Skip to content

OCPBUGS-65633: add network-check-target + networking-console-plugin service accounts#2868

Open
ehearne-redhat wants to merge 1 commit intoopenshift:masterfrom
ehearne-redhat:add-service-account-network-check-target-networking-console-plugin
Open

OCPBUGS-65633: add network-check-target + networking-console-plugin service accounts#2868
ehearne-redhat wants to merge 1 commit intoopenshift:masterfrom
ehearne-redhat:add-service-account-network-check-target-networking-console-plugin

Conversation

@ehearne-redhat
Copy link

@ehearne-redhat ehearne-redhat commented Jan 7, 2026

This PR adds a service account to openshift-network-diagnostics/network-check-target- and openshift-network-console/networking-console-plugin- pods. It also includes a change to render_test as the number 14 for number of YAMLs to check for is now 15 due to added RBAC manifest. The ordering of the manifests have been changed to allow for the correct application of manifests.

The reason for this change is that these pods should use their own bespoke service account, not default.

@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Jan 7, 2026
@coderabbitai
Copy link

coderabbitai bot commented Jan 7, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review

Walkthrough

Adds two ServiceAccount manifests and assigns them to existing pod specs: network-check-target in openshift-network-diagnostics and networking-console-plugin in openshift-network-console. Also increments a unit test expectation by one rendered item.

Changes

Cohort / File(s) Summary
network-diagnostics ServiceAccount & DaemonSet
bindata/network-diagnostics/001-rbac.yaml, bindata/network-diagnostics/network-check-target.yaml
New ServiceAccount network-check-target in namespace openshift-network-diagnostics; DaemonSet pod spec changed from serviceAccount: default to serviceAccount: network-check-target.
networking-console-plugin ServiceAccount & Deployment
bindata/networking-console-plugin/001-rbac.yaml, bindata/networking-console-plugin/003-deployment.yaml
New ServiceAccount networking-console-plugin in namespace openshift-network-console; Deployment pod spec set to serviceAccount: networking-console-plugin.
Unit test update
pkg/network/render_test.go
Test expectation updated: third test case rendered item count increased from 14 to 15.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~10 minutes

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment

Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci-robot openshift-ci-robot added jira/severity-critical Referenced Jira bug's severity is critical for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels Jan 7, 2026
@openshift-ci-robot
Copy link
Contributor

@ehearne-redhat: This pull request references Jira Issue OCPBUGS-65633, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.22.0) matches configured target version for branch (4.22.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @anuragthehatter

The bug has been updated to refer to the pull request using the external bug tracker.

Details

In response to this:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@ehearne-redhat
Copy link
Author

@coderabbitai review

@coderabbitai
Copy link

coderabbitai bot commented Jan 7, 2026

✅ Actions performed

Review triggered.

Note: CodeRabbit is an incremental review system and does not re-review already reviewed commits. This command is applicable only when automatic reviews are paused.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🤖 Fix all issues with AI agents
In @bindata/network-diagnostics/001-rbac.yaml:
- Around line 132-138: Change the ServiceAccount manifest to use the correct
core API group by replacing apiVersion: rbac.authorization.k8s.io with
apiVersion: v1 for the ServiceAccount named network-check-target in namespace
openshift-network-diagnostics, and remove the trailing whitespace on the blank
line after namespace (line containing only whitespace) to ensure the YAML is
accepted by Kubernetes.

In @bindata/networking-console-plugin/001-rbac.yaml:
- Around line 1-5: The manifest declares a ServiceAccount with the wrong
apiVersion; change the apiVersion for the ServiceAccount resource from
"rbac.authorization.k8s.io" to "v1" so Kubernetes accepts it; update the
apiVersion field at the top of the ServiceAccount definition (metadata.name:
networking-console-plugin, metadata.namespace: openshift-network-console) to
"v1" and keep the rest of the ServiceAccount spec unchanged.
📜 Review details

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Cache: Disabled due to data retention organization setting

Knowledge base: Disabled due to Reviews -> Disable Knowledge Base setting

📥 Commits

Reviewing files that changed from the base of the PR and between 9d8ab48 and b161b78.

📒 Files selected for processing (6)
  • bindata/network-diagnostics/001-rbac.yaml
  • bindata/network-diagnostics/network-check-target.yaml
  • bindata/networking-console-plugin/001-rbac.yaml
  • bindata/networking-console-plugin/002-config-map.yaml
  • bindata/networking-console-plugin/003-deployment.yaml
  • bindata/networking-console-plugin/005-service.yaml
🧰 Additional context used
📓 Path-based instructions (1)
**

⚙️ CodeRabbit configuration file

-Focus on major issues impacting performance, readability, maintainability and security. Avoid nitpicks and avoid verbosity.

Files:

  • bindata/networking-console-plugin/001-rbac.yaml
  • bindata/network-diagnostics/001-rbac.yaml
  • bindata/network-diagnostics/network-check-target.yaml
  • bindata/networking-console-plugin/003-deployment.yaml
🔇 Additional comments (2)
bindata/networking-console-plugin/003-deployment.yaml (1)

58-58: LGTM!

The serviceAccount assignment correctly references the networking-console-plugin ServiceAccount defined in 001-rbac.yaml. The namespace alignment is correct, and the configuration with automountServiceAccountToken: false indicates this is used for pod security context rather than API access.

bindata/network-diagnostics/network-check-target.yaml (1)

66-66: LGTM!

The serviceAccount assignment correctly references the network-check-target ServiceAccount defined in bindata/network-diagnostics/001-rbac.yaml. The namespace alignment is correct.

@ehearne-redhat
Copy link
Author

@coderabbitai review

@coderabbitai
Copy link

coderabbitai bot commented Jan 7, 2026

✅ Actions performed

Review triggered.

Note: CodeRabbit is an incremental review system and does not re-review already reviewed commits. This command is applicable only when automatic reviews are paused.

@ehearne-redhat
Copy link
Author

/retest

@openshift-ci-robot
Copy link
Contributor

@ehearne-redhat: This pull request references Jira Issue OCPBUGS-65633, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.22.0) matches configured target version for branch (4.22.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @anuragthehatter

Details

In response to this:

This PR adds a service account to openshift-network-diagnostics/network-check-target- and openshift-network-console/networking-console-plugin- pods. It also includes a change to render_test as the number 14 for number of YAMLs to check for is now 15 due to added RBAC manifest. The ordering of the manifests have been changed to allow for the correct application of manifests.

The reason for this change is that these pods should use their own bespoke service account, not default.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@ehearne-redhat
Copy link
Author

/test hypershift-e2e-aks
/test e2e-aws-ovn-hypershift-conformance

@ehearne-redhat ehearne-redhat changed the title [WIP] OCPBUGS-65633: add network-check-target + networking-console-plugin service accounts OCPBUGS-65633: add network-check-target + networking-console-plugin service accounts Jan 9, 2026
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Jan 9, 2026
@ehearne-redhat
Copy link
Author

/test e2e-aws-ovn-hypershift-conformance

@ehearne-redhat
Copy link
Author

/retest

@ehearne-redhat
Copy link
Author

@anuragthehatter @arkadeepsen @kyrtapz can we get an override on the security test? The affected components did not contain any of my code changes, and referenced also some go libraries.

The rest of the tests appear to pass - feel free to review when you have the time. :)

@arkadeepsen
Copy link
Member

@coderabbitai review

@coderabbitai
Copy link

coderabbitai bot commented Jan 16, 2026

✅ Actions performed

Review triggered.

Note: CodeRabbit is an incremental review system and does not re-review already reviewed commits. This command is applicable only when automatic reviews are paused.

@arkadeepsen
Copy link
Member

@ehearne-redhat Can you please squash the commits into a single one?

@ehearne-redhat
Copy link
Author

@arkadeepsen yeah that's no problem. :)

@ehearne-redhat ehearne-redhat force-pushed the add-service-account-network-check-target-networking-console-plugin branch from b2ea5a2 to 2afeb6e Compare January 16, 2026 14:51
@ehearne-redhat
Copy link
Author

ehearne-redhat commented Jan 16, 2026

@arkadeepsen so that's done now. let me know if you need anything else for this PR :)

@arkadeepsen
Copy link
Member

@arkadeepsen so that's done now. let me know if you need anything else for this PR :)

Thanks for that. I want to check whether the upgrade jobs are sporadically facing any issues or not. Historically when manifests are updated, sometimes the upgrade jobs face issues due to unpredictable order of component upgrade. So, let's wait for the jobs to pass again.

@arkadeepsen
Copy link
Member

/retest-required
/test 4.22-upgrade-from-stable-4.21-e2e-azure-ovn-upgrade

@ehearne-redhat
Copy link
Author

/test hypershift-e2e-aks

This test reports inconsistent errors. No 443 error on latest test run.

@ehearne-redhat
Copy link
Author

/test e2e-aws-ovn-serial-1of2

@ehearne-redhat
Copy link
Author

I am seeing in other test runs of e2e-aws-ovn-serial-1of2 such as here that it reports the same error:

{  fail [github.com/openshift/origin/test/extended/networking/commatrix.go:143]: Unexpected error:
    <*errors.errorString | 0xc001c5a470>: 
    the following ports are used but don't have an endpointslice: 
     Ingress,TCP,8080,openshift-multus,multi-networkpo,multus-networkpolicy-49tc2,multus-networkpolicy,worker,false
    
    {
        s: "the following ports are used but don't have an endpointslice: \n Ingress,TCP,8080,openshift-multus,multi-networkpo,multus-networkpolicy-49tc2,multus-networkpolicy,worker,false\n",
    }
occurred}

Therefore, since the two pods have their bespoke service accounts running correctly, I will unhold.

/unhold

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 23, 2026
@ehearne-redhat
Copy link
Author

I have also verified that CNO logs look similar in other PRs' runs of e2e-aws-ovn-serial-1of2.

/verified by ehearne-redhat

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Feb 23, 2026
@openshift-ci-robot
Copy link
Contributor

@ehearne-redhat: This PR has been marked as verified by ehearne-redhat.

Details

In response to this:

I have also verified that CNO logs look similar in other PRs' runs of e2e-aws-ovn-serial-1of2.

/verified by ehearne-redhat

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@ehearne-redhat
Copy link
Author

/refresh

@kyrtapz
Copy link
Contributor

kyrtapz commented Feb 24, 2026

/lgtm
These failure is completely unrelated and occurs on other PRs as well:

: [sig-network][Feature:commatrix][apigroup:config.openshift.io][Serial] should validate the communication matrix ports match the node's listening ports [Suite:openshift/conformance/serial] expand_less 	9s
{  fail [github.com/openshift/origin/test/extended/networking/commatrix.go:143]: Unexpected error:
    <*errors.errorString | 0xc001c5a470>: 
    the following ports are used but don't have an endpointslice: 
     Ingress,TCP,8080,openshift-multus,multi-networkpo,multus-networkpolicy-49tc2,multus-networkpolicy,worker,false
    
    {
        s: "the following ports are used but don't have an endpointslice: \n Ingress,TCP,8080,openshift-multus,multi-networkpo,multus-networkpolicy-49tc2,multus-networkpolicy,worker,false\n",
    }
occurred}

/override ci/prow/e2e-aws-ovn-serial-1of2

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 24, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 24, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: arkadeepsen, ehearne-redhat, kyrtapz

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 24, 2026

@kyrtapz: Overrode contexts on behalf of kyrtapz: ci/prow/e2e-aws-ovn-serial-1of2

Details

In response to this:

/lgtm
These failure is completely unrelated and occurs on other PRs as well:

: [sig-network][Feature:commatrix][apigroup:config.openshift.io][Serial] should validate the communication matrix ports match the node's listening ports [Suite:openshift/conformance/serial] expand_less 	9s
{  fail [github.com/openshift/origin/test/extended/networking/commatrix.go:143]: Unexpected error:
   <*errors.errorString | 0xc001c5a470>: 
   the following ports are used but don't have an endpointslice: 
    Ingress,TCP,8080,openshift-multus,multi-networkpo,multus-networkpolicy-49tc2,multus-networkpolicy,worker,false
   
   {
       s: "the following ports are used but don't have an endpointslice: \n Ingress,TCP,8080,openshift-multus,multi-networkpo,multus-networkpolicy-49tc2,multus-networkpolicy,worker,false\n",
   }
occurred}

/override ci/prow/e2e-aws-ovn-serial-1of2

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@ehearne-redhat
Copy link
Author

/retest

1 similar comment
@ehearne-redhat
Copy link
Author

/retest

@openshift-ci-robot openshift-ci-robot removed the verified Signifies that the PR passed pre-merge verification criteria label Feb 26, 2026
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Feb 26, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 26, 2026

New changes are detected. LGTM label has been removed.

