug container mounts the host’s root directory at
/host. Reference the absolute path from the debug container’s root directory, including/host, when specifying target files for concatenation.
NoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Transferring a
capture file from a cluster node by usingtcpdumpis not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,scpoperations will be impacted. In such situations, it is possible to copy aoccapture file from a node by runningtcpdump.scp core@<node>.<cluster_name>.<base_domain>:<file_path> <local_path>- Navigate to an existing support case within https://access.redhat.com/support/cases/.
- Select Attach files and follow the prompts to upload the file.
5.8. Providing diagnostic data to Red Hat Support Copy linkLink copied to clipboard!
When investigating OpenShift Container Platform issues, Red Hat Support might ask you to upload diagnostic data to a support case. Files can be uploaded to a support case through the Red Hat Customer Portal, or from an OpenShift Container Platform cluster directly by using the
redhat-support-tool
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have SSH access to your hosts.
-
You have installed the OpenShift CLI ().
oc - You have a Red Hat standard or premium Subscription.
- You have a Red Hat Customer Portal account.
- You have an existing Red Hat Support case ID.
Procedure
Upload diagnostic data to an existing Red Hat support case through the Red Hat Customer Portal.
Concatenate a diagnostic file contained on an OpenShift Container Platform node by using the
command and redirect the output to a file. The following example copiesoc debug node/<node_name>from a debug container to/host/var/tmp/my-diagnostic-data.tar.gz:/var/tmp/my-diagnostic-data.tar.gz$ oc debug node/my-cluster-node -- bash -c 'cat /host/var/tmp/my-diagnostic-data.tar.gz' > /var/tmp/my-diagnostic-data.tar.gz1 - 1
- The debug container mounts the host’s root directory at
/host. Reference the absolute path from the debug container’s root directory, including/host, when specifying target files for concatenation.
NoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Transferring files from a cluster node by using
is not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,scpoperations will be impacted. In such situations, it is possible to copy diagnostic files from a node by runningoc.scp core@<node>.<cluster_name>.<base_domain>:<file_path> <local_path>- Navigate to an existing support case within https://access.redhat.com/support/cases/.
- Select Attach files and follow the prompts to upload the file.
Upload diagnostic data to an existing Red Hat support case directly from an OpenShift Container Platform cluster.
Obtain a list of cluster nodes:
$ oc get nodesEnter into a debug session on the target node. This step instantiates a debug pod called
:<node_name>-debug$ oc debug node/my-cluster-nodeSet
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,
operations will be impacted. In such situations, it is possible to access nodes usingocinstead.ssh core@<node>.<cluster_name>.<base_domain>Start a
container, which includes the required binaries to runtoolbox:redhat-support-tool# toolboxNoteIf an existing
pod is already running, thetoolboxcommand outputstoolbox. Remove the running toolbox container with'toolbox-' already exists. Trying to start…and spawn a new toolbox container, to avoid issues.podman rm toolbox-Run
to attach a file from the debug pod directly to an existing Red Hat Support case. This example uses support case ID '01234567' and example file pathredhat-support-tool:/host/var/tmp/my-diagnostic-data.tar.gz# redhat-support-tool addattachment -c 01234567 /host/var/tmp/my-diagnostic-data.tar.gz1 - 1
- The toolbox container mounts the host’s root directory at
/host. Reference the absolute path from the toolbox container’s root directory, including/host/, when specifying files to upload through theredhat-support-toolcommand.
5.9. About toolbox Copy linkLink copied to clipboard!
toolbox
sosreport
redhat-support-tool
The primary purpose for a
toolbox
Installing packages to a toolbox container
By default, running the
toolbox
registry.redhat.io/rhel8/support-tools:latest
Prerequisites
-
You have accessed a node with the command.
oc debug node/<node_name>
Procedure
Set
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostStart the toolbox container:
# toolboxInstall the additional package, such as
:wget# dnf install -y <package_name>
Starting an alternative image with toolbox
By default, running the
toolbox
registry.redhat.io/rhel8/support-tools:latest
.toolboxrc
Prerequisites
-
You have accessed a node with the command.
oc debug node/<node_name>
Procedure
Set
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostCreate a
file in the home directory for the root user ID:.toolboxrc# vi ~/.toolboxrcREGISTRY=quay.io1 IMAGE=fedora/fedora:33-x86_642 TOOLBOX_NAME=toolbox-fedora-333 Start a toolbox container with the alternative image:
# toolboxNoteIf an existing
pod is already running, thetoolboxcommand outputstoolbox. Remove the running toolbox container with'toolbox-' already exists. Trying to start…and spawn a new toolbox container, to avoid issues withpodman rm toolbox-plugins.sosreport
Chapter 6. Summarizing cluster specifications Copy linkLink copied to clipboard!
6.1. Summarizing cluster specifications through clusterversion Copy linkLink copied to clipboard!
You can obtain a summary of OpenShift Container Platform cluster specifications by querying the
clusterversion
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
Query cluster version, availability, uptime, and general status:
$ oc get clusterversionObtain a detailed summary of cluster specifications, update availability, and update history:
$ oc describe clusterversion
Chapter 7. Troubleshooting Copy linkLink copied to clipboard!
7.1. Troubleshooting installations Copy linkLink copied to clipboard!
7.1.1. Determining where installation issues occur Copy linkLink copied to clipboard!
When troubleshooting OpenShift Container Platform installation issues, you can monitor installation logs to determine at which stage issues occur. Then, retrieve diagnostic data relevant to that stage.
OpenShift Container Platform installation proceeds through the following stages:
- Ignition configuration files are created.
- The bootstrap machine boots and starts hosting the remote resources required for the control plane machines (also known as the master machines) to boot.
- The control plane machines fetch the remote resources from the bootstrap machine and finish booting.
- The control plane machines use the bootstrap machine to form an etcd cluster.
- The bootstrap machine starts a temporary Kubernetes control plane using the new etcd cluster.
- The temporary control plane schedules the production control plane to the control plane machines.
- The temporary control plane shuts down and passes control to the production control plane.
- The bootstrap machine adds OpenShift Container Platform components into the production control plane.
- The installation program shuts down the bootstrap machine.
- The control plane sets up the worker nodes.
- The control plane installs additional services in the form of a set of Operators.
- The cluster downloads and configures remaining components needed for the day-to-day operation, including the creation of worker machines in supported environments.
7.1.2. User-provisioned infrastructure installation considerations Copy linkLink copied to clipboard!
The default installation method uses installer-provisioned infrastructure. With installer-provisioned infrastructure clusters, OpenShift Container Platform manages all aspects of the cluster, including the operating system itself. If possible, use this feature to avoid having to provision and maintain the cluster infrastructure.
You can alternatively install OpenShift Container Platform 4.8 on infrastructure that you provide. If you use this installation method, follow user-provisioned infrastructure installation documentation carefully. Additionally, review the following considerations before the installation:
- Check the Red Hat Enterprise Linux (RHEL) Ecosystem to determine the level of Red Hat Enterprise Linux CoreOS (RHCOS) support provided for your chosen server hardware or virtualization technology.
- Many virtualization and cloud environments require agents to be installed on guest operating systems. Ensure that these agents are installed as a containerized workload deployed through a daemon set.
Install cloud provider integration if you want to enable features such as dynamic storage, on-demand service routing, node hostname to Kubernetes hostname resolution, and cluster autoscaling.
NoteIt is not possible to enable cloud provider integration in OpenShift Container Platform environments that mix resources from different cloud providers, or that span multiple physical or virtual platforms. The node life cycle controller will not allow nodes that are external to the existing provider to be added to a cluster, and it is not possible to specify more than one cloud provider integration.
- A provider-specific Machine API implementation is required if you want to use machine sets or autoscaling to automatically provision OpenShift Container Platform cluster nodes.
- Check whether your chosen cloud provider offers a method to inject Ignition configuration files into hosts as part of their initial deployment. If they do not, you will need to host Ignition configuration files by using an HTTP server. The steps taken to troubleshoot Ignition configuration file issues will differ depending on which of these two methods is deployed.
- Storage needs to be manually provisioned if you want to leverage optional framework components such as the embedded container registry, Elasticsearch, or Prometheus. Default storage classes are not defined in user-provisioned infrastructure installations unless explicitly configured.
- A load balancer is required to distribute API requests across all control plane nodes (also known as the master nodes) in highly available OpenShift Container Platform environments. You can use any TCP-based load balancing solution that meets OpenShift Container Platform DNS routing and port requirements.
7.1.3. Checking a load balancer configuration before OpenShift Container Platform installation Copy linkLink copied to clipboard!
Check your load balancer configuration prior to starting an OpenShift Container Platform installation.
Prerequisites
- You have configured an external load balancer of your choosing, in preparation for an OpenShift Container Platform installation. The following example is based on a Red Hat Enterprise Linux (RHEL) host using HAProxy to provide load balancing services to a cluster.
- You have configured DNS in preparation for an OpenShift Container Platform installation.
- You have SSH access to your load balancer.
Procedure
Check that the
systemd service is active:haproxy$ ssh <user_name>@<load_balancer> systemctl status haproxyVerify that the load balancer is listening on the required ports. The following example references ports
,80,443, and6443.22623For HAProxy instances running on Red Hat Enterprise Linux (RHEL) 6, verify port status by using the
command:netstat$ ssh <user_name>@<load_balancer> netstat -nltupe | grep -E ':80|:443|:6443|:22623'For HAProxy instances running on Red Hat Enterprise Linux (RHEL) 7 or 8, verify port status by using the
command:ss$ ssh <user_name>@<load_balancer> ss -nltupe | grep -E ':80|:443|:6443|:22623'NoteRed Hat recommends the
command instead ofssin Red Hat Enterprise Linux (RHEL) 7 or later.netstatis provided by the iproute package. For more information on thesscommand, see the Red Hat Enterprise Linux (RHEL) 7 Performance Tuning Guide.ss
Check that the wildcard DNS record resolves to the load balancer:
$ dig <wildcard_fqdn> @<dns_server>
7.1.4. Specifying OpenShift Container Platform installer log levels Copy linkLink copied to clipboard!
By default, the OpenShift Container Platform installer log level is set to
info
openshift-install
debug
Prerequisites
- You have access to the installation host.
Procedure
Set the installation log level to
when initiating the installation:debug$ ./openshift-install --dir <installation_directory> wait-for bootstrap-complete --log-level debug1 - 1
- Possible log levels include
info,warn,error,anddebug.
7.1.5. Troubleshooting openshift-install command issues Copy linkLink copied to clipboard!
If you experience issues running the
openshift-install
The installation has been initiated within 24 hours of Ignition configuration file creation. The Ignition files are created when the following command is run:
$ ./openshift-install create ignition-configs --dir=./install_dir-
The file is in the same directory as the installer. If an alternative installation path is declared by using the
install-config.yamloption, verify that the./openshift-install --dirfile exists within that directory.install-config.yaml
7.1.6. Monitoring installation progress Copy linkLink copied to clipboard!
You can monitor high-level installation, bootstrap, and control plane logs as an OpenShift Container Platform installation progresses. This provides greater visibility into how an installation progresses and helps identify the stage at which an installation failure occurs.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc - You have SSH access to your hosts.
You have the fully qualified domain names of the bootstrap and control plane nodes (also known as the master nodes).
NoteThe initial
password can be found inkubeadminon the installation host.<install_directory>/auth/kubeadmin-password
Procedure
Watch the installation log as the installation progresses:
$ tail -f ~/<installation_directory>/.openshift_install.logMonitor the
journald unit log on the bootstrap node, after it has booted. This provides visibility into the bootstrapping of the first control plane. Replacebootkube.servicewith the bootstrap node’s fully qualified domain name:<bootstrap_fqdn>$ ssh core@<bootstrap_fqdn> journalctl -b -f -u bootkube.serviceNoteThe
log on the bootstrap node outputs etcdbootkube.serviceerrors, indicating that the bootstrap server is unable to connect to etcd on control plane nodes. After etcd has started on each control plane node and the nodes have joined the cluster, the errors should stop.connection refusedMonitor
journald unit logs on control plane nodes, after they have booted. This provides visibility into control plane node agent activity.kubelet.serviceMonitor the logs using
:oc$ oc adm node-logs --role=master -u kubeletIf the API is not functional, review the logs using SSH instead. Replace
with appropriate values:<master-node>.<cluster_name>.<base_domain>$ ssh core@<master-node>.<cluster_name>.<base_domain> journalctl -b -f -u kubelet.service
Monitor
journald unit logs on control plane nodes, after they have booted. This provides visibility into control plane node CRI-O container runtime activity.crio.serviceMonitor the logs using
:oc$ oc adm node-logs --role=master -u crioIf the API is not functional, review the logs using SSH instead. Replace
with appropriate values:<master-node>.<cluster_name>.<base_domain>$ ssh core@master-N.cluster_name.sub_domain.domain journalctl -b -f -u crio.service
7.1.7. Gathering bootstrap node diagnostic data Copy linkLink copied to clipboard!
When experiencing bootstrap-related issues, you can gather
bootkube.service
journald
Prerequisites
- You have SSH access to your bootstrap node.
