Note: This is a beta release of Red Hat Bugzilla 5.0. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Also email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback here.
Bug 1692897 - sosreport should not modify OpenShift projects by default
Summary: sosreport should not modify OpenShift projects by default
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: sos
Version: 7.6
Hardware: Unspecified
OS: Unspecified
Target Milestone: rc
: ---
Assignee: Pavel Moravec
QA Contact: Miroslav Hradílek
Depends On:
TreeView+ depends on / blocked
Reported: 2019-03-26 16:29 UTC by Pablo Alonso Rodriguez
Modified: 2019-04-02 15:31 UTC (History)
6 users (show)

Fixed In Version: sos-3.7-1.el7
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed:
Target Upstream Version:

Attachments (Terms of Use)

System ID Priority Status Summary Last Updated
Github sosreport sos pull 1624 None None None 2019-03-26 20:04:50 UTC

Description Pablo Alonso Rodriguez 2019-03-26 16:29:27 UTC
Description of problem:

By default, oc adm diagnostics is run in such a way that it can make modifications to a running cluster. In unstable scenarios, this can amplify the issue.

I know there is a origin.diag-prevent option that may make oc adm diagnostics, run with --prevent-modification , preventing such modifications. 

However, this option is "off" by default, so it is very easy for a customer not to have it setup and, hence, end up running a non read-only oc adm diagnostics that may make even more harm to his cluster. Because of this, origin.diag-prevent option should be "on" by default.

Comment 2 Pablo Alonso Rodriguez 2019-03-26 17:07:31 UTC
Created pull request:

Comment 3 Pavel Moravec 2019-03-26 20:04:50 UTC
seems trivial change, devel_ack+ (maye still to 7.7, no guarantee though)

Note You need to log in before you can comment on or make changes to this bug.