Cluster logging operator resources deleted
Issue
-
Cluster Logging Operator (CLO) display a status where all pods are running but no pods are in fact running
-
The kube-apiserver audit logs display CLO related resources being garbage collected
master-2-audit-2020-09-25T12-18-19.237.log.gz:{"kind":"Event","apiVersion":"audit.k8s.io/v1","level":"Metadata","auditID":"b8a8435a-b1d0-4347-9c79-3f7092b4b10d","stage":"ResponseComplete","requestURI":"/apis/logging.openshift.io/v1/namespaces/openshift-logging/elasticsearches/elasticsearch","verb":"delete","user":{"username":"system:serviceaccount:kube-system:generic-garbage-collector","uid":"d993a6aa-c8b5-11e9-b3cd-0050569a2776","groups":["system:serviceaccounts","system:serviceaccounts:kube-system","system:authenticated"]},"sourceIPs":["::1"],"userAgent":"kube-controller-manager/v1.18.3+6c42de8 (linux/amd64) kubernetes/6c42de8/system:serviceaccount:kube-system:generic-garbage-collector","objectRef":{"resource":"elasticsearches","namespace":"openshift-logging","name":"elasticsearch","apiGroup":"logging.openshift.io","apiVersion":"v1"},"responseStatus":{"metadata":{},"status":"Success","code":200},"requestReceivedTimestamp":"2020-09-25T12:00:32.243902Z","stageTimestamp":"2020-09-25T12:00:32.308827Z","annotations":{"authorization.k8s.io/decision":"allow","authorization.k8s.io/reason":"RBAC: allowed by ClusterRoleBinding \"system:controller:generic-garbage-collector\" of ClusterRole \"system:controller:generic-garbage-collector\" to ServiceAccount \"generic-garbage-collector/kube-system\""}}
Environment
- Red Hat OpenShift Container Platform
- 4.5
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.