- You have the fully qualified domain name of the bootstrap node.
- If you are hosting Ignition configuration files by using an HTTP server, you must have the HTTP server’s fully qualified domain name and the port number. You must also have SSH access to the HTTP host.
Procedure
- If you have access to the bootstrap node’s console, monitor the console until the node reaches the login prompt.
Verify the Ignition file configuration.
If you are hosting Ignition configuration files by using an HTTP server.
Verify the bootstrap node Ignition file URL. Replace
with HTTP server’s fully qualified domain name:<http_server_fqdn>$ curl -I http://<http_server_fqdn>:<port>/bootstrap.ign1 - 1
- The
-Ioption returns the header only. If the Ignition file is available on the specified URL, the command returns200 OKstatus. If it is not available, the command returns404 file not found.
To verify that the Ignition file was received by the bootstrap node, query the HTTP server logs on the serving host. For example, if you are using an Apache web server to serve Ignition files, enter the following command:
$ grep -is 'bootstrap.ign' /var/log/httpd/access_logIf the bootstrap Ignition file is received, the associated
log message will include aHTTP GETsuccess status, indicating that the request succeeded.200 OK- If the Ignition file was not received, check that the Ignition files exist and that they have the appropriate file and web server permissions on the serving host directly.
If you are using a cloud provider mechanism to inject Ignition configuration files into hosts as part of their initial deployment.
- Review the bootstrap node’s console to determine if the mechanism is injecting the bootstrap node Ignition file correctly.
- Verify the availability of the bootstrap node’s assigned storage device.
- Verify that the bootstrap node has been assigned an IP address from the DHCP server.
Collect
journald unit logs from the bootstrap node. Replacebootkube.servicewith the bootstrap node’s fully qualified domain name:<bootstrap_fqdn>$ ssh core@<bootstrap_fqdn> journalctl -b -f -u bootkube.serviceNoteThe
log on the bootstrap node outputs etcdbootkube.serviceerrors, indicating that the bootstrap server is unable to connect to etcd on control plane nodes (also known as the master nodes). After etcd has started on each control plane node and the nodes have joined the cluster, the errors should stop.connection refusedCollect logs from the bootstrap node containers.
Collect the logs using
on the bootstrap node. Replacepodmanwith the bootstrap node’s fully qualified domain name:<bootstrap_fqdn>$ ssh core@<bootstrap_fqdn> 'for pod in $(sudo podman ps -a -q); do sudo podman logs $pod; done'
If the bootstrap process fails, verify the following.
-
You can resolve from the installation host.
api.<cluster_name>.<base_domain> - The load balancer proxies port 6443 connections to bootstrap and control plane nodes. Ensure that the proxy configuration meets OpenShift Container Platform installation requirements.
-
You can resolve
7.1.8. Investigating control plane node installation issues Copy linkLink copied to clipboard!
If you experience control plane node (also known as the master node)installation issues, determine the control plane node OpenShift Container Platform software defined network (SDN), and network Operator status. Collect
kubelet.service
crio.service
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc - You have SSH access to your hosts.
- You have the fully qualified domain names of the bootstrap and control plane nodes.
If you are hosting Ignition configuration files by using an HTTP server, you must have the HTTP server’s fully qualified domain name and the port number. You must also have SSH access to the HTTP host.
NoteThe initial
password can be found inkubeadminon the installation host.<install_directory>/auth/kubeadmin-password
Procedure
- If you have access to the console for the control plane node, monitor the console until the node reaches the login prompt. During the installation, Ignition log messages are output to the console.
Verify Ignition file configuration.
If you are hosting Ignition configuration files by using an HTTP server.
Verify the control plane node Ignition file URL. Replace
with HTTP server’s fully qualified domain name:<http_server_fqdn>$ curl -I http://<http_server_fqdn>:<port>/master.ign1 - 1
- The
-Ioption returns the header only. If the Ignition file is available on the specified URL, the command returns200 OKstatus. If it is not available, the command returns404 file not found.
To verify that the Ignition file was received by the control plane node query the HTTP server logs on the serving host. For example, if you are using an Apache web server to serve Ignition files:
$ grep -is 'master.ign' /var/log/httpd/access_logIf the master Ignition file is received, the associated
log message will include aHTTP GETsuccess status, indicating that the request succeeded.200 OK- If the Ignition file was not received, check that it exists on the serving host directly. Ensure that the appropriate file and web server permissions are in place.
If you are using a cloud provider mechanism to inject Ignition configuration files into hosts as part of their initial deployment.
- Review the console for the control plane node to determine if the mechanism is injecting the control plane node Ignition file correctly.
- Check the availability of the storage device assigned to the control plane node.
- Verify that the control plane node has been assigned an IP address from the DHCP server.
Determine control plane node status.
Query control plane node status:
$ oc get nodesIf one of the control plane nodes does not reach a
status, retrieve a detailed node description:Ready$ oc describe node <master_node>NoteIt is not possible to run
commands if an installation issue prevents the OpenShift Container Platform API from running or if the kubelet is not running yet on each node:oc
Determine OpenShift Container Platform SDN status.
Review
,sdn-controller, andsdndaemon set status, in theovsnamespace:openshift-sdn$ oc get daemonsets -n openshift-sdnIf those resources are listed as
, review pods in theNot foundnamespace:openshift-sdn$ oc get pods -n openshift-sdnReview logs relating to failed OpenShift Container Platform SDN pods in the
namespace:openshift-sdn$ oc logs <sdn_pod> -n openshift-sdn
Determine cluster network configuration status.
Review whether the cluster’s network configuration exists:
$ oc get network.config.openshift.io cluster -o yamlIf the installer failed to create the network configuration, generate the Kubernetes manifests again and review message output:
$ ./openshift-install create manifestsReview the pod status in the
namespace to determine whether the Cluster Network Operator (CNO) is running:openshift-network-operator$ oc get pods -n openshift-network-operatorGather network Operator pod logs from the
namespace:openshift-network-operator$ oc logs pod/<network_operator_pod_name> -n openshift-network-operator
Monitor
journald unit logs on control plane nodes, after they have booted. This provides visibility into control plane node agent activity.kubelet.serviceRetrieve the logs using
:oc$ oc adm node-logs --role=master -u kubeletIf the API is not functional, review the logs using SSH instead. Replace
with appropriate values:<master-node>.<cluster_name>.<base_domain>$ ssh core@<master-node>.<cluster_name>.<base_domain> journalctl -b -f -u kubelet.serviceNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. Before attempting to collect diagnostic data over SSH, review whether the data collected by running
and otheroc adm must gathercommands is sufficient instead. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,ocoperations will be impacted. In such situations, it is possible to access nodes usingoc.ssh core@<node>.<cluster_name>.<base_domain>
Retrieve
journald unit logs on control plane nodes, after they have booted. This provides visibility into control plane node CRI-O container runtime activity.crio.serviceRetrieve the logs using
:oc$ oc adm node-logs --role=master -u crioIf the API is not functional, review the logs using SSH instead:
$ ssh core@<master-node>.<cluster_name>.<base_domain> journalctl -b -f -u crio.service
Collect logs from specific subdirectories under
on control plane nodes./var/log/Retrieve a list of logs contained within a
subdirectory. The following example lists files in/var/log/on all control plane nodes:/var/log/openshift-apiserver/$ oc adm node-logs --role=master --path=openshift-apiserverInspect a specific log within a
subdirectory. The following example outputs/var/log/contents from all control plane nodes:/var/log/openshift-apiserver/audit.log$ oc adm node-logs --role=master --path=openshift-apiserver/audit.logIf the API is not functional, review the logs on each node using SSH instead. The following example tails
:/var/log/openshift-apiserver/audit.log$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo tail -f /var/log/openshift-apiserver/audit.log
Review control plane node container logs using SSH.
List the containers:
$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl ps -aRetrieve a container’s logs using
:crictl$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl logs -f <container_id>
If you experience control plane node configuration issues, verify that the MCO, MCO endpoint, and DNS record are functioning. The Machine Config Operator (MCO) manages operating system configuration during the installation procedure. Also verify system clock accuracy and certificate validity.
Test whether the MCO endpoint is available. Replace
with appropriate values:<cluster_name>$ curl https://api-int.<cluster_name>:22623/config/master- If the endpoint is unresponsive, verify load balancer configuration. Ensure that the endpoint is configured to run on port 22623.
Verify that the MCO endpoint’s DNS record is configured and resolves to the load balancer.
Run a DNS lookup for the defined MCO endpoint name:
$ dig api-int.<cluster_name> @<dns_server>Run a reverse lookup to the assigned MCO IP address on the load balancer:
$ dig -x <load_balancer_mco_ip_address> @<dns_server>
Verify that the MCO is functioning from the bootstrap node directly. Replace
with the bootstrap node’s fully qualified domain name:<bootstrap_fqdn>$ ssh core@<bootstrap_fqdn> curl https://api-int.<cluster_name>:22623/config/masterSystem clock time must be synchronized between bootstrap, master, and worker nodes. Check each node’s system clock reference time and time synchronization statistics:
$ ssh core@<node>.<cluster_name>.<base_domain> chronyc trackingReview certificate validity:
$ openssl s_client -connect api-int.<cluster_name>:22623 | openssl x509 -noout -text
7.1.9. Investigating etcd installation issues Copy linkLink copied to clipboard!
If you experience etcd issues during installation, you can check etcd pod status and collect etcd pod logs. You can also verify etcd DNS records and check DNS availability on control plane nodes (also known as the master nodes).
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc - You have SSH access to your hosts.
- You have the fully qualified domain names of the control plane nodes.
Procedure
Check the status of etcd pods.
Review the status of pods in the
namespace:openshift-etcd$ oc get pods -n openshift-etcdReview the status of pods in the
namespace:openshift-etcd-operator$ oc get pods -n openshift-etcd-operator
If any of the pods listed by the previous commands are not showing a
or aRunningstatus, gather diagnostic information for the pod.CompletedReview events for the pod:
$ oc describe pod/<pod_name> -n <namespace>Inspect the pod’s logs:
$ oc logs pod/<pod_name> -n <namespace>If the pod has more than one container, the preceding command will create an error, and the container names will be provided in the error message. Inspect logs for each container:
$ oc logs pod/<pod_name> -c <container_name> -n <namespace>
If the API is not functional, review etcd pod and container logs on each control plane node by using SSH instead. Replace
with appropriate values.<master-node>.<cluster_name>.<base_domain>List etcd pods on each control plane node:
$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl pods --name=etcd-For any pods not showing
status, inspect pod status in detail. ReplaceReadywith the pod’s ID listed in the output of the preceding command:<pod_id>$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl inspectp <pod_id>List containers related to a pod:
$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl ps | grep '<pod_id>'For any containers not showing
status, inspect container status in detail. ReplaceReadywith container IDs listed in the output of the preceding command:<container_id>$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl inspect <container_id>Review the logs for any containers not showing a
status. ReplaceReadywith the container IDs listed in the output of the preceding command:<container_id>$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl logs -f <container_id>NoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. Before attempting to collect diagnostic data over SSH, review whether the data collected by running
and otheroc adm must gathercommands is sufficient instead. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,ocoperations will be impacted. In such situations, it is possible to access nodes usingoc.ssh core@<node>.<cluster_name>.<base_domain>
- Validate primary and secondary DNS server connectivity from control plane nodes.
7.1.10. Investigating control plane node kubelet and API server issues Copy linkLink copied to clipboard!
To investigate control plane node (also known as the master node) kubelet and API server issues during installation, check DNS, DHCP, and load balancer functionality. Also, verify that certificates have not expired.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc - You have SSH access to your hosts.
- You have the fully qualified domain names of the control plane nodes.
Procedure
-
Verify that the API server’s DNS record directs the kubelet on control plane nodes to . Ensure that the record references the load balancer.
https://api-int.<cluster_name>.<base_domain>:6443 - Ensure that the load balancer’s port 6443 definition references each control plane node.
- Check that unique control plane node hostnames have been provided by DHCP.
Inspect the
journald unit logs on each control plane node.kubelet.serviceRetrieve the logs using
:oc$ oc adm node-logs --role=master -u kubeletIf the API is not functional, review the logs using SSH instead. Replace
with appropriate values:<master-node>.<cluster_name>.<base_domain>$ ssh core@<master-node>.<cluster_name>.<base_domain> journalctl -b -f -u kubelet.serviceNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. Before attempting to collect diagnostic data over SSH, review whether the data collected by running
and otheroc adm must gathercommands is sufficient instead. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,ocoperations will be impacted. In such situations, it is possible to access nodes usingoc.ssh core@<node>.<cluster_name>.<base_domain>
Check for certificate expiration messages in the control plane node kubelet logs.
Retrieve the log using
:oc$ oc adm node-logs --role=master -u kubelet | grep -is 'x509: certificate has expired'If the API is not functional, review the logs using SSH instead. Replace
with appropriate values:<master-node>.<cluster_name>.<base_domain>$ ssh core@<master-node>.<cluster_name>.<base_domain> journalctl -b -f -u kubelet.service | grep -is 'x509: certificate has expired'
7.1.11. Investigating worker node installation issues Copy linkLink copied to clipboard!
If you experience worker node installation issues, you can review the worker node status. Collect
kubelet.service
crio.service
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc - You have SSH access to your hosts.
- You have the fully qualified domain names of the bootstrap and worker nodes.
If you are hosting Ignition configuration files by using an HTTP server, you must have the HTTP server’s fully qualified domain name and the port number. You must also have SSH access to the HTTP host.
NoteThe initial
password can be found inkubeadminon the installation host.<install_directory>/auth/kubeadmin-password
Procedure
- If you have access to the worker node’s console, monitor the console until the node reaches the login prompt. During the installation, Ignition log messages are output to the console.
Verify Ignition file configuration.
If you are hosting Ignition configuration files by using an HTTP server.
Verify the worker node Ignition file URL. Replace
with HTTP server’s fully qualified domain name:<http_server_fqdn>$ curl -I http://<http_server_fqdn>:<port>/worker.ign1 - 1
- The
-Ioption returns the header only. If the Ignition file is available on the specified URL, the command returns200 OKstatus. If it is not available, the command returns404 file not found.
To verify that the Ignition file was received by the worker node, query the HTTP server logs on the HTTP host. For example, if you are using an Apache web server to serve Ignition files:
$ grep -is 'worker.ign' /var/log/httpd/access_logIf the worker Ignition file is received, the associated
log message will include aHTTP GETsuccess status, indicating that the request succeeded.200 OK- If the Ignition file was not received, check that it exists on the serving host directly. Ensure that the appropriate file and web server permissions are in place.
If you are using a cloud provider mechanism to inject Ignition configuration files into hosts as part of their initial deployment.
- Review the worker node’s console to determine if the mechanism is injecting the worker node Ignition file correctly.
- Check the availability of the worker node’s assigned storage device.
- Verify that the worker node has been assigned an IP address from the DHCP server.
Determine worker node status.
Query node status:
$ oc get nodesRetrieve a detailed node description for any worker nodes not showing a
status:Ready$ oc describe node <worker_node>NoteIt is not possible to run
commands if an installation issue prevents the OpenShift Container Platform API from running or if the kubelet is not running yet on each node.oc
Unlike control plane nodes (also known as the master nodes), worker nodes are deployed and scaled using the Machine API Operator. Check the status of the Machine API Operator.
Review Machine API Operator pod status:
$ oc get pods -n openshift-machine-apiIf the Machine API Operator pod does not have a
status, detail the pod’s events:Ready$ oc describe pod/<machine_api_operator_pod_name> -n openshift-machine-apiInspect
container logs. The container runs within themachine-api-operatorpod:machine-api-operator$ oc logs pod/<machine_api_operator_pod_name> -n openshift-machine-api -c machine-api-operatorAlso inspect
container logs. The container also runs within thekube-rbac-proxypod:machine-api-operator$ oc logs pod/<machine_api_operator_pod_name> -n openshift-machine-api -c kube-rbac-proxy
Monitor
journald unit logs on worker nodes, after they have booted. This provides visibility into worker node agent activity.kubelet.serviceRetrieve the logs using
:oc$ oc adm node-logs --role=worker -u kubeletIf the API is not functional, review the logs using SSH instead. Replace
with appropriate values:<worker-node>.<cluster_name>.<base_domain>$ ssh core@<worker-node>.<cluster_name>.<base_domain> journalctl -b -f -u kubelet.serviceNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. Before attempting to collect diagnostic data over SSH, review whether the data collected by running
and otheroc adm must gathercommands is sufficient instead. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,ocoperations will be impacted. In such situations, it is possible to access nodes usingoc.ssh core@<node>.<cluster_name>.<base_domain>
Retrieve
journald unit logs on worker nodes, after they have booted. This provides visibility into worker node CRI-O container runtime activity.crio.serviceRetrieve the logs using
:oc$ oc adm node-logs --role=worker -u crioIf the API is not functional, review the logs using SSH instead:
$ ssh core@<worker-node>.<cluster_name>.<base_domain> journalctl -b -f -u crio.service
Collect logs from specific subdirectories under
on worker nodes./var/log/Retrieve a list of logs contained within a
subdirectory. The following example lists files in/var/log/on all worker nodes:/var/log/sssd/$ oc adm node-logs --role=worker --path=sssdInspect a specific log within a
subdirectory. The following example outputs/var/log/contents from all worker nodes:/var/log/sssd/audit.log$ oc adm node-logs --role=worker --path=sssd/sssd.logIf the API is not functional, review the logs on each node using SSH instead. The following example tails
:/var/log/sssd/sssd.log$ ssh core@<worker-node>.<cluster_name>.<base_domain> sudo tail -f /var/log/sssd/sssd.log
Review worker node container logs using SSH.
List the containers:
$ ssh core@<worker-node>.<cluster_name>.<base_domain> sudo crictl ps -aRetrieve a container’s logs using
:crictl$ ssh core@<worker-node>.<cluster_name>.<base_domain> sudo crictl logs -f <container_id>
If you experience worker node configuration issues, verify that the MCO, MCO endpoint, and DNS record are functioning. The Machine Config Operator (MCO) manages operating system configuration during the installation procedure. Also verify system clock accuracy and certificate validity.
Test whether the MCO endpoint is available. Replace
with appropriate values:<cluster_name>$ curl https://api-int.<cluster_name>:22623/config/worker- If the endpoint is unresponsive, verify load balancer configuration. Ensure that the endpoint is configured to run on port 22623.
Verify that the MCO endpoint’s DNS record is configured and resolves to the load balancer.
Run a DNS lookup for the defined MCO endpoint name:
$ dig api-int.<cluster_name> @<dns_server>Run a reverse lookup to the assigned MCO IP address on the load balancer:
$ dig -x <load_balancer_mco_ip_address> @<dns_server>
Verify that the MCO is functioning from the bootstrap node directly. Replace
with the bootstrap node’s fully qualified domain name:<bootstrap_fqdn>$ ssh core@<bootstrap_fqdn> curl https://api-int.<cluster_name>:22623/config/workerSystem clock time must be synchronized between bootstrap, master, and worker nodes. Check each node’s system clock reference time and time synchronization statistics:
$ ssh core@<node>.<cluster_name>.<base_domain> chronyc trackingReview certificate validity:
$ openssl s_client -connect api-int.<cluster_name>:22623 | openssl x509 -noout -text
7.1.12. Querying Operator status after installation Copy linkLink copied to clipboard!
You can check Operator status at the end of an installation. Retrieve diagnostic data for Operators that do not become available. Review logs for any Operator pods that are listed as
Pending
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
Check that cluster Operators are all available at the end of an installation.
$ oc get clusteroperatorsVerify that all of the required certificate signing requests (CSRs) are approved. Some nodes might not move to a
status and some cluster Operators might not become available if there are pending CSRs.ReadyCheck the status of the CSRs and ensure that you see a client and server request with the
orPendingstatus for each machine that you added to the cluster:Approved$ oc get csrExample output
NAME AGE REQUESTOR CONDITION csr-8b2br 15m system:serviceaccount:openshift-machine-config-operator:node-bootstrapper Pending1 csr-8vnps 15m system:serviceaccount:openshift-machine-config-operator:node-bootstrapper Pending csr-bfd72 5m26s system:node:ip-10-0-50-126.us-east-2.compute.internal Pending2 csr-c57lv 5m26s system:node:ip-10-0-95-157.us-east-2.compute.internal Pending ...In this example, two machines are joining the cluster. You might see more approved CSRs in the list.
If the CSRs were not approved, after all of the pending CSRs for the machines you added are in
status, approve the CSRs for your cluster machines:PendingNoteBecause the CSRs rotate automatically, approve your CSRs within an hour of adding the machines to the cluster. If you do not approve them within an hour, the certificates will rotate, and more than two certificates will be present for each node. You must approve all of these certificates. After you approve the initial CSRs, the subsequent node client CSRs are automatically approved by the cluster
.kube-controller-managerNoteFor clusters running on platforms that are not machine API enabled, such as bare metal and other user-provisioned infrastructure, you must implement a method of automatically approving the kubelet serving certificate requests (CSRs). If a request is not approved, then the
,oc exec, andoc rshcommands cannot succeed, because a serving certificate is required when the API server connects to the kubelet. Any operation that contacts the Kubelet endpoint requires this certificate approval to be in place. The method must watch for new CSRs, confirm that the CSR was submitted by theoc logsservice account in thenode-bootstrapperorsystem:nodegroups, and confirm the identity of the node.system:adminTo approve them individually, run the following command for each valid CSR:
$ oc adm certificate approve <csr_name>1 - 1
<csr_name>is the name of a CSR from the list of current CSRs.
To approve all pending CSRs, run the following command:
$ oc get csr -o go-template='{{range .items}}{{if not .status}}{{.metadata.name}}{{"\n"}}{{end}}{{end}}' | xargs oc adm certificate approve
View Operator events:
$ oc describe clusteroperator <operator_name>Review Operator pod status within the Operator’s namespace:
$ oc get pods -n <operator_namespace>Obtain a detailed description for pods that do not have
status:Running$ oc describe pod/<operator_pod_name> -n <operator_namespace>Inspect pod logs:
$ oc logs pod/<operator_pod_name> -n <operator_namespace>When experiencing pod base image related issues, review base image status.
Obtain details of the base image used by a problematic pod:
$ oc get pod -o "jsonpath={range .status.containerStatuses[*]}{.name}{'\t'}{.state}{'\t'}{.image}{'\n'}{end}" <operator_pod_name> -n <operator_namespace>List base image release information:
$ oc adm release info <image_path>:<tag> --commits
7.1.13. Gathering logs from a failed installation Copy linkLink copied to clipboard!
If you gave an SSH key to your installation program, you can gather data about your failed installation.
You use a different command to gather logs about an unsuccessful installation than to gather logs from a running cluster. If you must gather logs from a running cluster, use the
oc adm must-gather
Prerequisites
- Your OpenShift Container Platform installation failed before the bootstrap process finished. The bootstrap node is running and accessible through SSH.
-
The process is active on your computer, and you provided the same SSH key to both the
ssh-agentprocess and the installation program.ssh-agent - If you tried to install a cluster on infrastructure that you provisioned, you must have the fully qualified domain names of the bootstrap and control plane nodes (also known as the master nodes).
Procedure
Generate the commands that are required to obtain the installation logs from the bootstrap and control plane machines:
If you used installer-provisioned infrastructure, change to the directory that contains the installation program and run the following command:
$ ./openshift-install gather bootstrap --dir <installation_directory>1 - 1
installation_directoryis the directory you specified when you ran./openshift-install create cluster. This directory contains the OpenShift Container Platform definition files that the installation program creates.
For installer-provisioned infrastructure, the installation program stores information about the cluster, so you do not specify the hostnames or IP addresses.
If you used infrastructure that you provisioned yourself, change to the directory that contains the installation program and run the following command:
$ ./openshift-install gather bootstrap --dir <installation_directory> \1 --bootstrap <bootstrap_address> \2 --master <master_1_address> \3 --master <master_2_address> \4 --master <master_3_address>"5 - 1
- For
installation_directory, specify the same directory you specified when you ran./openshift-install create cluster. This directory contains the OpenShift Container Platform definition files that the installation program creates. - 2
<bootstrap_address>is the fully qualified domain name or IP address of the cluster’s bootstrap machine.- 3 4 5
- For each control plane, or master, machine in your cluster, replace
<master_*_address>with its fully qualified domain name or IP address.
NoteA default cluster contains three control plane machines. List all of your control plane machines as shown, no matter how many your cluster uses.
Example output
INFO Pulling debug logs from the bootstrap machine INFO Bootstrap gather logs captured here "<installation_directory>/log-bundle-<timestamp>.tar.gz"If you open a Red Hat support case about your installation failure, include the compressed logs in the case.
7.2. Verifying node health Copy linkLink copied to clipboard!
7.2.1. Reviewing node status, resource usage, and configuration Copy linkLink copied to clipboard!
Review cluster node health status, resource consumption statistics, and node logs. Additionally, query
kubelet
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
List the name, status, and role for all nodes in the cluster:
$ oc get nodesSummarize CPU and memory usage for each node within the cluster:
$ oc adm top nodesSummarize CPU and memory usage for a specific node:
$ oc adm top node my-node
7.2.2. Querying the kubelet’s status on a node Copy linkLink copied to clipboard!
You can review cluster node health status, resource consumption statistics, and node logs. Additionally, you can query
kubelet
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc
Procedure
The kubelet is managed using a systemd service on each node. Review the kubelet’s status by querying the
systemd service within a debug pod.kubeletStart a debug pod for a node:
$ oc debug node/my-nodeSet
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostNoteOpenShift Container Platform cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or
is not properly functioning on the target node,kubeletoperations will be impacted. In such situations, it is possible to access nodes usingocinstead.ssh core@<node>.<cluster_name>.<base_domain>Check whether the
systemd service is active on the node:kubelet# systemctl is-active kubeletOutput a more detailed
status summary:kubelet.service# systemctl status kubelet
7.2.3. Querying cluster node journal logs Copy linkLink copied to clipboard!
You can gather
journald
/var/log
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc - You have SSH access to your hosts.
Procedure
Query
kubeletunit logs from OpenShift Container Platform cluster nodes. The following example queries control plane nodes (also known as the master nodes) only:journald$ oc adm node-logs --role=master -u kubelet1 - 1
- Replace
kubeletas appropriate to query other unit logs.
Collect logs from specific subdirectories under
on cluster nodes./var/log/Retrieve a list of logs contained within a
subdirectory. The following example lists files in/var/log/on all control plane nodes:/var/log/openshift-apiserver/$ oc adm node-logs --role=master --path=openshift-apiserverInspect a specific log within a
subdirectory. The following example outputs/var/log/contents from all control plane nodes:/var/log/openshift-apiserver/audit.log$ oc adm node-logs --role=master --path=openshift-apiserver/audit.logIf the API is not functional, review the logs on each node using SSH instead. The following example tails
:/var/log/openshift-apiserver/audit.log$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo tail -f /var/log/openshift-apiserver/audit.logNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. Before attempting to collect diagnostic data over SSH, review whether the data collected by running
and otheroc adm must gathercommands is sufficient instead. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,ocoperations will be impacted. In such situations, it is possible to access nodes usingoc.ssh core@<node>.<cluster_name>.<base_domain>
7.3. Troubleshooting CRI-O container runtime issues Copy linkLink copied to clipboard!
7.3.1. About CRI-O container runtime engine Copy linkLink copied to clipboard!
CRI-O is a Kubernetes-native container runtime implementation that integrates closely with the operating system to deliver an efficient and optimized Kubernetes experience. CRI-O provides facilities for running, stopping, and restarting containers.
The CRI-O container runtime engine is managed using a systemd service on each OpenShift Container Platform cluster node. When container runtime issues occur, verify the status of the
crio
7.3.2. Verifying CRI-O runtime engine status Copy linkLink copied to clipboard!
You can verify CRI-O container runtime engine status on each cluster node.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
Review CRI-O status by querying the
systemd service on a node, within a debug pod.crioStart a debug pod for a node:
$ oc debug node/my-nodeSet
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,
operations will be impacted. In such situations, it is possible to access nodes usingocinstead.ssh core@<node>.<cluster_name>.<base_domain>Check whether the
systemd service is active on the node:crio# systemctl is-active crioOutput a more detailed
status summary:crio.service# systemctl status crio.service
7.3.3. Gathering CRI-O journald unit logs Copy linkLink copied to clipboard!
If you experience CRI-O issues, you can obtain CRI-O journald unit logs from a node.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc - You have the fully qualified domain names of the control plane, or control plane machines (also known as the master machines).
Procedure
Gather CRI-O journald unit logs. The following example collects logs from all control plane nodes (within the cluster:
$ oc adm node-logs --role=master -u crioGather CRI-O journald unit logs from a specific node:
$ oc adm node-logs <node_name> -u crioIf the API is not functional, review the logs using SSH instead. Replace
with appropriate values:<node>.<cluster_name>.<base_domain>$ ssh core@<node>.<cluster_name>.<base_domain> journalctl -b -f -u crio.serviceNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. Before attempting to collect diagnostic data over SSH, review whether the data collected by running
and otheroc adm must gathercommands is sufficient instead. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,ocoperations will be impacted. In such situations, it is possible to access nodes usingoc.ssh core@<node>.<cluster_name>.<base_domain>
7.3.4. Cleaning CRI-O storage Copy linkLink copied to clipboard!
You can manually clear the CRI-O ephemeral storage if you experience the following issues:
A node cannot run on any pods and this error appears:
Failed to create pod sandbox: rpc error: code = Unknown desc = failed to mount container XXX: error recreating the missing symlinks: error reading name of symlink for XXX: open /var/lib/containers/storage/overlay/XXX/link: no such file or directoryYou cannot create a new container on a working node and the “can’t stat lower layer” error appears:
can't stat lower layer ... because it does not exist. Going through storage to recreate the missing symlinks.-
Your node is in the state after a cluster upgrade or if you attempt to reboot it.
NotReady -
The container runtime implementation () is not working properly.
crio -
You are unable to start a debug shell on the node using because the container runtime instance (
oc debug node/<nodename>) is not working.crio
Follow this process to completely wipe the CRI-O storage and resolve the errors.
Prerequisites:
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
Use
on the node. This is to avoid any workload getting scheduled if the node gets into thecordonstatus. You will know that scheduling is disabled whenReadyis in your Status section:SchedulingDisabled$ oc adm cordon <nodename>Drain the node as the cluster-admin user:
$ oc adm drain <nodename> --ignore-daemonsets --delete-emptydir-dataNoteThe
attribute of a pod or pod template controls the graceful termination period. This attribute defaults at 30 seconds, but can be customized per application as necessary. If set to more than 90 seconds, the pod might be marked asterminationGracePeriodSecondsand fail to terminate successfully.SIGKILLedWhen the node returns, connect back to the node via SSH or Console. Then connect to the root user:
$ ssh core@node1.example.com $ sudo -iManually stop the kubelet:
# systemctl stop kubeletStop the containers and pods:
Use the following command to stop the pods that are not in the
. They must be removed first because their removal relies on the networking plugin pods, which are in theHostNetwork.HostNetwork.. for pod in $(crictl pods -q); do if [[ "$(crictl inspectp $pod | jq -r .status.linux.namespaces.options.network)" != "NODE" ]]; then crictl rmp -f $pod; fi; doneStop all other pods:
# crictl rmp -fa
Manually stop the crio services:
# systemctl stop crioAfter you run those commands, you can completely wipe the ephemeral storage:
# crio wipe -fStart the crio and kubelet service:
# systemctl start crio # systemctl start kubeletYou will know if the clean up worked if the crio and kubelet services are started, and the node is in the
status:Ready$ oc get nodesExample output
NAME STATUS ROLES AGE VERSION ci-ln-tkbxyft-f76d1-nvwhr-master-1 Ready, SchedulingDisabled master 133m v1.22.0-rc.0+75ee307Mark the node schedulable. You will know that the scheduling is enabled when
is no longer in status:SchedulingDisabled$ oc adm uncordon <nodename>Example output
NAME STATUS ROLES AGE VERSION ci-ln-tkbxyft-f76d1-nvwhr-master-1 Ready master 133m v1.22.0-rc.0+75ee307
7.4. Troubleshooting operating system issues Copy linkLink copied to clipboard!
OpenShift Container Platform runs on RHCOS. You can follow these procedures to troubleshoot problems related to the operating system.
7.4.1. Investigating kernel crashes Copy linkLink copied to clipboard!
The
kdump
kexec-tools
The
kdump
For more information about the support scope of Red Hat Technology Preview features, see https://access.redhat.com/support/offerings/techpreview/.
7.4.1.1. Enabling kdump Copy linkLink copied to clipboard!
RHCOS ships with
kexec-tools
kdump
Procedure
Perform the following steps to enable
kdump
To reserve memory for the crash kernel during the first kernel booting, provide kernel arguments by entering the following command:
# rpm-ostree kargs --append='crashkernel=256M'Optional: To write the crash dump over the network or to some other location, rather than to the default local
location, edit the/var/crashconfiguration file./etc/kdump.confNoteNetwork dumps are required when using LUKS.
does not support local crash dumps on LUKS-encrypted devices.kdumpFor details on configuring the
service, see the comments inkdump,/etc/sysconfig/kdump, and the/etc/kdump.confmanual page. Also refer to the RHELkdump.confkdumpdocumentation for further information on configuring the dump target.Enable the
systemd service:kdump# systemctl enable kdump.serviceReboot your system:
# systemctl reboot-
Ensure that has loaded a crash kernel by checking that the
kdumphas started and exited successfully and thatkdump.serviceprintscat /sys/kernel/kexec_crash_loaded.1
7.4.1.2. Enabling kdump on day-1 Copy linkLink copied to clipboard!
The
kdump
kdump
kdump
kdump
kdump
- Less available RAM due to memory being reserved for the crash kernel.
- Node unavailability while the kernel is dumping the core.
- Additional storage space being used to store the crash dumps.
-
Not being production-ready because the service is in Technology Preview.
kdump
If you are aware of the downsides and trade-offs of having the
kdump
kdump
systemd
MachineConfig
MachineConfig
Procedure
Create a
MachineConfig
Create a Butane config file,
, that configures and enables kdump:99-worker-kdump.buvariant: openshift version: 4.8.0 metadata: name: 99-worker-kdump1 labels: machineconfiguration.openshift.io/role: worker2 openshift: kernel_arguments:3 - crashkernel=256M storage: files: - path: /etc/kdump.conf4 mode: 0644 overwrite: true contents: inline: | path /var/crash core_collector makedumpfile -l --message-level 7 -d 31 - path: /etc/sysconfig/kdump5 mode: 0644 overwrite: true contents: inline: | KDUMP_COMMANDLINE_REMOVE="hugepages hugepagesz slub_debug quiet log_buf_len swiotlb" KDUMP_COMMANDLINE_APPEND="irqpoll nr_cpus=1 reset_devices cgroup_disable=memory mce=off numa=off udev.children-max=2 panic=10 rootflags=nofail acpi_no_memhotplug transparent_hugepage=never nokaslr novmcoredd hest_disable" KEXEC_ARGS="-s" KDUMP_IMG="vmlinuz" systemd: units: - name: kdump.service enabled: true- 1 2
- Replace
workerwithmasterin both locations when creating aMachineConfigobject for control plane nodes. - 3
- Provide kernel arguments to reserve memory for the crash kernel. You can add other kernel arguments if necessary.
- 4
- If you want to change the contents of
/etc/kdump.conffrom the default, include this section and modify theinlinesubsection accordingly. - 5
- If you want to change the contents of
/etc/sysconfig/kdumpfrom the default, include this section and modify theinlinesubsection accordingly.
Use Butane to generate a machine config YAML file,
, containing the configuration to be delivered to the nodes:99-worker-kdump.yaml$ butane 99-worker-kdump.bu -o 99-worker-kdump.yamlPut the YAML file into manifests during cluster setup. You can also create this
object after cluster setup with the YAML file:MachineConfig$ oc create -f ./99-worker-kdump.yaml
7.4.1.3. Testing the kdump configuration Copy linkLink copied to clipboard!
See the Testing the kdump configuration section in the RHEL documentation for kdump.
7.4.1.4. Analyzing a core dump Copy linkLink copied to clipboard!
See the Analyzing a core dump section in the RHEL documentation for kdump.
It is recommended to perform vmcore analysis on a separate RHEL system.
Additional resources
- Setting up kdump in RHEL
- Linux kernel documentation for kdump
-
kdump.conf(5) — a manual page for the configuration file containing the full documentation of available options
/etc/kdump.conf -
kexec(8) — a manual page for the package
kexec - Red Hat Knowledgebase article regarding kexec and kdump
7.4.2. Debugging Ignition failures Copy linkLink copied to clipboard!
If a machine cannot be provisioned, Ignition fails and RHCOS will boot into the emergency shell. Use the following procedure to get debugging information.
