Skip to content

feat: add MinIO, OpenEBS, and certificate diagnostics#122

Open
adamancini wants to merge 1 commit intomainfrom
ada/minio-cert-diagnostics
Open

feat: add MinIO, OpenEBS, and certificate diagnostics#122
adamancini wants to merge 1 commit intomainfrom
ada/minio-cert-diagnostics

Conversation

@adamancini
Copy link
Member

Summary

  • Add host collectors and analyzers to diagnose MinIO data volume read failures on kURL clusters using OpenEBS local hostpath (ext4 errors, RO remount, inode pressure, format.json inspection)
  • Add comprehensive certificate expiration and rotation diagnostics covering all K8s PKI certs, kubelet certs, and kubeconfig embedded certs
  • Add analyzers for kubelet TLS/auth/RBAC failures that cause kubectl exec/kubectl logs to fail during kURL upgrades
  • Add in-cluster analyzers for EKCO cert rotation failures and missing kubeadm:cluster-admins RBAC binding

Context

During a kURL rerun to update KOTS Admin, MinIO failed with "Failed to read /data/.minio.sys/format.json inside minio pod". Investigation revealed this is a kubectl exec failure, not a storage issue — the API server's proxy request to the kubelet was returning Forbidden due to cert rotation or RBAC issues.

Test plan

  • Validated YAML syntax with yamllint
  • Generated host support bundle on a kURL cluster (ada-kurl) — all new collectors produced output
  • All new analyzers executed and returned correct pass/fail results
  • Verified cert expiration check covers: K8s PKI (5), etcd PKI (4), kubelet (2), kubeconfig embedded (4) = 15 certificates total

Add collectors and analyzers to diagnose MinIO data volume read failures
on kURL clusters using OpenEBS local hostpath, and comprehensive
certificate expiration and rotation diagnostics.

Host collectors:
- df -ih (inode usage)
- findmnt (structured mount table with options/propagation)
- OpenEBS local PV directory listing with format.json inspection
- MinIO crictl logs (current + previous)
- kubeadm certs check-expiration (with alpha fallback)
- openssl-based cert check for all K8s PKI, kubelet, and kubeconfig certs
- kubelet config.yaml and PKI directory listing

Host analyzers:
- EXT4 filesystem errors in dmesg
- Filesystem remounted read-only
- Kubelet read-only filesystem errors
- Kubelet orphaned pod volume cleanup failures
- Kubelet TLS handshake failures (stale CA after rotation)
- Kubelet authentication failures (expired client cert)
- Kubelet webhook authorization Forbidden (missing RBAC binding)
- Kubelet x509 certificate errors
- Kubernetes certificates expired (openssl)
- Kubernetes certificates expiring within 30 days (openssl)
- Kubeadm certificate expiration report

In-cluster collectors:
- MinIO data volume inspection via exec (format.json state)

In-cluster analyzers:
- MinIO data volume read failure
- MinIO read-only filesystem
- EKCO certificate rotation Forbidden errors
- EKCO certificate rotation failures
- kubeadm:cluster-admins RBAC binding existence
- API server kubelet client proxy authorization
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant