Known Issues

General Issues


In CSE 3.0 users of System organization are unable to create clusters

If a user from System org who didn’t install CSE 3.0 attempts to create clusters, the operation fails with an error message “Access denied”. The reason behind the failure is that, the CSE native defined entity schema is not visible to users of System organization, except the user who installed CSE.

Workaround

  1. Grant all members of System organization, read-write permission to the CSE native defined entity type.
    • POST `https://<vcd-fqdn>/cloudapi/1.0.0/entities/urn:vcloud:type:cse:nativeCluster:1.0.0/accessControls`
      {
      “grantType” : “MembershipAccessControlGrant”,
      “accessLevelId” : “urn:vcloud:accessLevel:ReadWrite”,
      “memberId” : “urn:vcloud:org:[System organization uuid]”
      }

In CSE 3.0 cse upgrade fails with RDE_TYPE_ALREADY_EXISTS if the user account is switched in the configuration file

If cse upgrade is run on an existing CSE 3.0 installation, and the vCD account details are different from what was used during the initial CSE installation, the upgrade process will fail with the above mentioned error message. The root cause and workaround for this issue is exactly the same as covered by the known issue above.

In CSE 3.0 configured with vCD 10.2, Cluster list operation may fail to retrieve results

Listing clusters either by CLI (vcd cse cluster list) or UI will fail if any of the clusters’ representing defined entities are corrupted. For example, if the defined entity is manually modified (using direct defined entity api) and if it violates the schema rules of the corresponding defined entity type, then cluster list cmd will fail to retrieve other valid entities.

Workaround: Update the defined entity with the correct schema (using direct defined entity api) and sync the defined entity using CSE server API - GET on https://<vcd-ip>/api/cse/3.0/clusters/<id>

In CSE 3.0 configured with vCD 10.2, native clusters are stuck in CREATE:IN_PROGRESS state.

When native clusters are stuck in such state, it means that the cluster creation has failed for unknown reason, and the representing defined entity has not transitioned to the ERROR state.

Workaround:

  1. Delete the defined entity
    • POST https://<vcd-fqdn>/cloudapi/1.0.0/entities/<cluster-id>/resolve
    • DEL https://<vcd-fqdn>/cloudapi/1.0.0/entities/<cluster-id>
  2. Delete the cluster vApp.
    • Retrieve the vApp ID. vApp Id is same as the externalID value in the corresponding defined entity
      • GET https://<vcd-fqdn>/cloudapi/1.0.0/entities/<cluster-id>
    • Delete the corresponding cluster vApp

In CSE 3.0 configured with vCD 10.1, prevent native clusters from getting deployed in Ent-PKS enbled ovdc(s)

As native clusters are by default allowed to be deployed on any organization virtual datacenters in this set-up, native clusters can inadvertently be deployed on Ent-PKS enbled ovdc(s).

Workaround: We can prevent that by protecting native templates using template rules. Refer CSE 2.6 template restriction.

Unable to change the default storage profile for Native cluster deployments

The default storage profile for native cluster deployments can’t be changed in CSE, unless specified via CLI.

vCD follows particular order of precedence to pick the storage-profile for any VM instantiation:

  1. User-specified storage-profile
  2. Storage-profile with which the template is created (if VM is being instantiated from a template)
  3. Organization virtual datacenter default storage-profile

Workaround:

  1. Disable the storage-profile with which the template is created on the ovdc.
  2. Set the desired storage-profile as default on the ovdc.

Failures during template creation or installation

CSE service fails to start

Cluster creation fails when VCD external network has a DNS suffix and the DNS server resolves localhost.my.suffix to a valid IP

This is due to a bug in etcd (More detail HERE, with the kubeadm config file contents necessary for the workaround specified in this comment).

The main issue is that etcd prioritizes the DNS server (if it exists) over the /etc/hosts file to resolve hostnames, when the conventional behavior would be to prioritize checking any hosts files before going to the DNS server. This becomes problematic when kubeadm attempts to initialize the control plane node using localhost. etcd checks the DNS server for any entry like localhost.suffix, and if this actually resolves to an IP, attempts to do some operations involving that incorrect IP, instead of localhost.

The workaround (More detail HERE is to create a kubeadm config file (no way to specify listen-peer-urls argument in command line), and modify the kubeadm init command in the CSE control plane script for the template of the cluster you are attempting to deploy. CSE control plane script is located at ~/.cse-scripts/<template name>_rev<template_revision>/scripts/mstr.sh

Change command from, kubeadm init --kubernetes-version=v1.13.5 > /root/kubeadm-init.out to kubeadm init --config >/path/to/kubeadm.yaml > /root/kubeadm-init.out

Kubernetes version has to be specified within the configuration file itself, since --kubernetes-version and --config are incompatible.