Procedure
Run the following command to show which service units failed:
$ systemctl --failedOptional: Run the following command on an individual service unit to find out more information:
$ journalctl -u <unit>.service
7.5. Troubleshooting network issues Copy linkLink copied to clipboard!
7.5.1. How the network interface is selected Copy linkLink copied to clipboard!
For installations on bare metal or with virtual machines that have more than one network interface controller (NIC), the NIC that OpenShift Container Platform uses for communication with the Kubernetes API server is determined by the
nodeip-configuration.service
After the
nodeip-configuration.service
/etc/systemd/system/kubelet.service.d/20-nodenet.conf
20-nodenet.conf
KUBELET_NODE_IP
When the kubelet service starts, it reads the value of the environment variable from the
20-nodenet.conf
--node-ip
If hardware or networking is reconfigured after installation, it is possible that the
nodeip-configuration.service
INTERNAL-IP
oc get nodes -o wide
If network communication is disrupted or misconfigured because a different NIC is selected, one strategy for overriding the selection process is to set the correct IP address explicitly. The following list identifies the high-level steps and considerations:
-
Create a shell script that determines the IP address to use for OpenShift Container Platform communication. Have the script create a custom unit file such as . Use the custom unit file,
/etc/systemd/system/kubelet.service.d/98-nodenet-override.conf, to set the98-nodenet-override.confenvironment variable to the IP address.KUBELET_NODE_IP -
Do not overwrite the file. Specify a file name with a numerically higher value such as
/etc/systemd/system/kubelet.service.d/20-nodenet.confin the same directory path. The goal is to have the custom unit file run after98-nodenet-override.confand override the value of the environment variable.20-nodenet.conf -
Create a machine config object with the shell script as a base64-encoded string and use the Machine Config Operator to deploy the script to the nodes at a file system path such as .
/usr/local/bin/override-node-ip.sh -
Ensure that runs after the shell script runs. The simplest method is to specify
systemctl daemon-reloadin the machine config, as shown in the following sample.ExecStart=systemctl daemon-reload
Sample machine config to override the network interface for kubelet
apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
metadata:
labels:
machineconfiguration.openshift.io/role: worker
name: 98-nodenet-override
spec:
config:
ignition:
version: 3.2.0
storage:
files:
- contents:
source: data:text/plain;charset=utf-8;base64,<encoded_script>
mode: 0755
overwrite: true
path: /usr/local/bin/override-node-ip.sh
systemd:
units:
- contents: |
[Unit]
Description=Override node IP detection
Wants=network-online.target
Before=kubelet.service
After=network-online.target
[Service]
Type=oneshot
ExecStart=/usr/local/bin/override-node-ip.sh
ExecStart=systemctl daemon-reload
[Install]
WantedBy=multi-user.target
enabled: true
name: nodenet-override.service
7.5.2. Troubleshooting Open vSwitch issues Copy linkLink copied to clipboard!
To troubleshoot some Open vSwitch (OVS) issues, you might need to configure the log level to include more information.
If you modify the log level on a node temporarily, be aware that you can receive log messages from the machine config daemon on the node like the following example:
E0514 12:47:17.998892 2281 daemon.go:1350] content mismatch for file /etc/systemd/system/ovs-vswitchd.service: [Unit]
To avoid the log messages related to the mismatch, revert the log level change after you complete your troubleshooting.
7.5.2.1. Configuring the Open vSwitch log level temporarily Copy linkLink copied to clipboard!
For short-term troubleshooting, you can configure the Open vSwitch (OVS) log level temporarily. The following procedure does not require rebooting the node. In addition, the configuration change does not persist whenever you reboot the node.
After you perform this procedure to change the log level, you can receive log messages from the machine config daemon that indicate a content mismatch for the
ovs-vswitchd.service
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
Start a debug pod for a node:
$ oc debug node/<node_name>Set
as the root directory within the debug shell. The debug pod mounts the root file system from the host in/hostwithin the pod. By changing the root directory to/host, you can run binaries from the host file system:/host# chroot /hostView the current syslog level for OVS modules:
# ovs-appctl vlog/listThe following example output shows the log level for syslog set to
.infoExample output
console syslog file ------- ------ ------ backtrace OFF INFO INFO bfd OFF INFO INFO bond OFF INFO INFO bridge OFF INFO INFO bundle OFF INFO INFO bundles OFF INFO INFO cfm OFF INFO INFO collectors OFF INFO INFO command_line OFF INFO INFO connmgr OFF INFO INFO conntrack OFF INFO INFO conntrack_tp OFF INFO INFO coverage OFF INFO INFO ct_dpif OFF INFO INFO daemon OFF INFO INFO daemon_unix OFF INFO INFO dns_resolve OFF INFO INFO dpdk OFF INFO INFO ...Specify the log level in the
file:/etc/systemd/system/ovs-vswitchd.service.d/10-ovs-vswitchd-restart.confRestart=always ExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch' ExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch' ExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch' ExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:dbg ExecReload=-/usr/bin/ovs-appctl vlog/set syslog:dbgIn the preceding example, the log level is set to
. Change the last two lines by settingdbgtosyslog:<log_level>,off,emer,err,warn, orinfo. Thedbglog level filters out all log messages.offRestart the service:
# systemctl daemon-reload# systemctl restart ovs-vswitchd
7.5.2.2. Configuring the Open vSwitch log level permanently Copy linkLink copied to clipboard!
For long-term changes to the Open vSwitch (OVS) log level, you can change the log level permanently.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
Create a file, such as
, with a99-change-ovs-loglevel.yamlobject like the following example:MachineConfigapiVersion: machineconfiguration.openshift.io/v1 kind: MachineConfig metadata: labels: machineconfiguration.openshift.io/role: master1 name: 99-change-ovs-loglevel spec: config: ignition: version: 3.2.0 systemd: units: - dropins: - contents: | [Service] ExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:dbg2 ExecReload=-/usr/bin/ovs-appctl vlog/set syslog:dbg name: 20-ovs-vswitchd-restart.conf name: ovs-vswitchd.serviceApply the machine config:
$ oc apply -f 99-change-ovs-loglevel.yaml
7.5.2.3. Displaying Open vSwitch logs Copy linkLink copied to clipboard!
Use the following procedure to display Open vSwitch (OVS) logs.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
Run one of the following commands:
Display the logs by using the
command from outside the cluster:oc$ oc adm node-logs <node_name> -u ovs-vswitchdDisplay the logs after logging on to a node in the cluster:
# journalctl -b -f -u ovs-vswitchd.serviceOne way to log on to a node is by using the
command.oc debug node/<node_name>
7.6. Troubleshooting Operator issues Copy linkLink copied to clipboard!
Operators are a method of packaging, deploying, and managing an OpenShift Container Platform application. They act like an extension of the software vendor’s engineering team, watching over an OpenShift Container Platform environment and using its current state to make decisions in real time. Operators are designed to handle upgrades seamlessly, react to failures automatically, and not take shortcuts, such as skipping a software backup process to save time.
OpenShift Container Platform 4.8 includes a default set of Operators that are required for proper functioning of the cluster. These default Operators are managed by the Cluster Version Operator (CVO).
As a cluster administrator, you can install application Operators from the OperatorHub using the OpenShift Container Platform web console or the CLI. You can then subscribe the Operator to one or more namespaces to make it available for developers on your cluster. Application Operators are managed by Operator Lifecycle Manager (OLM).
If you experience Operator issues, verify Operator subscription status. Check Operator pod health across the cluster and gather Operator logs for diagnosis.
7.6.1. Operator subscription condition types Copy linkLink copied to clipboard!
Subscriptions can report the following condition types:
| Condition | Description |
|---|---|
|
| Some or all of the catalog sources to be used in resolution are unhealthy. |
|
| An install plan for a subscription is missing. |
|
| An install plan for a subscription is pending installation. |
|
| An install plan for a subscription has failed. |
Default OpenShift Container Platform cluster Operators are managed by the Cluster Version Operator (CVO) and they do not have a
Subscription
Subscription
7.6.2. Viewing Operator subscription status by using the CLI Copy linkLink copied to clipboard!
You can view Operator subscription status by using the CLI.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
List Operator subscriptions:
$ oc get subs -n <operator_namespace>Use the
command to inspect aoc describeresource:Subscription$ oc describe sub <subscription_name> -n <operator_namespace>In the command output, find the
section for the status of Operator subscription condition types. In the following example, theConditionscondition type has a status ofCatalogSourcesUnhealthybecause all available catalog sources are healthy:falseExample output
Conditions: Last Transition Time: 2019-07-29T13:42:57Z Message: all available catalogsources are healthy Reason: AllCatalogSourcesHealthy Status: False Type: CatalogSourcesUnhealthy
Default OpenShift Container Platform cluster Operators are managed by the Cluster Version Operator (CVO) and they do not have a
Subscription
Subscription
7.6.3. Viewing Operator catalog source status by using the CLI Copy linkLink copied to clipboard!
You can view the status of an Operator catalog source by using the CLI.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
List the catalog sources in a namespace. For example, you can check the
namespace, which is used for cluster-wide catalog sources:openshift-marketplace$ oc get catalogsources -n openshift-marketplaceExample output
NAME DISPLAY TYPE PUBLISHER AGE certified-operators Certified Operators grpc Red Hat 55m community-operators Community Operators grpc Red Hat 55m example-catalog Example Catalog grpc Example Org 2m25s redhat-marketplace Red Hat Marketplace grpc Red Hat 55m redhat-operators Red Hat Operators grpc Red Hat 55mUse the
command to get more details and status about a catalog source:oc describe$ oc describe catalogsource example-catalog -n openshift-marketplaceExample output
Name: example-catalog Namespace: openshift-marketplace ... Status: Connection State: Address: example-catalog.openshift-marketplace.svc:50051 Last Connect: 2021-09-09T17:07:35Z Last Observed State: TRANSIENT_FAILURE Registry Service: Created At: 2021-09-09T17:05:45Z Port: 50051 Protocol: grpc Service Name: example-catalog Service Namespace: openshift-marketplaceIn the preceding example output, the last observed state is
. This state indicates that there is a problem establishing a connection for the catalog source.TRANSIENT_FAILUREList the pods in the namespace where your catalog source was created:
$ oc get pods -n openshift-marketplaceExample output
NAME READY STATUS RESTARTS AGE certified-operators-cv9nn 1/1 Running 0 36m community-operators-6v8lp 1/1 Running 0 36m marketplace-operator-86bfc75f9b-jkgbc 1/1 Running 0 42m example-catalog-bwt8z 0/1 ImagePullBackOff 0 3m55s redhat-marketplace-57p8c 1/1 Running 0 36m redhat-operators-smxx8 1/1 Running 0 36mWhen a catalog source is created in a namespace, a pod for the catalog source is created in that namespace. In the preceding example output, the status for the
pod isexample-catalog-bwt8z. This status indicates that there is an issue pulling the catalog source’s index image.ImagePullBackOffUse the
command to inspect a pod for more detailed information:oc describe$ oc describe pod example-catalog-bwt8z -n openshift-marketplaceExample output
Name: example-catalog-bwt8z Namespace: openshift-marketplace Priority: 0 Node: ci-ln-jyryyg2-f76d1-ggdbq-worker-b-vsxjd/10.0.128.2 ... Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal Scheduled 48s default-scheduler Successfully assigned openshift-marketplace/example-catalog-bwt8z to ci-ln-jyryyf2-f76d1-fgdbq-worker-b-vsxjd Normal AddedInterface 47s multus Add eth0 [10.131.0.40/23] from openshift-sdn Normal BackOff 20s (x2 over 46s) kubelet Back-off pulling image "quay.io/example-org/example-catalog:v1" Warning Failed 20s (x2 over 46s) kubelet Error: ImagePullBackOff Normal Pulling 8s (x3 over 47s) kubelet Pulling image "quay.io/example-org/example-catalog:v1" Warning Failed 8s (x3 over 47s) kubelet Failed to pull image "quay.io/example-org/example-catalog:v1": rpc error: code = Unknown desc = reading manifest v1 in quay.io/example-org/example-catalog: unauthorized: access to the requested resource is not authorized Warning Failed 8s (x3 over 47s) kubelet Error: ErrImagePullIn the preceding example output, the error messages indicate that the catalog source’s index image is failing to pull successfully because of an authorization issue. For example, the index image might be stored in a registry that requires login credentials.
7.6.4. Querying Operator pod status Copy linkLink copied to clipboard!
You can list Operator pods within a cluster and their status. You can also collect a detailed Operator pod summary.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc
Procedure
List Operators running in the cluster. The output includes Operator version, availability, and up-time information:
$ oc get clusteroperatorsList Operator pods running in the Operator’s namespace, plus pod status, restarts, and age:
$ oc get pod -n <operator_namespace>Output a detailed Operator pod summary:
$ oc describe pod <operator_pod_name> -n <operator_namespace>If an Operator issue is node-specific, query Operator container status on that node.
Start a debug pod for the node:
$ oc debug node/my-nodeSet
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,
operations will be impacted. In such situations, it is possible to access nodes usingocinstead.ssh core@<node>.<cluster_name>.<base_domain>List details about the node’s containers, including state and associated pod IDs:
# crictl psList information about a specific Operator container on the node. The following example lists information about the
container:network-operator# crictl ps --name network-operator- Exit from the debug shell.
7.6.5. Gathering Operator logs Copy linkLink copied to clipboard!
If you experience Operator issues, you can gather detailed diagnostic information from Operator pod logs.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc - You have the fully qualified domain names of the control plane, or control plane machines (also known as the master machines).
Procedure
List the Operator pods that are running in the Operator’s namespace, plus the pod status, restarts, and age:
$ oc get pods -n <operator_namespace>Review logs for an Operator pod:
$ oc logs pod/<pod_name> -n <operator_namespace>If an Operator pod has multiple containers, the preceding command will produce an error that includes the name of each container. Query logs from an individual container:
$ oc logs pod/<operator_pod_name> -c <container_name> -n <operator_namespace>If the API is not functional, review Operator pod and container logs on each control plane node by using SSH instead. Replace
with appropriate values.<master-node>.<cluster_name>.<base_domain>List pods on each control plane node:
$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl podsFor any Operator pods not showing a
status, inspect the pod’s status in detail. ReplaceReadywith the Operator pod’s ID listed in the output of the preceding command:<operator_pod_id>$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl inspectp <operator_pod_id>List containers related to an Operator pod:
$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl ps --pod=<operator_pod_id>For any Operator container not showing a
status, inspect the container’s status in detail. ReplaceReadywith a container ID listed in the output of the preceding command:<container_id>$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl inspect <container_id>Review the logs for any Operator containers not showing a
status. ReplaceReadywith a container ID listed in the output of the preceding command:<container_id>$ ssh core@<master-node>.<cluster_name>.<base_domain> sudo crictl logs -f <container_id>NoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. Before attempting to collect diagnostic data over SSH, review whether the data collected by running
and otheroc adm must gathercommands is sufficient instead. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,ocoperations will be impacted. In such situations, it is possible to access nodes usingoc.ssh core@<node>.<cluster_name>.<base_domain>
7.6.6. Disabling the Machine Config Operator from automatically rebooting Copy linkLink copied to clipboard!
When configuration changes are made by the Machine Config Operator (MCO), Red Hat Enterprise Linux CoreOS (RHCOS) must reboot for the changes to take effect. Whether the configuration change is automatic or manual, an RHCOS node reboots automatically unless it is paused.
The following modifications do not trigger a node reboot:
When the MCO detects any of the following changes, it applies the update without draining or rebooting the node:
-
Changes to the SSH key in the parameter of a machine config.
spec.config.passwd.users.sshAuthorizedKeys -
Changes to the global pull secret or pull secret in the namespace.
openshift-config -
Automatic rotation of the certificate authority (CA) by the Kubernetes API Server Operator.
/etc/kubernetes/kubelet-ca.crt
-
Changes to the SSH key in the
When the MCO detects changes to the
file, such as adding or editing an/etc/containers/registries.conforImageDigestMirrorSetobject, it drains the corresponding nodes, applies the changes, and uncordons the nodes.The node drain does not happen for the following changes:ImageTagMirrorSet-
The addition of a registry with the parameter set for each mirror.
pull-from-mirror = "digest-only" -
The addition of a mirror with the parameter set in a registry.
pull-from-mirror = "digest-only" -
The addition of items to the list.
unqualified-search-registries
-
The addition of a registry with the
To avoid unwanted disruptions, you can modify the machine config pool (MCP) to prevent automatic rebooting after the Operator makes changes to the machine config.
Pausing an MCP prevents the MCO from applying any configuration changes on the associated nodes. Pausing an MCP also prevents any automatically-rotated certificates from being pushed to the associated nodes, including the automatic rotation of the
kube-apiserver-to-kubelet-signer
kube-apiserver-to-kubelet-signer
oc
oc debug
oc logs
oc exec
oc attach
kube-apiserver-to-kubelet-signer
New CA certificates are generated at 292 days from the installation date and removed at 365 days from that date. To determine the next automatic CA certificate rotation, see the Understand CA cert auto renewal in Red Hat OpenShift 4.
7.6.6.1. Disabling the Machine Config Operator from automatically rebooting by using the console Copy linkLink copied to clipboard!
To avoid unwanted disruptions from changes made by the Machine Config Operator (MCO), you can use the OpenShift Container Platform web console to modify the machine config pool (MCP) to prevent the MCO from making any changes to nodes in that pool. This prevents any reboots that would normally be part of the MCO update process.
Pausing an MCP prevents the MCO from applying any configuration changes on the associated nodes. Pausing an MCP also prevents any automatically-rotated certificates from being pushed to the associated nodes, including the automatic rotation of the
kube-apiserver-to-kubelet-signer
kube-apiserver-to-kubelet-signer
oc
oc debug
oc logs
oc exec
oc attach
kube-apiserver-to-kubelet-signer
New CA certificates are generated at 292 days from the installation date and removed at 365 days from that date. To determine the next automatic CA certificate rotation, see the Understand CA cert auto renewal in Red Hat OpenShift 4.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin
Procedure
To pause or unpause automatic MCO update rebooting:
Pause the autoreboot process:
-
Log in to the OpenShift Container Platform web console as a user with the role.
cluster-admin - Click Compute → MachineConfigPools.
- On the MachineConfigPools page, click either master or worker, depending upon which nodes you want to pause rebooting for.
- On the master or worker page, click YAML.
In the YAML, update the
field tospec.paused.trueSample MachineConfigPool object
apiVersion: machineconfiguration.openshift.io/v1 kind: MachineConfigPool ... spec: ... paused: true1 - 1
- Update the
spec.pausedfield totrueto pause rebooting.
To verify that the MCP is paused, return to the MachineConfigPools page.
On the MachineConfigPools page, the Paused column reports True for the MCP you modified.
If the MCP has pending changes while paused, the Updated column is False and Updating is False. When Updated is True and Updating is False, there are no pending changes.
ImportantIf there are pending changes (where both the Updated and Updating columns are False), it is recommended to schedule a maintenance window for a reboot as early as possible. Use the following steps for unpausing the autoreboot process to apply the changes that were queued since the last reboot.
-
Log in to the OpenShift Container Platform web console as a user with the
Unpause the autoreboot process:
-
Log in to the OpenShift Container Platform web console as a user with the role.
cluster-admin - Click Compute → MachineConfigPools.
- On the MachineConfigPools page, click either master or worker, depending upon which nodes you want to pause rebooting for.
- On the master or worker page, click YAML.
In the YAML, update the
field tospec.paused.falseSample MachineConfigPool object
apiVersion: machineconfiguration.openshift.io/v1 kind: MachineConfigPool ... spec: ... paused: false1 - 1
- Update the
spec.pausedfield tofalseto allow rebooting.
NoteBy unpausing an MCP, the MCO applies all paused changes reboots Red Hat Enterprise Linux CoreOS (RHCOS) as needed.
To verify that the MCP is paused, return to the MachineConfigPools page.
On the MachineConfigPools page, the Paused column reports False for the MCP you modified.
If the MCP is applying any pending changes, the Updated column is False and the Updating column is True. When Updated is True and Updating is False, there are no further changes being made.
-
Log in to the OpenShift Container Platform web console as a user with the
7.6.6.2. Disabling the Machine Config Operator from automatically rebooting by using the CLI Copy linkLink copied to clipboard!
To avoid unwanted disruptions from changes made by the Machine Config Operator (MCO), you can modify the machine config pool (MCP) using the OpenShift CLI (oc) to prevent the MCO from making any changes to nodes in that pool. This prevents any reboots that would normally be part of the MCO update process.
Pausing an MCP prevents the MCO from applying any configuration changes on the associated nodes. Pausing an MCP also prevents any automatically-rotated certificates from being pushed to the associated nodes, including the automatic rotation of the
kube-apiserver-to-kubelet-signer
kube-apiserver-to-kubelet-signer
oc
oc debug
oc logs
oc exec
oc attach
kube-apiserver-to-kubelet-signer
New CA certificates are generated at 292 days from the installation date and removed at 365 days from that date. To determine the next automatic CA certificate rotation, see the Understand CA cert auto renewal in Red Hat OpenShift 4.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
To pause or unpause automatic MCO update rebooting:
Pause the autoreboot process:
Update the
custom resource to set theMachineConfigPoolfield tospec.paused.trueControl plane (master) nodes
$ oc patch --type=merge --patch='{"spec":{"paused":true}}' machineconfigpool/masterWorker nodes
$ oc patch --type=merge --patch='{"spec":{"paused":true}}' machineconfigpool/workerVerify that the MCP is paused:
Control plane (master) nodes
$ oc get machineconfigpool/master --template='{{.spec.paused}}'Worker nodes
$ oc get machineconfigpool/worker --template='{{.spec.paused}}'Example output
trueThe
field isspec.pausedand the MCP is paused.trueDetermine if the MCP has pending changes:
# oc get machineconfigpoolExample output
NAME CONFIG UPDATED UPDATING master rendered-master-33cf0a1254318755d7b48002c597bf91 True False worker rendered-worker-e405a5bdb0db1295acea08bcca33fa60 False FalseIf the UPDATED column is False and UPDATING is False, there are pending changes. When UPDATED is True and UPDATING is False, there are no pending changes. In the previous example, the worker node has pending changes. The control plane node (also known as the master node) does not have any pending changes.
ImportantIf there are pending changes (where both the Updated and Updating columns are False), it is recommended to schedule a maintenance window for a reboot as early as possible. Use the following steps for unpausing the autoreboot process to apply the changes that were queued since the last reboot.
Unpause the autoreboot process:
Update the
custom resource to set theMachineConfigPoolfield tospec.paused.falseControl plane (master) nodes
$ oc patch --type=merge --patch='{"spec":{"paused":false}}' machineconfigpool/masterWorker nodes
$ oc patch --type=merge --patch='{"spec":{"paused":false}}' machineconfigpool/workerNoteBy unpausing an MCP, the MCO applies all paused changes and reboots Red Hat Enterprise Linux CoreOS (RHCOS) as needed.
Verify that the MCP is unpaused:
Control plane (master) nodes
$ oc get machineconfigpool/master --template='{{.spec.paused}}'Worker nodes
$ oc get machineconfigpool/worker --template='{{.spec.paused}}'Example output
falseThe
field isspec.pausedand the MCP is unpaused.falseDetermine if the MCP has pending changes:
$ oc get machineconfigpoolExample output
NAME CONFIG UPDATED UPDATING master rendered-master-546383f80705bd5aeaba93 True False worker rendered-worker-b4c51bb33ccaae6fc4a6a5 False TrueIf the MCP is applying any pending changes, the UPDATED column is False and the UPDATING column is True. When UPDATED is True and UPDATING is False, there are no further changes being made. In the previous example, the MCO is updating the worker node.
7.6.7. Refreshing failing subscriptions Copy linkLink copied to clipboard!
In Operator Lifecycle Manager (OLM), if you subscribe to an Operator that references images that are not accessible on your network, you can find jobs in the
openshift-marketplace
Example output
ImagePullBackOff for
Back-off pulling image "example.com/openshift4/ose-elasticsearch-operator-bundle@sha256:6d2587129c846ec28d384540322b40b05833e7e00b25cca584e004af9a1d292e"
Example output
rpc error: code = Unknown desc = error pinging docker registry example.com: Get "https://example.com/v2/": dial tcp: lookup example.com on 10.0.0.1:53: no such host
As a result, the subscription is stuck in this failing state and the Operator is unable to install or upgrade.
You can refresh a failing subscription by deleting the subscription, cluster service version (CSV), and other related objects. After recreating the subscription, OLM then reinstalls the correct version of the Operator.
Prerequisites
- You have a failing subscription that is unable to pull an inaccessible bundle image.
- You have confirmed that the correct bundle image is accessible.
Procedure
Get the names of the
andSubscriptionobjects from the namespace where the Operator is installed:ClusterServiceVersion$ oc get sub,csv -n <namespace>Example output
NAME PACKAGE SOURCE CHANNEL subscription.operators.coreos.com/elasticsearch-operator elasticsearch-operator redhat-operators 5.0 NAME DISPLAY VERSION REPLACES PHASE clusterserviceversion.operators.coreos.com/elasticsearch-operator.5.0.0-65 OpenShift Elasticsearch Operator 5.0.0-65 SucceededDelete the subscription:
$ oc delete subscription <subscription_name> -n <namespace>Delete the cluster service version:
$ oc delete csv <csv_name> -n <namespace>Get the names of any failing jobs and related config maps in the
namespace:openshift-marketplace$ oc get job,configmap -n openshift-marketplaceExample output
NAME COMPLETIONS DURATION AGE job.batch/1de9443b6324e629ddf31fed0a853a121275806170e34c926d69e53a7fcbccb 1/1 26s 9m30s NAME DATA AGE configmap/1de9443b6324e629ddf31fed0a853a121275806170e34c926d69e53a7fcbccb 3 9m30sDelete the job:
$ oc delete job <job_name> -n openshift-marketplaceThis ensures pods that try to pull the inaccessible image are not recreated.
Delete the config map:
$ oc delete configmap <configmap_name> -n openshift-marketplace- Reinstall the Operator using OperatorHub in the web console.
Verification
Check that the Operator has been reinstalled successfully:
$ oc get sub,csv,installplan -n <namespace>
7.7. Investigating pod issues Copy linkLink copied to clipboard!
OpenShift Container Platform leverages the Kubernetes concept of a pod, which is one or more containers deployed together on one host. A pod is the smallest compute unit that can be defined, deployed, and managed on OpenShift Container Platform 4.8.
After a pod is defined, it is assigned to run on a node until its containers exit, or until it is removed. Depending on policy and exit code, Pods are either removed after exiting or retained so that their logs can be accessed.
The first thing to check when pod issues arise is the pod’s status. If an explicit pod failure has occurred, observe the pod’s error state to identify specific image, container, or pod network issues. Focus diagnostic data collection according to the error state. Review pod event messages, as well as pod and container log information. Diagnose issues dynamically by accessing running Pods on the command line, or start a debug pod with root access based on a problematic pod’s deployment configuration.
7.7.1. Understanding pod error states Copy linkLink copied to clipboard!
Pod failures return explicit error states that can be observed in the
status
oc get pods
The following table provides a list of pod error states along with their descriptions.
| Pod error state | Description |
|---|---|
|
| Generic image retrieval error. |
|
| Image retrieval failed and is backed off. |
|
| The specified image name was invalid. |
|
| Image inspection did not succeed. |
|
|
|
|
| When attempting to retrieve an image from a registry, an HTTP error was encountered. |
|
| The specified container is either not present or not managed by the kubelet, within the declared pod. |
|
| Container initialization failed. |
|
| None of the pod’s containers started successfully. |
|
| None of the pod’s containers were killed successfully. |
|
| A container has terminated. The kubelet will not attempt to restart it. |
|
| A container or image attempted to run with root privileges. |
|
| Pod sandbox creation did not succeed. |
|
| Pod sandbox configuration was not obtained. |
|
| A pod sandbox did not stop successfully. |
|
| Network initialization failed. |
|
| Network termination failed. |
7.7.2. Reviewing pod status Copy linkLink copied to clipboard!
You can query pod status and error states. You can also query a pod’s associated deployment configuration and review base image availability.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc -
is installed.
skopeo
Procedure
Switch into a project:
$ oc project <project_name>List pods running within the namespace, as well as pod status, error states, restarts, and age:
$ oc get podsDetermine whether the namespace is managed by a deployment configuration:
$ oc statusIf the namespace is managed by a deployment configuration, the output includes the deployment configuration name and a base image reference.
Inspect the base image referenced in the preceding command’s output:
$ skopeo inspect docker://<image_reference>If the base image reference is not correct, update the reference in the deployment configuration:
$ oc edit deployment/my-deploymentWhen deployment configuration changes on exit, the configuration will automatically redeploy. Watch pod status as the deployment progresses, to determine whether the issue has been resolved:
$ oc get pods -wReview events within the namespace for diagnostic information relating to pod failures:
$ oc get events
7.7.3. Inspecting pod and container logs Copy linkLink copied to clipboard!
You can inspect pod and container logs for warnings and error messages related to explicit pod failures. Depending on policy and exit code, pod and container logs remain available after pods have been terminated.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc
Procedure
Query logs for a specific pod:
$ oc logs <pod_name>Query logs for a specific container within a pod:
$ oc logs <pod_name> -c <container_name>Logs retrieved using the preceding
commands are composed of messages sent to stdout within pods or containers.oc logsInspect logs contained in
within a pod./var/log/List log files and subdirectories contained in
within a pod:/var/log$ oc exec <pod_name> ls -alh /var/logQuery a specific log file contained in
within a pod:/var/log$ oc exec <pod_name> cat /var/log/<path_to_log>List log files and subdirectories contained in
within a specific container:/var/log$ oc exec <pod_name> -c <container_name> ls /var/logQuery a specific log file contained in
within a specific container:/var/log$ oc exec <pod_name> -c <container_name> cat /var/log/<path_to_log>
7.7.4. Accessing running pods Copy linkLink copied to clipboard!
You can review running pods dynamically by opening a shell inside a pod or by gaining network access through port forwarding.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc
Procedure
Switch into the project that contains the pod you would like to access. This is necessary because the
command does not accept theoc rshnamespace option:-n$ oc project <namespace>Start a remote shell into a pod:
$ oc rsh <pod_name>1 - 1
- If a pod has multiple containers,
oc rshdefaults to the first container unless-c <container_name>is specified.
Start a remote shell into a specific container within a pod:
$ oc rsh -c <container_name> pod/<pod_name>Create a port forwarding session to a port on a pod:
$ oc port-forward <pod_name> <host_port>:<pod_port>1 - 1
- Enter
Ctrl+Cto cancel the port forwarding session.
7.7.5. Starting debug pods with root access Copy linkLink copied to clipboard!
You can start a debug pod with root access, based on a problematic pod’s deployment or deployment configuration. Pod users typically run with non-root privileges, but running troubleshooting pods with temporary root privileges can be useful during issue investigation.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc
Procedure
Start a debug pod with root access, based on a deployment.
Obtain a project’s deployment name:
$ oc get deployment -n <project_name>Start a debug pod with root privileges, based on the deployment:
$ oc debug deployment/my-deployment --as-root -n <project_name>
Start a debug pod with root access, based on a deployment configuration.
Obtain a project’s deployment configuration name:
$ oc get deploymentconfigs -n <project_name>Start a debug pod with root privileges, based on the deployment configuration:
$ oc debug deploymentconfig/my-deployment-configuration --as-root -n <project_name>
You can append
-- <command>
oc debug
7.7.6. Copying files to and from pods and containers Copy linkLink copied to clipboard!
You can copy files to and from a pod to test configuration changes or gather diagnostic information.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc
Procedure
Copy a file to a pod:
$ oc cp <local_path> <pod_name>:/<path> -c <container_name>1 - 1
- The first container in a pod is selected if the
-coption is not specified.
Copy a file from a pod:
$ oc cp <pod_name>:/<path> -c <container_name><local_path>1 - 1
- The first container in a pod is selected if the
-coption is not specified.
NoteFor
to function, theoc cpbinary must be available within the container.tar
7.8. Troubleshooting the Source-to-Image process Copy linkLink copied to clipboard!
7.8.1. Strategies for Source-to-Image troubleshooting Copy linkLink copied to clipboard!
Use Source-to-Image (S2I) to build reproducible, Docker-formatted container images. You can create ready-to-run images by injecting application source code into a container image and assembling a new image. The new image incorporates the base image (the builder) and built source.
To determine where in the S2I process a failure occurs, you can observe the state of the pods relating to each of the following S2I stages:
- During the build configuration stage, a build pod is used to create an application container image from a base image and application source code.
- During the deployment configuration stage, a deployment pod is used to deploy application pods from the application container image that was built in the build configuration stage. The deployment pod also deploys other resources such as services and routes. The deployment configuration begins after the build configuration succeeds.
-
After the deployment pod has started the application pods, application failures can occur within the running application pods. For instance, an application might not behave as expected even though the application pods are in a state. In this scenario, you can access running application pods to investigate application failures within a pod.
Running
When troubleshooting S2I issues, follow this strategy:
- Monitor build, deployment, and application pod status
- Determine the stage of the S2I process where the problem occurred
- Review logs corresponding to the failed stage
7.8.2. Gathering Source-to-Image diagnostic data Copy linkLink copied to clipboard!
The S2I tool runs a build pod and a deployment pod in sequence. The deployment pod is responsible for deploying the application pods based on the application container image created in the build stage. Watch build, deployment and application pod status to determine where in the S2I process a failure occurs. Then, focus diagnostic data collection accordingly.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - Your API service is still functional.
-
You have installed the OpenShift CLI ().
oc
Procedure
Watch the pod status throughout the S2I process to determine at which stage a failure occurs:
$ oc get pods -w1 - 1
- Use
-wto monitor pods for changes until you quit the command usingCtrl+C.
Review a failed pod’s logs for errors.
If the build pod fails, review the build pod’s logs:
$ oc logs -f pod/<application_name>-<build_number>-buildNoteAlternatively, you can review the build configuration’s logs using
. The build configuration’s logs include the logs from the build pod.oc logs -f bc/<application_name>If the deployment pod fails, review the deployment pod’s logs:
$ oc logs -f pod/<application_name>-<build_number>-deployNoteAlternatively, you can review the deployment configuration’s logs using
. This outputs logs from the deployment pod until the deployment pod completes successfully. The command outputs logs from the application pods if you run it after the deployment pod has completed. After a deployment pod completes, its logs can still be accessed by runningoc logs -f dc/<application_name>.oc logs -f pod/<application_name>-<build_number>-deployIf an application pod fails, or if an application is not behaving as expected within a running application pod, review the application pod’s logs:
$ oc logs -f pod/<application_name>-<build_number>-<random_string>
7.8.3. Gathering application diagnostic data to investigate application failures Copy linkLink copied to clipboard!
Application failures can occur within running application pods. In these situations, you can retrieve diagnostic information with these strategies:
- Review events relating to the application pods.
- Review the logs from the application pods, including application-specific log files that are not collected by the OpenShift Logging framework.
- Test application functionality interactively and run diagnostic tools in an application container.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
List events relating to a specific application pod. The following example retrieves events for an application pod named
:my-app-1-akdlg$ oc describe pod/my-app-1-akdlgReview logs from an application pod:
$ oc logs -f pod/my-app-1-akdlgQuery specific logs within a running application pod. Logs that are sent to stdout are collected by the OpenShift Logging framework and are included in the output of the preceding command. The following query is only required for logs that are not sent to stdout.
If an application log can be accessed without root privileges within a pod, concatenate the log file as follows:
$ oc exec my-app-1-akdlg -- cat /var/log/my-application.logIf root access is required to view an application log, you can start a debug container with root privileges and then view the log file from within the container. Start the debug container from the project’s
object. Pod users typically run with non-root privileges, but running troubleshooting pods with temporary root privileges can be useful during issue investigation:DeploymentConfig$ oc debug dc/my-deployment-configuration --as-root -- cat /var/log/my-application.logNoteYou can access an interactive shell with root access within the debug pod if you run
without appendingoc debug dc/<deployment_configuration> --as-root.-- <command>
Test application functionality interactively and run diagnostic tools, in an application container with an interactive shell.
Start an interactive shell on the application container:
$ oc exec -it my-app-1-akdlg /bin/bash- Test application functionality interactively from within the shell. For example, you can run the container’s entry point command and observe the results. Then, test changes from the command line directly, before updating the source code and rebuilding the application container through the S2I process.
Run diagnostic binaries available within the container.
NoteRoot privileges are required to run some diagnostic binaries. In these situations you can start a debug pod with root access, based on a problematic pod’s
object, by runningDeploymentConfig. Then, you can run diagnostic binaries as root from within the debug pod.oc debug dc/<deployment_configuration> --as-root
If diagnostic binaries are not available within a container, you can run a host’s diagnostic binaries within a container’s namespace by using
. The following example runsnsenterwithin a container’s namespace, using the host`sip adbinary.ipEnter into a debug session on the target node. This step instantiates a debug pod called
:<node_name>-debug$ oc debug node/my-cluster-nodeSet
as the root directory within the debug shell. The debug pod mounts the host’s root file system in/hostwithin the pod. By changing the root directory to/host, you can run binaries contained in the host’s executable paths:/host# chroot /hostNoteOpenShift Container Platform 4.8 cluster nodes running Red Hat Enterprise Linux CoreOS (RHCOS) are immutable and rely on Operators to apply cluster changes. Accessing cluster nodes using SSH is not recommended and nodes will be tainted as accessed. However, if the OpenShift Container Platform API is not available, or the kubelet is not properly functioning on the target node,
operations will be impacted. In such situations, it is possible to access nodes usingocinstead.ssh core@<node>.<cluster_name>.<base_domain>Determine the target container ID:
# crictl psDetermine the container’s process ID. In this example, the target container ID is
:a7fe32346b120# crictl inspect a7fe32346b120 --output yaml | grep 'pid:' | awk '{print $2}'Run
within the container’s namespace, using the host’sip adbinary. This example usesipas the container’s process ID. The31150command enters the namespace of a target process and runs a command in its namespace. Because the target process in this example is a container’s process ID, thensentercommand is run in the container’s namespace from the host:ip ad# nsenter -n -t 31150 -- ip adNoteRunning a host’s diagnostic binaries within a container’s namespace is only possible if you are using a privileged container such as a debug node.
