Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Trident operator on OCP4 generates thousands of CSI secrets #469

Closed
bigg01 opened this issue Oct 20, 2020 · 3 comments
Closed

Trident operator on OCP4 generates thousands of CSI secrets #469

bigg01 opened this issue Oct 20, 2020 · 3 comments
Labels

Comments

@bigg01
Copy link

bigg01 commented Oct 20, 2020

Describe the bug
Trident Operator generates a ton of secrets in our OCP 4 cluster are there currently 12k secrets. What is going wrong here?

oc get secrets -n trident | wc -l
12316

All "trident-csi-token-6pdrd" why?

Environment
Production Environment

  • Trident version: 20:07
  • Kubernetes orchestrator: [e.g. OpenShift v4.5.5]
  • Kubernetes: v1.18.3+08c38ef
  • NetApp backend types: ONTAP AFF

To Reproduce
Steps to reproduce the behavior:
Run the Operator a while!

Expected behavior
not creating this amount of secrets

@bigg01 bigg01 added the bug label Oct 20, 2020
@rohit-arora-dev
Copy link
Contributor

Hello @bigg01,

This was fixed in Trident 20.07.1 release with this fix 051294a

Once you upgrade to 20.07.1, it will replace the service account and with a new one, in this process I believe it will remove all those 12K secrets associated with the old service account.

@rohit-arora-dev
Copy link
Contributor

Also want to add that this issue has been observed on a few specific OCP versions and not all the OCP versions.

@bigg01
Copy link
Author

bigg01 commented Oct 20, 2020

Thank you for the fast replay. I will test the new Version.

@gnarl gnarl closed this as completed Oct 20, 2020
@bigg01 bigg01 changed the title Trident operator on OCP4 generates thousands of CSI secretes Trident operator on OCP4 generates thousands of CSI secrets Oct 21, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants