Multiple copies of encryption-config secret in openshift-kube-apiserver namespace
Issue
-
The
openshift-kube-apiservermaintains multiple copies of theencryption-configsecrets:$ oc get secrets -n openshift-kube-apiserver | grep "encryption-config" encryption-config Opaque 1 73d [...] encryption-config-13 Opaque 1 73d encryption-config-14 Opaque 1 73d [...] encryption-config-30 Opaque 1 45d [...] encryption-config-267 Opaque 1 1d [...] -
The
encryption-configsecretsare marked for deletion, but never deleted as afinalizeravoids it:metadata: annotations: kubernetes.io/description: |- WARNING: DO NOT EDIT. Altering of the encryption secrets will render you cluster inaccessible. Catastrophic data loss can occur from the most minor changes. creationTimestamp: "2024-02-22T23:42:02Z" deletionGracePeriodSeconds: 0 deletionTimestamp: "2024-03-01T00:24:40Z" finalizers: - encryption.apiserver.operator.openshift.io/deletion-protection name: encryption-config-236 namespace: openshift-kube-apiserver
Environment
- Red Hat OpenShift Container Platform (RHOCP)
- 4
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.