7.9. Troubleshooting storage issues Copy linkLink copied to clipboard!
7.9.1. Resolving multi-attach errors Copy linkLink copied to clipboard!
When a node crashes or shuts down abruptly, the attached ReadWriteOnce (RWO) volume is expected to be unmounted from the node so that it can be used by a pod scheduled on another node.
However, mounting on a new node is not possible because the failed node is unable to unmount the attached volume.
A multi-attach error is reported:
Example output
Unable to attach or mount volumes: unmounted volumes=[sso-mysql-pvol], unattached volumes=[sso-mysql-pvol default-token-x4rzc]: timed out waiting for the condition
Multi-Attach error for volume "pvc-8837384d-69d7-40b2-b2e6-5df86943eef9" Volume is already used by pod(s) sso-mysql-1-ns6b4
Procedure
To resolve the multi-attach issue, use one of the following solutions:
Enable multiple attachments by using RWX volumes.
For most storage solutions, you can use ReadWriteMany (RWX) volumes to prevent multi-attach errors.
Recover or delete the failed node when using an RWO volume.
For storage that does not support RWX, such as VMware vSphere, RWO volumes must be used instead. However, RWO volumes cannot be mounted on multiple nodes.
If you encounter a multi-attach error message with an RWO volume, force delete the pod on a shutdown or crashed node to avoid data loss in critical workloads, such as when dynamic persistent volumes are attached.
$ oc delete pod <old_pod> --force=true --grace-period=0This command deletes the volumes stuck on shutdown or crashed nodes after six minutes.
7.10. Troubleshooting Windows container workload issues Copy linkLink copied to clipboard!
7.10.1. Windows Machine Config Operator does not install Copy linkLink copied to clipboard!
If you have completed the process of installing the Windows Machine Config Operator (WMCO), but the Operator is stuck in the
InstallWaiting
The WMCO requires your OpenShift Container Platform cluster to be configured with hybrid networking using OVN-Kubernetes; the WMCO cannot complete the installation process without hybrid networking available. This is necessary to manage nodes on multiple operating systems (OS) and OS variants. This must be completed during the installation of your cluster.
For more information, see Configuring hybrid networking.
7.10.2. Investigating why Windows Machine does not become compute node Copy linkLink copied to clipboard!
There are various reasons why a Windows Machine does not become a compute node. The best way to investigate this problem is to collect the Windows Machine Config Operator (WMCO) logs.
Prerequisites
- You installed the Windows Machine Config Operator (WMCO) using Operator Lifecycle Manager (OLM).
- You have created a Windows machine set.
Procedure
Run the following command to collect the WMCO logs:
$ oc logs -f deployment/windows-machine-config-operator -n openshift-windows-machine-config-operator
7.10.3. Accessing a Windows node Copy linkLink copied to clipboard!
Windows nodes cannot be accessed using the
oc debug node
7.10.3.1. Accessing a Windows node using SSH Copy linkLink copied to clipboard!
You can access a Windows node by using a secure shell (SSH).
Prerequisites
- You have installed the Windows Machine Config Operator (WMCO) using Operator Lifecycle Manager (OLM).
- You have created a Windows machine set.
-
You have added the key used in the secret and the key used when creating the cluster to the ssh-agent. For security reasons, remember to remove the keys from the ssh-agent after use.
cloud-private-key -
You have connected to the Windows node using an
ssh-bastionpod.
Procedure
Access the Windows node by running the following command:
$ ssh -t -o StrictHostKeyChecking=no -o ProxyCommand='ssh -A -o StrictHostKeyChecking=no \ -o ServerAliveInterval=30 -W %h:%p core@$(oc get service --all-namespaces -l run=ssh-bastion \ -o go-template="{{ with (index (index .items 0).status.loadBalancer.ingress 0) }}{{ or .hostname .ip }}{{end}}")' <username>@<windows_node_internal_ip>1 2 $ oc get nodes <node_name> -o jsonpath={.status.addresses[?\(@.type==\"InternalIP\"\)].address}
7.10.3.2. Accessing a Windows node using RDP Copy linkLink copied to clipboard!
You can access a Windows node by using a Remote Desktop Protocol (RDP).
Prerequisites
- You installed the Windows Machine Config Operator (WMCO) using Operator Lifecycle Manager (OLM).
- You have created a Windows machine set.
-
You have added the key used in the secret and the key used when creating the cluster to the ssh-agent. For security reasons, remember to remove the keys from the ssh-agent after use.
cloud-private-key -
You have connected to the Windows node using an
ssh-bastionpod.
Procedure
Run the following command to set up an SSH tunnel:
$ ssh -L 2020:<windows_node_internal_ip>:3389 \1 core@$(oc get service --all-namespaces -l run=ssh-bastion -o go-template="{{ with (index (index .items 0).status.loadBalancer.ingress 0) }}{{ or .hostname .ip }}{{end}}")- 1
- Specify the internal IP address of the node, which can be discovered by running the following command:
$ oc get nodes <node_name> -o jsonpath={.status.addresses[?\(@.type==\"InternalIP\"\)].address}From within the resulting shell, SSH into the Windows node and run the following command to create a password for the user:
C:\> net user <username> *1 - 1
- Specify the cloud provider user name, such as
Administratorfor AWS orcapifor Azure.
You can now remotely access the Windows node at
localhost:2020
7.10.4. Collecting Kubernetes node logs for Windows containers Copy linkLink copied to clipboard!
Windows container logging works differently from Linux container logging; the Kubernetes node logs for Windows workloads are streamed to the
C:\var\logs
Prerequisites
- You installed the Windows Machine Config Operator (WMCO) using Operator Lifecycle Manager (OLM).
- You have created a Windows machine set.
Procedure
To view the logs under all directories in
, run the following command:C:\var\logs$ oc adm node-logs -l kubernetes.io/os=windows --path= \ /ip-10-0-138-252.us-east-2.compute.internal containers \ /ip-10-0-138-252.us-east-2.compute.internal hybrid-overlay \ /ip-10-0-138-252.us-east-2.compute.internal kube-proxy \ /ip-10-0-138-252.us-east-2.compute.internal kubelet \ /ip-10-0-138-252.us-east-2.compute.internal podsYou can now list files in the directories using the same command and view the individual log files. For example, to view the kubelet logs, run the following command:
$ oc adm node-logs -l kubernetes.io/os=windows --path=/kubelet/kubelet.log
7.10.5. Collecting Windows application event logs Copy linkLink copied to clipboard!
The
Get-WinEvent
logs
Prerequisites
- You installed the Windows Machine Config Operator (WMCO) using Operator Lifecycle Manager (OLM).
- You have created a Windows machine set.
Procedure
To view logs from all applications logging to the event logs on the Windows machine, run:
$ oc adm node-logs -l kubernetes.io/os=windows --path=journalThe same command is executed when collecting logs with
.oc adm must-gatherOther Windows application logs from the event log can also be collected by specifying the respective service with a
flag. For example, you can run the following command to collect logs for the docker runtime service:-u$ oc adm node-logs -l kubernetes.io/os=windows --path=journal -u docker
7.10.6. Collecting Docker logs for Windows containers Copy linkLink copied to clipboard!
The Windows Docker service does not stream its logs to stdout, but instead, logs to the event log for Windows. You can view the Docker event logs to investigate issues you think might be caused by the Windows Docker service.
Prerequisites
- You installed the Windows Machine Config Operator (WMCO) using Operator Lifecycle Manager (OLM).
- You have created a Windows machine set.
Procedure
SSH into the Windows node and enter PowerShell:
C:\> powershellView the Docker logs by running the following command:
C:\> Get-EventLog -LogName Application -Source Docker
7.11. Investigating monitoring issues Copy linkLink copied to clipboard!
OpenShift Container Platform includes a pre-configured, pre-installed, and self-updating monitoring stack that provides monitoring for core platform components. In OpenShift Container Platform 4.8, cluster administrators can optionally enable monitoring for user-defined projects.
You can follow these procedures if your own metrics are unavailable or if Prometheus is consuming a lot of disk space.
7.11.2. Determining why Prometheus is consuming a lot of disk space Copy linkLink copied to clipboard!
Developers can create labels to define attributes for metrics in the form of key-value pairs. The number of potential key-value pairs corresponds to the number of possible values for an attribute. An attribute that has an unlimited number of potential values is called an unbound attribute. For example, a
customer_id
Every assigned key-value pair has a unique time series. The use of many unbound attributes in labels can result in an exponential increase in the number of time series created. This can impact Prometheus performance and can consume a lot of disk space.
You can use the following measures when Prometheus consumes a lot of disk:
- Check the number of scrape samples that are being collected.
- Check the time series database (TSDB) status in the Prometheus UI for more information on which labels are creating the most time series. This requires cluster administrator privileges.
Reduce the number of unique time series that are created by reducing the number of unbound attributes that are assigned to user-defined metrics.
NoteUsing attributes that are bound to a limited set of possible values reduces the number of potential key-value pair combinations.
- Enforce limits on the number of samples that can be scraped across user-defined projects. This requires cluster administrator privileges.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin -
You have installed the OpenShift CLI ().
oc
Procedure
- In the Administrator perspective, navigate to Monitoring → Metrics.
Run the following Prometheus Query Language (PromQL) query in the Expression field. This returns the ten metrics that have the highest number of scrape samples:
topk(10,count by (job)({__name__=~".+"}))Investigate the number of unbound label values assigned to metrics with higher than expected scrape sample counts.
- If the metrics relate to a user-defined project, review the metrics key-value pairs assigned to your workload. These are implemented through Prometheus client libraries at the application level. Try to limit the number of unbound attributes referenced in your labels.
- If the metrics relate to a core OpenShift Container Platform project, create a Red Hat support case on the Red Hat Customer Portal.
Check the TSDB status in the Prometheus UI.
- In the Administrator perspective, navigate to Networking → Routes.
-
Select the project in the Project list.
openshift-monitoring -
Select the URL in the row to open the login page for the Prometheus UI.
prometheus-k8s - Choose Log in with OpenShift to log in using your OpenShift Container Platform credentials.
- In the Prometheus UI, navigate to Status → TSDB Status.
7.12. Diagnosing OpenShift CLI (oc) issues Copy linkLink copied to clipboard!
7.12.1. Understanding OpenShift CLI (oc) log levels Copy linkLink copied to clipboard!
With the OpenShift CLI (
oc
If
oc
oc
curl
oc
oc
oc
| Log level | Description |
|---|---|
| 1 to 5 | No additional logging to stderr. |
| 6 | Log API requests to stderr. |
| 7 | Log API requests and headers to stderr. |
| 8 | Log API requests, headers, and body, plus API response headers and body to stderr. |
| 9 | Log API requests, headers, and body, API response headers and body, plus
|
| 10 | Log API requests, headers, and body, API response headers and body, plus
|
7.12.2. Specifying OpenShift CLI (oc) log levels Copy linkLink copied to clipboard!
You can investigate OpenShift CLI (
oc
Prerequisites
-
Install the OpenShift CLI ().
oc
Procedure
Specify the
log level when running anoccommand:oc$ oc <options> --loglevel <log_level>The OpenShift Container Platform user’s current session token is typically included in logged
requests where required. You can also obtain the current user’s session token manually, for use when testing aspects of ancurlcommand’s underlying process step by step:oc$ oc whoami -t
Legal Notice
Copy linkLink copied to clipboard!
Copyright © Red Hat
OpenShift documentation is licensed under the Apache License 2.0 (https://www.apache.org/licenses/LICENSE-2.0).
Modified versions must remove all Red Hat trademarks.
Portions adapted from https://github.com/kubernetes-incubator/service-catalog/ with modifications by Red Hat.
Red Hat, Red Hat Enterprise Linux, the Red Hat logo, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of the OpenJS Foundation.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation’s permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.