@ehearne-redhat
Copy link
Author

@ehearne-redhat ehearne-redhat force-pushed the add-service-account-network-check-target-networking-console-plugin branch from 460d0c3 to 2ebfbc8 Compare February 27, 2026 11:20
@ehearne-redhat
Copy link
Author

/retest

@ehearne-redhat
Copy link
Author

e2e-metal-ipi-ovn-dualstack-bgp-local-gw is failing due to default service account monitor test. I have a PR open for this to resolve, essentially add an exception to resolve.

@ehearne-redhat
Copy link
Author

Just waiting for openshift/origin#30815 tests to pass and hopefully get review to resolve e2e-metal-ipi-ovn-dualstack-bgp-local-gw test. Then, I will test and hopefully should pass. :)

@ehearne-redhat
Copy link
Author

/test e2e-metal-ipi-ovn-dualstack-bgp-local-gw

2 similar comments
@ehearne-redhat
Copy link
Author

/test e2e-metal-ipi-ovn-dualstack-bgp-local-gw

@ehearne-redhat
Copy link
Author

/test e2e-metal-ipi-ovn-dualstack-bgp-local-gw

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 6, 2026

@ehearne-redhat: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/security 2ebfbc8 link false /test security
ci/prow/e2e-metal-ipi-ovn-dualstack-bgp-local-gw 2ebfbc8 link true /test e2e-metal-ipi-ovn-dualstack-bgp-local-gw

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@ehearne-redhat
Copy link
Author

From e2e-aws-ovn-serial-1of2:

---
apiVersion: v1
kind: Pod
metadata:
  ...
  generateName: networking-console-plugin-56466947-
  ...
  name: networking-console-plugin-56466947-clvfq
  namespace: openshift-network-console
  ...
    name: networking-console-plugin
    ...
  serviceAccount: networking-console-plugin
  serviceAccountName: networking-console-plugin
  ...
    name: networking-console-plugin
   ...
  phase: Running
...
---
apiVersion: v1
kind: Pod
metadata:
  ...
  generateName: network-check-target-
  ...
  labels:
    app: network-check-target
    ...
    name: network-check-target-container
    ...
  serviceAccount: network-check-target
  serviceAccountName: network-check-target
  ...
    name: network-check-target-container
    ...
  phase: Running
...

/verified by ehearne-redhat

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Mar 6, 2026
@openshift-ci-robot
Copy link
Contributor

@ehearne-redhat: This PR has been marked as verified by ehearne-redhat.

Details

In response to this:

From e2e-aws-ovn-serial-1of2:

---
apiVersion: v1
kind: Pod
metadata:
 ...
 generateName: networking-console-plugin-56466947-
 ...
 name: networking-console-plugin-56466947-clvfq
 namespace: openshift-network-console
 ...
   name: networking-console-plugin
   ...
 serviceAccount: networking-console-plugin
 serviceAccountName: networking-console-plugin
 ...
   name: networking-console-plugin
  ...
 phase: Running
...
---
apiVersion: v1
kind: Pod
metadata:
 ...
 generateName: network-check-target-
 ...
 labels:
   app: network-check-target
   ...
   name: network-check-target-container
   ...
 serviceAccount: network-check-target
 serviceAccountName: network-check-target
 ...
   name: network-check-target-container
   ...
 phase: Running
...

/verified by ehearne-redhat

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@ehearne-redhat
Copy link
Author

I believe e2e-metal-ipi-ovn-dualstack-bgp-local-gw has infrastructure issues as it seems to be failing for several people even after the monitor test change got merged.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/severity-critical Referenced Jira bug's severity is critical for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants