Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Submariner 0.12.0 not able to establish connection between sites. Error: The detected CNI network plugin ("") is not supported by Submariner. #3042

Open
BhavaniYalamanchili opened this issue Jun 7, 2024 · 22 comments
Assignees

Comments

@BhavaniYalamanchili
Copy link

BhavaniYalamanchili commented Jun 7, 2024

ISSUE:

The Submariner is not able to establish the connection between the sites.
The error we are seeing in the diagnose all command is
Error Message: The detected CNI network plugin ("") is not supported by Submariner. Supported network plugins: [generic canal-flannel weave-net OpenShiftSDN OVNKubernetes calico]

SETUP:

Site 1: OCP 4.10
Site 2: OCP 4.10
Submariner version: v0.12.0

We are using OVNKubernetes
From the output of oc get network/cluster -o yaml
We can see network type as this
networkType: OVNKubernetes

Outputs of show all and diagnose all commands

Show all for Site 1

Cluster "site1"
 ✓ Detecting broker(s)
NAMESPACE                NAME                     COMPONENTS
submariner-k8s-broker    submariner-broker        service-discovery, connectivity

 ✓ Showing Connections
GATEWAY                          CLUSTER  REMOTE IP       NAT  CABLE DRIVER  SUBNETS                       STATUS  RTT avg.
control-1-ru2.ocp-psb-01.gbbper  site2    192.168.126.30  no   libreswan     172.31.0.0/16, 10.132.0.0/14  error   0s

 ✓ Showing Endpoints
CLUSTER ID                    ENDPOINT IP     PUBLIC IP       CABLE DRIVER        TYPE
site1                         192.168.54.30   192.168.54.30   libreswan           local
site2                         192.168.126.30  192.168.126.30  libreswan           remote
site1                         192.168.54.31   192.168.54.31   libreswan           local
site1                         192.168.54.32   192.168.54.32   libreswan           local

 ✓ Showing Gateways
NODE                            HA STATUS       SUMMARY
control-1-ru2.ocp-psa-01.gbbper active          0 connections out of 1 are established
control-1-ru3.ocp-psa-01.gbbper passive         There are no connections
control-1-ru4.ocp-psa-01.gbbper passive         There are no connections

    Discovered network details via Submariner:
 ✓ Showing Network details
        Network plugin:
        Service CIDRs:   []
        Cluster CIDRs:   []

 ✓ Showing versions
COMPONENT                       REPOSITORY                                            VERSION
submariner                      quay.io/submariner                                    0.12.0
submariner-operator             quay.io/submariner                                    0.12.0
COMPONENT                       REPOSITORY                                            VERSION
submariner                      quay.io/submariner                                    0.12.0
submariner-operator             quay.io/submariner                                    0.12.0

Show all for Site 2

Cluster "local-config"
 ✓ Detecting broker(s)

 ✓ Showing Connections
GATEWAY                          CLUSTER  REMOTE IP      NAT  CABLE DRIVER  SUBNETS                       STATUS     RTT avg.
control-1-ru2.ocp-psa-01.gbbper  site1    192.168.54.30  no   libreswan     172.30.0.0/16, 10.128.0.0/14  connected  988.791µs

 ✓ Showing Endpoints
CLUSTER ID                    ENDPOINT IP     PUBLIC IP       CABLE DRIVER        TYPE
site2                         192.168.126.30  192.168.126.30  libreswan           local
site1                         192.168.54.30   192.168.54.30   libreswan           remote
site2                         192.168.126.31  192.168.126.31  libreswan           local
site2                         192.168.126.32  192.168.126.32  libreswan           local

 ✓ Showing Gateways
NODE                            HA STATUS       SUMMARY
control-1-ru2.ocp-psb-01.gbbper active          All connections (1) are established
control-1-ru3.ocp-psb-01.gbbper passive         There are no connections
control-1-ru4.ocp-psb-01.gbbper passive         There are no connections

    Discovered network details via Submariner:
 ✓ Showing Network details
        Network plugin:  OVNKubernetes
        Service CIDRs:   [172.31.0.0/16]
        Cluster CIDRs:   [10.132.0.0/14]

 ✓ Showing versions
COMPONENT                       REPOSITORY                                            VERSION
submariner                      quay.io/submariner                                    0.12.0
submariner-operator             quay.io/submariner                                    0.12.0
service-discovery               quay.io/submariner                                    0.12.0
COMPONENT                       REPOSITORY                                            VERSION
submariner                      quay.io/submariner                                    0.12.0
submariner-operator             quay.io/submariner                                    0.12.0
service-discovery               quay.io/submariner                                    0.12.0

Diagnose all for Site 1

sh-4.4$ /root/.local/bin/subctl diagnose all --kubeconfig site-1-kubeconfig
Cluster "site1"
 ✓ Checking Submariner support for the Kubernetes version
 ✓ Kubernetes version "v1.23.12+8a6bfe4" is supported

 ✗ Checking Submariner support for the CNI network plugin
 ✗ The detected CNI network plugin ("") is not supported by Submariner. Supported network plugins: [generic canal-flannel weave-net OpenShiftSDN OVNKubernetes calico]


 ✗ Checking gateway connections
 ✗ Connection to cluster "site2" is not established

 ✗ Checking Submariner pods
 ✗ Error obtaining Daemonset "submariner-routeagent": daemonsets.apps "submariner-routeagent" not found
 ✗ Error obtaining Deployment "submariner-lighthouse-agent": deployments.apps "submariner-lighthouse-agent" not found
 ✗ Error obtaining Deployment "submariner-lighthouse-coredns": deployments.apps "submariner-lighthouse-coredns" not found

 ✓ Non-Globalnet deployment detected - checking if cluster CIDRs overlap
 ✓ Clusters do not have overlapping CIDRs

 ✓ Checking Submariner support for the kube-proxy mode
 ✓ The kube-proxy mode is supported

 ✓ Checking the firewall configuration to determine if the metrics port (8080) is allowed
 ✓ The firewall configuration allows metrics to be retrieved from Gateway nodes

 ✗ Checking the firewall configuration to determine if VXLAN traffic is allowed
 ✗ The tcpdump output from the sniffer pod does not contain the expected remote endpoint IP 172.31.0.0. Please check that your firewall configuration allows UDP/4800 traffic.

 ✓ Globalnet is not installed - skipping

Skipping inter-cluster firewall check as it requires two kubeconfigs. Please run "subctl diagnose firewall inter-cluster" command manually.

Diagnose all for Site 2

sh-4.4$ /root/.local/bin/subctl diagnose all --kubeconfig site-2-kubeconfig
Cluster "local-config"
 ✓ Checking Submariner support for the Kubernetes version
 ✓ Kubernetes version "v1.23.12+8a6bfe4" is supported

 ✓ Checking Submariner support for the CNI network plugin
 ✓ The detected CNI network plugin ("OVNKubernetes") is supported

 ✓ Checking gateway connections
 ✓ All connections are established

 ✓ Checking Submariner pods
 ✓ All Submariner pods are up and running

 ✓ Non-Globalnet deployment detected - checking if cluster CIDRs overlap
 ✓ Clusters do not have overlapping CIDRs

 ✓ Checking Submariner support for the kube-proxy mode
 ✓ The kube-proxy mode is supported

 ✓ Checking the firewall configuration to determine if the metrics port (8080) is allowed
 ✓ The firewall configuration allows metrics to be retrieved from Gateway nodes

 ✓ Checking the firewall configuration to determine if VXLAN traffic is allowed
 ✓ This check is not necessary for the OVNKubernetes CNI plugin
 ✓ The firewall configuration allows VXLAN traffic

 ✓ Globalnet is not installed - skipping

Skipping inter-cluster firewall check as it requires two kubeconfigs. Please run "subctl diagnose firewall inter-cluster" command manually.
@yboaron
Copy link
Contributor

yboaron commented Jun 9, 2024

A. You can read how Submariner detects if CNI is OVN-K8S here (in 0.12 release)

B. I can see that OVN-K8S was detected successfully for site2 , both site1 and site2 are running OCP 4.10, is there any difference in OVN-K8S configuration between these clusters ?

@yboaron yboaron self-assigned this Jun 10, 2024
@dfarrell07
Copy link
Member

FYI, SubM 0.12 is a very old version that's long since not supposed to be supported. If you get a chance to update, that would likely be a very good idea.

@BhavaniYalamanchili
Copy link
Author

@yboaron
Based on the function code, I have listed out some oc commands to verify the pods and services the function is fetching and some output related to submariner CR
Here are the outputs:

  1. oc get pods -A -1 name=ovnkube-db
No resources found

On both sites, it is the same output
2. oc get pods -n openshift-ovn-kubernetes
Site 1

NAME                   READY   STATUS    RESTARTS   AGE
ovnkube-master-42r22   6/6     Running   34         325d
ovnkube-master-fbn4v   6/6     Running   6          37d
ovnkube-master-kbs2d   6/6     Running   6          37d
ovnkube-node-7nxcq     5/5     Running   30         325d
ovnkube-node-bcshb     5/5     Running   267        325d
ovnkube-node-br4cf     5/5     Running   25         325d
ovnkube-node-bsb2b     5/5     Running   41         325d
ovnkube-node-dpt65     5/5     Running   30         324d
ovnkube-node-fb7rw     5/5     Running   57         325d
ovnkube-node-g6jsc     5/5     Running   25         325d
ovnkube-node-jkdt8     5/5     Running   30         325d
ovnkube-node-qllh7     5/5     Running   25         325d
ovnkube-node-rb2bt     5/5     Running   25         324d
ovnkube-node-tc4qq     5/5     Running   5          37d
ovnkube-node-w7rzd     5/5     Running   25         325d

Site 2

NAME                   READY   STATUS    RESTARTS       AGE
ovnkube-master-ccnvn   6/6     Running   4 (4d3h ago)   4d3h
ovnkube-master-sfjvh   6/6     Running   4 (4d3h ago)   4d3h
ovnkube-master-xqbxp   6/6     Running   0              4d3h
ovnkube-node-48rwm     5/5     Running   0              4d3h
ovnkube-node-852x6     5/5     Running   0              4d3h
ovnkube-node-88kqh     5/5     Running   0              4d3h
ovnkube-node-bn5s6     5/5     Running   0              4d3h
ovnkube-node-frd5g     5/5     Running   0              4d3h
ovnkube-node-g6fc4     5/5     Running   0              4d3h
ovnkube-node-hx8hb     5/5     Running   0              4d3h
ovnkube-node-kp6l8     5/5     Running   0              4d3h
ovnkube-node-ld7xj     5/5     Running   0              4d3h
ovnkube-node-n89hp     5/5     Running   0              4d3h
ovnkube-node-pbmpk     5/5     Running   0              4d3h
ovnkube-node-tv8sc     5/5     Running   0              4d3h
  1. oc get services -n openshift-ovn-kubernetes | grep ovnkube-db
    Site 1
ovnkube-db              ClusterIP   None         <none>        9641/TCP,9642/TCP   325d

Site 2

ovnkube-db              ClusterIP   None         <none>        9641/TCP,9642/TCP   299d
  1. oc get submariner submariner -n submariner-operator -o yaml
    Site 1 - CR in Site 1 is showing till the Spec only, I am wondering why the status is not shown.
# oc get submariner submariner -n submariner-operator -o yaml
apiVersion: submariner.io/v1alpha1
kind: Submariner
metadata:
  creationTimestamp: "2024-06-06T13:22:34Z"
  finalizers:
  - controllers.submariner.io/cleanup
  generation: 1
  managedFields:
  - apiVersion: submariner.io/v1alpha1
    fieldsType: FieldsV1
    fieldsV1:
      f:spec:
        .: {}
        f:broker: {}
        f:brokerK8sApiServer: {}
        f:brokerK8sApiServerToken: {}
        f:brokerK8sCA: {}
        f:brokerK8sRemoteNamespace: {}
        f:brokerK8sSecret: {}
        f:ceIPSecDebug: {}
        f:ceIPSecIKEPort: {}
        f:ceIPSecNATTPort: {}
        f:ceIPSecPSK: {}
        f:ceIPSecPSKSecret: {}
        f:clusterCIDR: {}
        f:clusterID: {}
        f:connectionHealthCheck:
          .: {}
          f:enabled: {}
          f:intervalSeconds: {}
          f:maxPacketLossCount: {}
        f:debug: {}
        f:namespace: {}
        f:natEnabled: {}
        f:repository: {}
        f:serviceCIDR: {}
        f:serviceDiscoveryEnabled: {}
        f:version: {}
    manager: subctl
    operation: Update
    time: "2024-06-06T13:22:34Z"
  - apiVersion: submariner.io/v1alpha1
    fieldsType: FieldsV1
    fieldsV1:
      f:metadata:
        f:finalizers:
          .: {}
          v:"controllers.submariner.io/cleanup": {}
    manager: submariner-operator
    operation: Update
    time: "2024-06-06T13:25:22Z"
  name: submariner
  namespace: submariner-operator
  resourceVersion: "2020929472"
  uid: e6f8ad61-63bc-4d8a-8e56-2d7ad292a2d1
spec:
  broker: k8s
  brokerK8sApiServer: api.ocp-psa-01.gbbper.priv:6443
  brokerK8sApiServerToken: eyJhbGciOiJSUzI1NiIsImtpZCI6IngwR2pZY2NWTXJtRlI2T3pxVjFzSHU5OU5SNm9fUkt3V1BMTFJxcnV3LVkifQ.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.Z_KAnNtLYHlPRjm7x5ZSwWLAoMyd3Pq_Z9z4LD3iwxrmgfExt5iltotssdeQXDkYvOHYWL7f5XTT7FcvBhKt57aQ9s5tDvVz1LIaehwnMnHwwdYadhSDBgfvrEbAmCByxx0CXOmejuBS5sov5oIhJSeSZzT1wJ6xVsEg-pyQbewb1All0oQIaEmtQtzpWg4OeL2WAxf2u-SG2Er8RbWj_EZ5fwgAHwU2RabvN59-JhA1jE9ZoK_4fkUNlmajDYHr8l_LwtDd4ScmY7hTBARBH6uTkTx3H787qsp7zHgSDxhofT1M51ABdhea3WaWGjqefb-nWOOenSl9KyAVyqF-b_dOD_6jP3pktDE2BPD0Aj2ehOd6FoGorL7ZyYbo1-oHJusC1pE1B46K8Ij7eI_6iSkds5etONhwVonjlPt_L8vdIqn9rBaVJhHbEwz1sHrHvkKd9G0Ka41SLEjZtI7TUkTWTGUF41ViAF2D4OGIYyuiJO9YIUQu-a1tTt8bLpu-_67DHYHA2jZh510aRohUgKthUxKC7E4atVlSwYZk5Lm-5r4kscRb6r2SqIxy2EOif1dtcnpiECYgnvBFtGa1MRbna_f2VRh6KXlOWrtzAZmFIe2pE6BftIidknync1ZAXfJz-zzNsQ_YFVBzsGqiQnfUn_Opr9VWI7TSSgIgYgo
  brokerK8sCA: -----BEGIN CERTIFICATE-----
MIIDMjCCAhqgAwIBAgIIfDmjwcPau+QwDQYJKoZIhvcNAQELBQAwNzESMBAGA1UE
CxMJb3BlbnNoaWZ0MSEwHwYDVQQDExhrdWJlLWFwaXNlcnZlci1sYi1zaWduZXIw
HhcNMjMwNzIwMTUwMTE0WhcNMzMwNzE3MTUwMTE0WjA3MRIwEAYDVQQLEwlvcGVu
c2hpZnQxITAfBgNVBAMTGGt1YmUtYXBpc2VydmVyLWxiLXNpZ25lcjCCASIwDQYJ
KoZIhvcNAQEBBQADggEPADCCAQoCggEBALcbOGPntZLMlGlOCQG81gX+ztmE1AYZ
vEI2lS8P+B8edH2BvOFbG6ug5YHR7XxFGe5YeJ6xNL93MNKNn+PKphk6ndvRCN6m
AtDR7ZpAs1XTfD8sG8x7MaXe1yEORvkYApR/5NHQaJvsQljiv7nT/QcKLTJmzAQK
KFpCZKwsUsTt4KlauO/9CZvi1Veq5t6RaLMqv6rDDDP/3pz8SCsNV/GxHxhWUixu
U+dqnavFlFkLNw+4BxuJqiqBG4cpWjyr1D2bAq8oVz17RZNl63OUuLFkuXuilQPf
i3IsuX46Y14OMbptsM9m76ftIRQbMSJZeljvijToU+6vlTMjM/P7dCECAwEAAaNC
MEAwDgYDVR0PAQH/BAQDAgKkMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFA0G
r3aoJMTuZfGrcfT+box4ViBGMA0GCSqGSIb3DQEBCwUAA4IBAQA9vDVFZE9xiS4q
wZA/ChTc8oH09BfiA59i67trWK36UTj4HVb3fL8AWypg3kYHhvk6vqBgDufTZNR7
Sf59/RcL5UTRu08o9DLsoI9EYLd29Qq7ctplRl5FfwR69f9N/i08YQd5J/0K4p58
+GS4YhSGWzsj1Rvv1BANF6kNz0XF8meIRUZG2dPAhZ2Udq2pOCwv2ajdvjZMxdPE
GO1+Rl7AkxMLHJmvC8bUlC6SxlbmAWabi693udZ6TBBpN4pRAMft/8qs3vlE9i37
j1SZ+LMSPGlH5ip1C3n9C6U1FZAAOo7OnarZJOrgOnkhx1Pp3OpL9XcR7CF6xNl1
0mkXrv9i
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

  brokerK8sRemoteNamespace: submariner-k8s-broker
  brokerK8sSecret: broker-secret-66fps
  ceIPSecDebug: false
  ceIPSecIKEPort: 500
  ceIPSecNATTPort: 4500
  ceIPSecPSK: 0qZfLf2sx+bVlprOtS7jCuE1wjR9h/HnOfO326ReN63uTFY76bhUTThEqY+WjkLK
  ceIPSecPSKSecret: submariner-ipsec-psk
  clusterCIDR: ""
  clusterID: site1
  connectionHealthCheck:
    enabled: true
    intervalSeconds: 1
    maxPacketLossCount: 5
  debug: true
  namespace: submariner-operator
  natEnabled: true
  repository: quay.io/submariner
  serviceCIDR: ""
  serviceDiscoveryEnabled: true
  version: 0.12.0

Site 2

# oc get submariner submariner -n submariner-operator -o yaml
apiVersion: submariner.io/v1alpha1
kind: Submariner
metadata:
  creationTimestamp: "2024-06-06T13:20:40Z"
  finalizers:
  - controllers.submariner.io/cleanup
  generation: 1
  managedFields:
  - apiVersion: submariner.io/v1alpha1
    fieldsType: FieldsV1
    fieldsV1:
      f:spec:
        .: {}
        f:broker: {}
        f:brokerK8sApiServer: {}
        f:brokerK8sApiServerToken: {}
        f:brokerK8sCA: {}
        f:brokerK8sRemoteNamespace: {}
        f:brokerK8sSecret: {}
        f:ceIPSecDebug: {}
        f:ceIPSecIKEPort: {}
        f:ceIPSecNATTPort: {}
        f:ceIPSecPSK: {}
        f:ceIPSecPSKSecret: {}
        f:clusterCIDR: {}
        f:clusterID: {}
        f:connectionHealthCheck:
          .: {}
          f:enabled: {}
          f:intervalSeconds: {}
          f:maxPacketLossCount: {}
        f:debug: {}
        f:namespace: {}
        f:natEnabled: {}
        f:repository: {}
        f:serviceCIDR: {}
        f:serviceDiscoveryEnabled: {}
        f:version: {}
    manager: subctl
    operation: Update
    time: "2024-06-06T13:20:40Z"
  - apiVersion: submariner.io/v1alpha1
    fieldsType: FieldsV1
    fieldsV1:
      f:metadata:
        f:finalizers:
          .: {}
          v:"controllers.submariner.io/cleanup": {}
    manager: submariner-operator
    operation: Update
    time: "2024-06-06T13:21:45Z"
  - apiVersion: submariner.io/v1alpha1
    fieldsType: FieldsV1
    fieldsV1:
      f:status:
        .: {}
        f:clusterCIDR: {}
        f:clusterID: {}
        f:deploymentInfo: {}
        f:gatewayDaemonSetStatus:
          .: {}
          f:lastResourceVersion: {}
          f:mismatchedContainerImages: {}
          f:nonReadyContainerStates: {}
          f:status:
            .: {}
            f:currentNumberScheduled: {}
            f:desiredNumberScheduled: {}
            f:numberAvailable: {}
            f:numberMisscheduled: {}
            f:numberReady: {}
            f:observedGeneration: {}
            f:updatedNumberScheduled: {}
        f:gateways: {}
        f:globalnetDaemonSetStatus:
          .: {}
          f:mismatchedContainerImages: {}
        f:loadBalancerStatus: {}
        f:natEnabled: {}
        f:networkPlugin: {}
        f:routeAgentDaemonSetStatus:
          .: {}
          f:lastResourceVersion: {}
          f:mismatchedContainerImages: {}
          f:nonReadyContainerStates: {}
          f:status:
            .: {}
            f:currentNumberScheduled: {}
            f:desiredNumberScheduled: {}
            f:numberAvailable: {}
            f:numberMisscheduled: {}
            f:numberReady: {}
            f:observedGeneration: {}
            f:updatedNumberScheduled: {}
        f:serviceCIDR: {}
    manager: submariner-operator
    operation: Update
    subresource: status
    time: "2024-06-06T13:21:54Z"
  name: submariner
  namespace: submariner-operator
  resourceVersion: "958559344"
  uid: 43a6ff7a-b2d4-48c2-84a4-ad1f70ca8e86
spec:
  broker: k8s
  brokerK8sApiServer: api.ocp-psa-01.gbbper.priv:6443
  brokerK8sApiServerToken: eyJhbGciOiJSUzI1NiIsImtpZCI6IngwR2pZY2NWTXJtRlI2T3pxVjFzSHU5OU5SNm9fUkt3V1BMTFJxcnV3LVkifQ.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.CP09gdfFSwOR0pk1XGA17Xbg67wOIWd4PqKtFhGUYk3mAvQEjkioM-Vm0UJDCAUqYjH6bzwnWkQxOT8odS8XpMQNd_hj0gHcGXjL5W8DAJzk01ritN-tNHcGJPWC_GxqPT5snAnyDWkL_KwwL4PKl3VEgJhhPbHNgp3fRBh-nbkqjeJ_2gfPr5BySCwAPHOIIZW1V4HTXqvhlFfIKLFiQtPD-PtcqV2P1uy02G7xMVjAMxcHhNFJXIDN8XNrjsCbf28NcoOs7WsjIb0iXI_bPhAQGvfWDWw7kRPIAi7z3OzIcGdrAsVQsw1HcBnAK2CN86b9NybuBGjtVzyUjd9O9QJSxT-OnzKxSj49K33emONX4de1H4hWK0biDccTv_x3gnyTi6HfTJOzfFObBaJVTbconNXfG13odmFiiHTY5z1h3LIfmNGVAi3DJcLBfRfWci2rAbp7niusUsQ0kWlQesIEWvhOG9XlPhp1Gp37R3pEchcQksBKDqUnFVs6o6XTG-Td92i4LdyGJeYslDMY5JHpouVzkrunOZhvwnTsROw6Tb6PbVien2UBGfuW_YGc_9BCgbB2-bxKlBa1NIS-tpr6gk3IjxNLxP5CssTG92888c1yM22USukcpm3nL7lpjCU9Y9Rb3DXynH9n5VjnJ19DpqfVwCU_Q3DrJfF2ilg
  brokerK8sCA: -----BEGIN CERTIFICATE-----
MIIDMjCCAhqgAwIBAgIIfDmjwcPau+QwDQYJKoZIhvcNAQELBQAwNzESMBAGA1UE
CxMJb3BlbnNoaWZ0MSEwHwYDVQQDExhrdWJlLWFwaXNlcnZlci1sYi1zaWduZXIw
HhcNMjMwNzIwMTUwMTE0WhcNMzMwNzE3MTUwMTE0WjA3MRIwEAYDVQQLEwlvcGVu
c2hpZnQxITAfBgNVBAMTGGt1YmUtYXBpc2VydmVyLWxiLXNpZ25lcjCCASIwDQYJ
KoZIhvcNAQEBBQADggEPADCCAQoCggEBALcbOGPntZLMlGlOCQG81gX+ztmE1AYZ
vEI2lS8P+B8edH2BvOFbG6ug5YHR7XxFGe5YeJ6xNL93MNKNn+PKphk6ndvRCN6m
AtDR7ZpAs1XTfD8sG8x7MaXe1yEORvkYApR/5NHQaJvsQljiv7nT/QcKLTJmzAQK
KFpCZKwsUsTt4KlauO/9CZvi1Veq5t6RaLMqv6rDDDP/3pz8SCsNV/GxHxhWUixu
U+dqnavFlFkLNw+4BxuJqiqBG4cpWjyr1D2bAq8oVz17RZNl63OUuLFkuXuilQPf
i3IsuX46Y14OMbptsM9m76ftIRQbMSJZeljvijToU+6vlTMjM/P7dCECAwEAAaNC
MEAwDgYDVR0PAQH/BAQDAgKkMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFA0G
r3aoJMTuZfGrcfT+box4ViBGMA0GCSqGSIb3DQEBCwUAA4IBAQA9vDVFZE9xiS4q
wZA/ChTc8oH09BfiA59i67trWK36UTj4HVb3fL8AWypg3kYHhvk6vqBgDufTZNR7
Sf59/RcL5UTRu08o9DLsoI9EYLd29Qq7ctplRl5FfwR69f9N/i08YQd5J/0K4p58
+GS4YhSGWzsj1Rvv1BANF6kNz0XF8meIRUZG2dPAhZ2Udq2pOCwv2ajdvjZMxdPE
GO1+Rl7AkxMLHJmvC8bUlC6SxlbmAWabi693udZ6TBBpN4pRAMft/8qs3vlE9i37
j1SZ+LMSPGlH5ip1C3n9C6U1FZAAOo7OnarZJOrgOnkhx1Pp3OpL9XcR7CF6xNl1
0mkXrv9i
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIDlzCCAn+gAwIBAgIIMFjB8Cxyg3YwDQYJKoZIhvcNAQELBQAwWTFXMFUGA1UE
AwxOb3BlbnNoaWZ0LWt1YmUtYXBpc2VydmVyLW9wZXJhdG9yX2xvY2FsaG9zdC1y
ZWNvdmVyeS1zZXJ2aW5nLXNpZ25lckAxNjg5ODY3ODUzMB4XDTIzMDcyMDE1NDQx
MloXDTMzMDcxNzE1NDQxM1owWTFXMFUGA1UEAwxOb3BlbnNoaWZ0LWt1YmUtYXBp
c2VydmVyLW9wZXJhdG9yX2xvY2FsaG9zdC1yZWNvdmVyeS1zZXJ2aW5nLXNpZ25l
ckAxNjg5ODY3ODUzMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3Bm5
rLcu/dpLks6Mq/tLlon2S0S6isspFRoQQf3pex6X3G7CK9jPbWlCGVxIi+7jMoWa
Ga60sxfyfz/CC2ViZrA5C+QMFy2hsodjQqxEC5cUTDfhtbW5jaimcnqQH+BdWxxD
cysCVASZXVxZdoiXjMp0op6Ai2w0YzA7S2CIaJi0lN3AjcEjQQZsOLBb0ckB1kXy
5rLXb7q4tZLPVksVoxvw+9AC77qvCkxl3agzLJ0ddcbqWR1/KoNtyQ2IioJVVkkz
2PpvzBuKxXQdtwk9ul3Yhpab/0Hq3ecbZrPffceUktYR76qoQS8A/KP4R5HnQ7uY
RFP7PlOaKpjuCjU5nQIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/
BAUwAwEB/zAdBgNVHQ4EFgQUWpHBf6rwLFZYUuiawPSeNHvrp0swHwYDVR0jBBgw
FoAUWpHBf6rwLFZYUuiawPSeNHvrp0swDQYJKoZIhvcNAQELBQADggEBAKKj85oL
U9kRKt9VEWR5ZxRgHc79L9+rHXNWqTjQWlTpHkwPyDNp//78zTvcKnDDhFutm2LO
0vBnyA6VwBgVA/aGPgPCFRLQfOgtKG5QaMo3P/YGtr7CGoSiaAOnTSf4rn1eW/hP
/8iNdAsg5IaNH0Y+pc5tEdP8T9CiBe0P5b4i7dSbuuATRN+e4ofoF5ytGwDryF6j
oLJ/YPvEHKVjxqQjBbImw5U0rLIjRdD7vS2ncDZoXct5v0syLn7rZmgtibIFJEa0
Vx9sdDNFFIlVppXUu8FrvDv8MGl6OBAERepBB8guZlKDyNTMiMC3xQN0t7l1isFj
kIcvdQn/WgWr6rg=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

  brokerK8sRemoteNamespace: submariner-k8s-broker
  brokerK8sSecret: broker-secret-2brrr
  ceIPSecDebug: false
  ceIPSecIKEPort: 500
  ceIPSecNATTPort: 4500
  ceIPSecPSK: 0qZfLf2sx+bVlprOtS7jCuE1wjR9h/HnOfO326ReN63uTFY76bhUTThEqY+WjkLK
  ceIPSecPSKSecret: submariner-ipsec-psk
  clusterCIDR: ""
  clusterID: site2
  connectionHealthCheck:
    enabled: true
    intervalSeconds: 1
    maxPacketLossCount: 5
  debug: true
  namespace: submariner-operator
  natEnabled: true
  repository: quay.io/submariner
  serviceCIDR: ""
  serviceDiscoveryEnabled: true
  version: 0.12.0
status:
  clusterCIDR: 10.132.0.0/14
  clusterID: site2
  deploymentInfo: {}
  gatewayDaemonSetStatus:
    lastResourceVersion: "951307195"
    mismatchedContainerImages: false
    nonReadyContainerStates: []
    status:
      currentNumberScheduled: 3
      desiredNumberScheduled: 3
      numberAvailable: 3
      numberMisscheduled: 0
      numberReady: 3
      observedGeneration: 1
      updatedNumberScheduled: 3
  gateways:
  - connections:
    - endpoint:
        backend: libreswan
        backend_config:
          natt-discovery-port: "4490"
          preferred-server: "false"
          public-ip: dns:control-1-ru4.ocp-psa-01.gbbper.priv
          udp-port: "4500"
        cable_name: submariner-cable-site1-192-168-54-32
        cluster_id: site1
        healthCheckIP: 10.129.0.2
        hostname: control-1-ru4.ocp-psa-01.gbbper.priv
        nat_enabled: true
        private_ip: 192.168.54.32
        public_ip: 192.168.54.32
        subnets:
        - 172.30.0.0/16
        - 10.128.0.0/14
      latencyRTT:
        average: 1.181959ms
        last: 1.103177ms
        max: 66.129596ms
        min: 924.003µs
        stdDev: 704.858µs
      status: connected
      statusMessage: ""
      usingIP: 192.168.54.32
    haStatus: active
    localEndpoint:
      backend: libreswan
      backend_config:
        natt-discovery-port: "4490"
        preferred-server: "false"
        public-ip: dns:control-1-ru2.ocp-psb-01.gbbper.priv
        udp-port: "4500"
      cable_name: submariner-cable-site2-192-168-126-30
      cluster_id: site2
      healthCheckIP: 10.133.0.2
      hostname: control-1-ru2.ocp-psb-01.gbbper.priv
      nat_enabled: true
      private_ip: 192.168.126.30
      public_ip: 192.168.126.30
      subnets:
      - 172.31.0.0/16
      - 10.132.0.0/14
    statusFailure: ""
    version: release-0.12-621cbce
  - connections: []
    haStatus: passive
    localEndpoint:
      backend: libreswan
      backend_config:
        natt-discovery-port: "4490"
        preferred-server: "false"
        public-ip: dns:control-1-ru3.ocp-psb-01.gbbper.priv
        udp-port: "4500"
      cable_name: submariner-cable-site2-192-168-126-31
      cluster_id: site2
      healthCheckIP: 10.132.0.2
      hostname: control-1-ru3.ocp-psb-01.gbbper.priv
      nat_enabled: true
      private_ip: 192.168.126.31
      public_ip: 192.168.126.31
      subnets:
      - 172.31.0.0/16
      - 10.132.0.0/14
    statusFailure: ""
    version: release-0.12-621cbce
  - connections: []
    haStatus: passive
    localEndpoint:
      backend: libreswan
      backend_config:
        natt-discovery-port: "4490"
        preferred-server: "false"
        public-ip: dns:control-1-ru4.ocp-psb-01.gbbper.priv
        udp-port: "4500"
      cable_name: submariner-cable-site2-192-168-126-32
      cluster_id: site2
      healthCheckIP: 10.134.0.2
      hostname: control-1-ru4.ocp-psb-01.gbbper.priv
      nat_enabled: true
      private_ip: 192.168.126.32
      public_ip: 192.168.126.32
      subnets:
      - 172.31.0.0/16
      - 10.132.0.0/14
    statusFailure: ""
    version: release-0.12-621cbce
  globalnetDaemonSetStatus:
    mismatchedContainerImages: false
  loadBalancerStatus: {}
  natEnabled: true
  networkPlugin: OVNKubernetes
  routeAgentDaemonSetStatus:
    lastResourceVersion: "945546125"
    mismatchedContainerImages: false
    nonReadyContainerStates: []
    status:
      currentNumberScheduled: 12
      desiredNumberScheduled: 12
      numberAvailable: 12
      numberMisscheduled: 0
      numberReady: 12
      observedGeneration: 1
      updatedNumberScheduled: 12
  serviceCIDR: 172.31.0.0/16
  1. oc get network cluster -o yaml
    Site 1
# oc get network cluster -o yaml
apiVersion: config.openshift.io/v1
kind: Network
metadata:
  creationTimestamp: "2023-07-20T15:08:25Z"
  generation: 2
  managedFields:
  - apiVersion: config.openshift.io/v1
    fieldsType: FieldsV1
    fieldsV1:
      f:spec:
        .: {}
        f:clusterNetwork: {}
        f:externalIP:
          .: {}
          f:policy: {}
        f:networkType: {}
        f:serviceNetwork: {}
      f:status: {}
    manager: cluster-bootstrap
    operation: Update
    time: "2023-07-20T15:08:25Z"
  - apiVersion: config.openshift.io/v1
    fieldsType: FieldsV1
    fieldsV1:
      f:status:
        f:clusterNetwork: {}
        f:clusterNetworkMTU: {}
        f:networkType: {}
        f:serviceNetwork: {}
    manager: cluster-network-operator
    operation: Update
    time: "2023-07-20T15:40:50Z"
  name: cluster
  resourceVersion: "6285"
  uid: 42ed0cab-58a1-4229-8d8a-78ddf7430518
spec:
  clusterNetwork:
  - cidr: 10.128.0.0/14
    hostPrefix: 23
  externalIP:
    policy: {}
  networkType: OVNKubernetes
  serviceNetwork:
  - 172.30.0.0/16
status:
  clusterNetwork:
  - cidr: 10.128.0.0/14
    hostPrefix: 23
  clusterNetworkMTU: 1400
  networkType: OVNKubernetes
  serviceNetwork:
  - 172.30.0.0/16

Site 2

#  oc get network cluster -o yaml
apiVersion: config.openshift.io/v1
kind: Network
metadata:
  creationTimestamp: "2023-08-16T08:57:56Z"
  generation: 2
  managedFields:
  - apiVersion: config.openshift.io/v1
    fieldsType: FieldsV1
    fieldsV1:
      f:spec:
        .: {}
        f:clusterNetwork: {}
        f:externalIP:
          .: {}
          f:policy: {}
        f:networkType: {}
        f:serviceNetwork: {}
      f:status: {}
    manager: cluster-bootstrap
    operation: Update
    time: "2023-08-16T08:57:56Z"
  - apiVersion: config.openshift.io/v1
    fieldsType: FieldsV1
    fieldsV1:
      f:status:
        f:clusterNetwork: {}
        f:clusterNetworkMTU: {}
        f:networkType: {}
        f:serviceNetwork: {}
    manager: cluster-network-operator
    operation: Update
    time: "2023-08-16T09:31:10Z"
  name: cluster
  resourceVersion: "5877"
  uid: 7b575eb7-3655-4244-a157-71a87077b829
spec:
  clusterNetwork:
  - cidr: 10.132.0.0/14
    hostPrefix: 23
  externalIP:
    policy: {}
  networkType: OVNKubernetes
  serviceNetwork:
  - 172.31.0.0/16
status:
  clusterNetwork:
  - cidr: 10.132.0.0/14
    hostPrefix: 23
  clusterNetworkMTU: 1400
  networkType: OVNKubernetes
  serviceNetwork:
  - 172.31.0.0/16

@BhavaniYalamanchili
Copy link
Author

@dfarrell07
If the submariner needs to be upgraded, Can you point out which submariner version is compatible with OCP 4.10?

@yboaron
Copy link
Contributor

yboaron commented Jun 13, 2024

@BhavaniYalamanchili

Here are the outputs:

oc get pods -A -1 name=ovnkube-db
No resources found

Did you mean oc get pods -A -l name=ovnkube-db ?

@BhavaniYalamanchili
Copy link
Author

BhavaniYalamanchili commented Jun 13, 2024

@yboaron
Sorry typo, it is -l not -1

Did you mean oc get pods -A -l name=ovnkube-db ?

Yes

@tpantelis
Copy link
Contributor

@dfarrell07 If the submariner needs to be upgraded, Can you point out which submariner version is compatible with OCP 4.10?

You had created #2955 a while back where you were using Submariner 0.16.x and OCP 4.15 so I'm curious why you would now be using much older versions of each (which are no longer supported)....

@yboaron
Copy link
Contributor

yboaron commented Jun 13, 2024

A.

oc get pods -A -1 name=ovnkube-db
No resources found

Hmm, that's weird, b/c if no pod with ovnkube-db label is found Submariner shouldn't recognize CNI plugin as OVN-K8S, and OVN-K8S was detected successfully for site2

B. What version of subctl do you use ?

C. Also think it is better to upgrade Submariner, for OCP 4.10 you can upgrade to Submariner 0.14.

D. If you decide to stay with version 0.12, and still hit this issue please upload subctl gather from both clusters.

@BhavaniYalamanchili
Copy link
Author

BhavaniYalamanchili commented Jun 13, 2024

@tpantelis This is a different cluster setup

@yboaron
B. 0.12.0 subctl only is being used

C. Any version of 0.14.x would work on OCP 4.10?

D. Sure, will try to get the subctl gather from both clusters, it might take some time. Meanwhile, I have found some error log statements in submariner-operator logs of Site 1, Please check this out.

[90m2024-06-06T13:24:47.742Z[0m [32mINF[0m ..e-arguments/main.go:174 cmd                  Could not generate and serve custom resource metrics [36merror=[0m[31m"error initializing metrics: discovering resource information failed for Submariner in submariner.io/v1alpha1: unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: the server is currently unable to handle the request"[0m

[90m2024-06-06T13:25:22.495Z[0m [32mINF[0m ..e-arguments/main.go:229 cmd                  Could not create ServiceMonitor object [36merror=[0m[31m"unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: the server is currently unable to handle the request"[0m

[90m2024-06-06T13:25:40.455Z[0m [1m[31mERR[0m[0m ..oller/controller.go:267 ..mariner-controller Reconciler error [36merror=[0m[31m"unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: the server is currently unable to handle the request"[0m [36mname=[0msubmariner [36mnamespace=[0msubmariner-operator [36mreconciler group=[0msubmariner.io [36mreconciler kind=[0mSubmariner

@yboaron
Copy link
Contributor

yboaron commented Jun 16, 2024

C. Any version of 0.14.x would work on OCP 4.10?

Yep.

@BhavaniYalamanchili
Copy link
Author

@yboaron There is a concern about sharing all the logs. Could you let me know if you want any specific logs to look for the exact error?

@yboaron
Copy link
Contributor

yboaron commented Jun 17, 2024

Please share the output of oc get submariner submariner -n submariner-operator -o yaml , from site1 , couldn't see the status section in the ^^ you attached above.
and also submariner-operator pod logs from both clusters

@BhavaniYalamanchili
Copy link
Author

@yboaron

The output of the command oc get submariner submariner -n submariner-operator -o yaml is displayed till the spec only the status section is not displayed, I wonder why
In the yaml file that is collected also its the same

Here are the submariner-operator pod logs you asked
Please change the the extension to zip when downloaded
SIte1 logs.txt
SIte2 logs.txt

@yboaron
Copy link
Contributor

yboaron commented Jun 19, 2024

According to the site1 logs, submariner-operator failed to reconcile due to [1] error, and therefore does not update submariner.status section.

Please address this issue and let us know how it goes.

[1]

unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: the server is currently unable to handle the request

@tpantelis
Copy link
Contributor

unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: the server is currently unable to handle the request

This looks like an incompatibility with the K8s version your using, ie the K8s version is newer than what's supported by Submariner 0.12. As mentioned earlier, 0.12 is no longer maintained so I strongly suggest upgrading Submariner.

@BhavaniYalamanchili
Copy link
Author

In the past when we had an issue with Submariner 0.12.0 and OCP 4.10, then it was said by your team that the OCP version must be 4.11+ for the submariner 0.13.
#1978 (comment)
Also pointed to the third bullet of the doc https://github.com/submariner-io/releases/releases/tag/v0.13.0
So will the submariner 0.14.6 work on OCP 4.10?

Also in the same ticket, it was mentioned that the Submariner does not support OVN on OCP 4.9 and 4.10
#1978 (comment)

@tpantelis
Copy link
Contributor

You're better off upgrading both Submariner and OCP to supported versions.

@BhavaniYalamanchili
Copy link
Author

BhavaniYalamanchili commented Jun 20, 2024

@yboaron @tpantelis

We upgraded the Submariner to 0.14.6 version, and even after the upgrade its the same error message we are seeing and some add on errors

Site 1

./subctl-v0.14.6-linux-amd64 show all --kubeconfig=/tmp/site-1-kubeconfig
I0620 11:47:51.523338 1183225 request.go:601] Waited for 1.010687181s due to client-side throttling, not priority and fairness, request: GET:https://api.ocp-psa-01.gbbper.priv:6443/apis/ibmcpcs.ibm.com/v1?timeout=32s
I0620 11:48:01.523343 1183225 request.go:601] Waited for 10.921594654s due to client-side throttling, not priority and fairness, request: GET:https://api.ocp-psa-01.gbbper.priv:6443/apis/machineconfiguration.openshift.io/v1?timeout=32s
Cluster "site1"
I0620 11:48:11.542570 1183225 request.go:601] Waited for 5.340290374s due to client-side throttling, not priority and fairness, request: GET:https://api.ocp-psa-01.gbbper.priv:6443/apis/satellite.isf.ibm.com/v1?timeout=32s
 ✓ Detecting broker(s)
NAMESPACE               NAME                COMPONENTS                        GLOBALNET   GLOBALNET CIDR   DEFAULT GLOBALNET SIZE   DEFAULT DOMAINS
submariner-k8s-broker   submariner-broker   service-discovery, connectivity   no          242.0.0.0/8      65536

 ✓ Showing Connections
GATEWAY                          CLUSTER   REMOTE IP        NAT   CABLE DRIVER   SUBNETS                        STATUS   RTT avg.
control-1-ru4.ocp-psb-01.gbbpe   site2     192.168.126.32   no    libreswan      172.31.0.0/16, 10.132.0.0/14   error    0s

 ✓ Showing Endpoints
CLUSTER   ENDPOINT IP      PUBLIC IP        CABLE DRIVER   TYPE
site1     192.168.54.30    192.168.54.30    libreswan      local
site2     192.168.126.32   192.168.126.32   libreswan      remote
site1     192.168.54.31    192.168.54.31    libreswan      local
site1     192.168.54.32    192.168.54.32    libreswan      local

 ✓ Showing Gateways
NODE                             HA STATUS   SUMMARY
control-1-ru2.ocp-psa-01.gbbpe   active      0 connections out of 1 are established
control-1-ru3.ocp-psa-01.gbbpe   passive     There are no connections
control-1-ru4.ocp-psa-01.gbbpe   passive     There are no connections

 ✓ Showing Network details
    Discovered network details via Submariner:
        Network plugin:
        Service CIDRs:   []
        Cluster CIDRs:   []

 ✓ Showing versions
COMPONENT             REPOSITORY           VERSION
submariner-gateway    quay.io/submariner   0.14.6
submariner-operator   quay.io/submariner   0.14.6
sh-4.4$ ./subctl-v0.14.6-linux-amd64 show all --kubeconfig=/tmp/site-1-kubeconfig [root@bstcp4s-p-sl-01 subctl-v0.14.6]# oc rsh isf-metrodr-operator-controller-manager-c88b64864-5m9bb
error: You must be logged in to the server (Unauthorized)
[root@bstcp4s-p-sl-01 subctl-v0.14.6]# oc login https://api.ocp-psb-01.gbbper.priv:6443/ -u kubeadmin -p 43aTz-Ipzat-AzVqt-4YhpF --insecure-skip-tls-verify=true
Login successful.

You have access to 76 projects, the list has been suppressed. You can list all projects with ' projects'

Using project "ibm-spectrum-fusion-ns".
[root@bstcp4s-p-sl-01 subctl-v0.14.6]# oc rsh isf-metrodr-operator-controller-manager-c88b64864-5m9bb                                                        Defaulting container name to manager.
Use 'oc describe pod/isf-metrodr-operator-controller-manager-c88b64864-5m9bb -n ibm-spectrum-fusion-ns' to see all of the containers in this pod.
sh-4.4$ cd /tmp/subctl_new/
sh-4.4$ ./subctl-v0.14.6-linux-amd64 diagnose all --kubeconfig=/tmp/site-1-kubeconfig
Cluster "site1"
I0620 11:49:27.218182 1183270 request.go:601] Waited for 1.008715728s due to client-side throttling, not priority and fairness, request: GET:https://api.ocp-psa-01.gbbper.priv:6443/apis/spp-data-protection.isf.ibm.com/v1alpha1?timeout=32s
I0620 11:49:37.417620 1183270 request.go:601] Waited for 11.208065595s due to client-side throttling, not priority and fairness, request: GET:https://api.ocp-psa-01.gbbper.priv:6443/apis/authorization.openshift.io/v1?timeout=32s
 ✓ Checking Submariner support for the Kubernetes version
 ✓ Kubernetes version "v1.23.12+8a6bfe4" is supported

 ✗ Checking Submariner support for the CNI network plugin
 ✗ The detected CNI plugin ("") is not supported by Submariner. Supported plugins: [generic canal-flannel weave-net OpenShiftSDN OVNKubernetes calico kindnet]
 ✗ Checking gateway connections
 ✗ Connection to cluster "site2" is not established. Connection details:
{
  "status": "error",
  "statusMessage": "Failed to successfully ping the remote endpoint IP \"10.134.0.2\"",
  "endpoint": {
    "cluster_id": "site2",
    "cable_name": "submariner-cable-site2-192-168-126-32",
    "healthCheckIP": "10.134.0.2",
    "hostname": "control-1-ru4.ocp-psb-01.gbbper.priv",
    "subnets": [
      "172.31.0.0/16",
      "10.132.0.0/14"
    ],
    "private_ip": "192.168.126.32",
    "public_ip": "192.168.126.32",
    "nat_enabled": true,
    "backend": "libreswan",
    "backend_config": {
      "natt-discovery-port": "4490",
      "preferred-server": "false",
      "public-ip": "dns:control-1-ru4.ocp-psb-01.gbbper.priv",
      "udp-port": "4500"
    }
  },
  "usingIP": "192.168.126.32",
  "latencyRTT": {
    "last": "0s",
    "min": "0s",
    "average": "0s",
    "max": "0s",
    "stdDev": "0s"
  }
}
 ✓ Non-Globalnet deployment detected - checking if cluster CIDRs overlap
 ✓ Clusters do not have overlapping CIDRs
 ✗ Checking Submariner pods
 ✗ Error obtaining Daemonset "submariner-routeagent": daemonsets.apps "submariner-routeagent" not found
 ✗ Error obtaining Deployment "submariner-lighthouse-agent": deployments.apps "submariner-lighthouse-agent" not found
 ✗ Error obtaining Deployment "submariner-lighthouse-coredns": deployments.apps "submariner-lighthouse-coredns" not found
 ✗ Error obtaining Daemonset "submariner-metrics-proxy": daemonsets.apps "submariner-metrics-proxy" not found
 ✓ Checking Submariner support for the kube-proxy mode
 ✓ The kube-proxy mode is supported
 ✗ Checking the firewall configuration to determine if intra-cluster VXLAN traffic is allowed
 ✗ The tcpdump output from the sniffer pod does not contain the expected remote endpoint IP 172.31.0.0. Please check that your firewall configuration allows UDP/4800 traffic.
 ✓ Globalnet is not installed - skipping

 ⚠ Service discovery is not installed

Skipping inter-cluster firewall check as it requires two kubeconfigs. Please run "subctl diagnose firewall inter-cluster" command manually.

subctl version: v0.14.6

Site 2

sh-4.4$ ./subctl-v0.14.6-linux-amd64 show all --kubeconfig=/tmp/site-2-kubeconfig
Cluster "local-config"
 ✓ Detecting broker(s)
 ✓ No brokers found

 ✓ Showing Connections
GATEWAY                          CLUSTER   REMOTE IP       NAT   CABLE DRIVER   SUBNETS                        STATUS      RTT avg.
control-1-ru2.ocp-psa-01.gbbpe   site1     192.168.54.30   no    libreswan      172.30.0.0/16, 10.128.0.0/14   connected   1.400162ms

 ✓ Showing Endpoints
CLUSTER   ENDPOINT IP      PUBLIC IP        CABLE DRIVER   TYPE
site2     192.168.126.30   192.168.126.30   libreswan      local
site2     192.168.126.31   192.168.126.31   libreswan      local
site2     192.168.126.32   192.168.126.32   libreswan      local
site1     192.168.54.30    192.168.54.30    libreswan      remote

 ✓ Showing Gateways
NODE                             HA STATUS   SUMMARY
control-1-ru2.ocp-psb-01.gbbpe   passive     There are no connections
control-1-ru3.ocp-psb-01.gbbpe   passive     There are no connections
control-1-ru4.ocp-psb-01.gbbpe   active      All connections (1) are established

 ✓ Showing Network details
    Discovered network details via Submariner:
        Network plugin:  OVNKubernetes
        Service CIDRs:   [172.31.0.0/16]
        Cluster CIDRs:   [10.132.0.0/14]

 ✓ Showing versions
COMPONENT                       REPOSITORY           VERSION
submariner-gateway              quay.io/submariner   0.14.6
submariner-routeagent           quay.io/submariner   0.14.6
submariner-operator             quay.io/submariner   0.14.6
submariner-lighthouse-agent     quay.io/submariner   0.14.6
submariner-lighthouse-coredns   quay.io/submariner   0.14.6

On site2 there is a difference from previous version output

sh-4.4$ /tmp/subctl_new/subctl-v0.14.6-linux-amd64 diagnose all --kubeconfig=/tmp/site-2-kubeconfig
Cluster "local-config"
 ✓ Checking Submariner support for the Kubernetes version
 ✓ Kubernetes version "v1.23.12+8a6bfe4" is supported

 ✓ Checking Submariner support for the CNI network plugin
 ✓ The detected CNI network plugin ("OVNKubernetes") is supported
 ✗ Checking OVN version
 ✗ The ovn-nb database version 5.35.1 is less than the minimum supported version 6.1.0
 ✓ Checking gateway connections
 ✓ All connections are established
 ✓ Non-Globalnet deployment detected - checking if cluster CIDRs overlap
 ✓ Clusters do not have overlapping CIDRs
 ✗ Checking Submariner pods
 ✗ The desired number of replicas for Deployment "submariner-networkplugin-syncer" (1) does not match the actual number running (0)
 ⚠ Pod "submariner-networkplugin-syncer-547fff98b6-qbz8v" has restarted 13 times
 ✓ Checking Submariner support for the kube-proxy mode
 ✓ The kube-proxy mode is supported
 ✓ Checking the firewall configuration to determine if intra-cluster VXLAN traffic is allowed
 ✓ This check is not necessary for the OVNKubernetes CNI plugin
 ✓ The firewall configuration allows intra-cluster VXLAN traffic
 ✓ Globalnet is not installed - skipping

 ✓ Checking if services have been exported properly
 ✓ All services have been exported properly

Skipping inter-cluster firewall check as it requires two kubeconfigs. Please run "subctl diagnose firewall inter-cluster" command manually.

subctl version: v0.14.6

@yboaron
Copy link
Contributor

yboaron commented Jun 23, 2024

First of all sorry I wasn't clear in my previous answer, Submariner 0.14.x can work with OCP 4.10 but with CNI other than OVN-K.

As suggested, please upgrade also OCP to version 4.11+, as
OVN-K requires OVN NorthBound DB version 6.1.0+, available with OCP 4.11.0+

@BhavaniYalamanchili
Copy link
Author

BhavaniYalamanchili commented Jun 24, 2024

@yboaron we have some concerns about updating the OCP 4.10 to 4.11, we want to get the submariner issue fixed through which a component that is dependent on the submariner will be fixed and then only we can proceed to the OCP upgrade.

@tpantelis said that it looks like an incompatibility issue

This looks like an incompatibility with the K8s version your using, ie the K8s version is newer than what's supported by Submariner 0.12.

So, which K8s version is compatible with Submariner 0.12.0?

Another point I see is that the Submariner 0.12. and also 0.14. versions are trying to fetch a pod that has the label name=ovnkube-db on it

And we don't have any pods like that on both sites,

# oc get pods -A -l name=ovnkube-db

# oc get pods -n openshift-ovn-kubernetes -l name=ovnkube-db
No resources found in openshift-ovn-kubernetes namespace.

But the Site 2 is able to detect the plugin
Is there any other way that Site2 is able to detect the CNI plugin?

Here I want to mention a point on what happened before this issue
There was an issue with Site2, it wasn't accessible neither via oc cli nor via web-console) when we approached RedHat, the RedHat support team recreated the OVN database on Site2 and then we observed this issue with the submariner.
Do you think the recreation of the OVN database on Site 2 is in any way relatable to this issue?

@yboaron
Copy link
Contributor

yboaron commented Jun 26, 2024

Well, I'm afraid it's a chicken and egg problem here, Submariner doesn't support OCP 4.10 with OVN-K as cni and you want to upgrade OCP after Submariner issue resolved.

I think the best thing would be to uninstall Submariner, upgrade OCP, reinstall Submariner (of course upgrading submariner version).

Maybe you can try resolve Submariner issue before upgrading OCP using the following workaround:

  • Change OCP CNI to OpenshiftSDN
  • Address [1] error on site1, after short search on Google I found these [2] links
  • Reinstall Submariner

[1]

unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: the server is currently unable to handle the request

[2]
https://cloud.ibm.com/docs/containers?topic=containers-debug_metrics_server
https://pet2cattle.com/2021/05/unable-to-retrieve-the-complete-list-of-server-apis

Copy link
Contributor

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further
activity occurs. Thank you for your contributions.

@github-actions github-actions bot added the stale label Oct 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Backlog
Development

No branches or pull requests

4 participants