Docs Menu
Docs Home
/
MongoDB Enterprise Kubernetes Operator

Known Issues in the MongoDB Enterprise Kubernetes Operator

On this page

  • Underprovisioned EBS Volume Causes Long IOPS Wait Times
  • ConfigMap Name mongodb-enterprise-operator-member-list is Hard-Coded
  • mongos Instances Fail to Reach Ready State After Disabling Authentication
  • Update Google Firewall Rules to Fix WebHook Issues
  • Configure Persistent Storage Correctly
  • Remove Resources before Removing Kubernetes
  • Create Separate Namespaces for Kubernetes Operator and MongoDB Resources
  • HTTPS Enabled After Deployment
  • Unable to Update the MongoDB Agent on Application Database Pods
  • Unable to Pull Enterprise Kubernetes Operator Images from IBM Cloud Paks
  • Machine Memory vs. Container Memory

If you used kops to provision a Kubernetes cluster in AWS and are experiencing poor performance and high IOPS wait times, your Elastic Block Store (EBS) volume may be underprovisioned.

To improve performance, increase the storage-to-IOPS ratio for your EBS volume. For example, if your database is 500 GB, increase IOPS to 1500, a 3:1 ratio per GB. To learn more about increasing IOPS, see the AWS documentation.

When you run the kubectl mongodb plugin, such as during the multi-Kubernetes-cluster quick start procedure, the plugin creates a default ConfigMap named mongodb-enterprise-operator-member-list. This ConfigMap contains all the members of the multi-Kubernetes cluster MongoDB deployment. You can't change the ConfigMap's name. To learn more about plugin's flags and actions, see MongoDB Plugin Reference.

Note

This issue applies only to sharded clusters that meet the following criteria:

  • Deployed using the Kubernetes Operator 1.13.0

  • Use X.509 authentication

  • Use kubernetes.io/tls secrets for TLS certificates for the MongoDB Agent

If you disable authentication by setting spec.security.auth.enabled to false, the mongos Pods never reach a ready state.

As a workaround, delete each mongos Pod in your deployment.

Run the following command to list all of your Pods:

kubectl get pods

For each Pod with a name that contains mongos, delete it with the following command:

kubectl delete pod <podname>

When you delete a Pod, Kubernetes recreates it. Each Pod that Kubernetes recreates receives the updated configuration and can reach a READY state. To confirm that all of your mongos Pods are READY, run the following command:

kubectl get pods -n <metadata.namespace>

A response like the following indicates that all of your mongos Pods are READY:

NAME READY STATUS RESTARTS AGE
mongodb-enterprise-operator-6495bdd947-ttwqf 1/1 Running 0 50m
my-sharded-cluster-0-0 1/1 Running 0 12m
my-sharded-cluster-1-0 1/1 Running 0 12m
my-sharded-cluster-config-0 1/1 Running 0 12m
my-sharded-cluster-config-1 1/1 Running 0 12m
my-sharded-cluster-mongos-0 1/1 Running 0 11m
my-sharded-cluster-mongos-1 1/1 Running 0 11m
om-0 1/1 Running 0 42m
om-db-0 2/2 Running 0 44m
om-db-1 2/2 Running 0 43m
om-db-2 2/2 Running 0 43m

When you deploy Kubernetes Operator to GKE (Google Kubernetes Engine) private clusters, the MongoDB resources or MongoDBOpsManager resource creation could time out. The following message might appear in the logs: Error setting state to reconciling: Timeout: request did not complete within requested timeout 30s.

Google configures its firewalls to restrict access to your Kubernetes Pods. To use the webhook service, add a new firewall rule to grant GKE (Google Kubernetes Engine) control plane access to your webhook service.

The Kubernetes Operator webhook service runs on port 443.

If there are no persistent volumes available when you create a resource, the resulting Pod stays in transient state and the Operator fails (after 20 retries) with the following error:

Failed to update Ops Manager automation config: Some agents failed to register

To prevent this error, either:

For testing only, you may also set persistent : false. This must not be used in production, as data is not preserved between restarts.

Sometimes Ops Manager can diverge from Kubernetes. This mostly occurs when Kubernetes resources are removed manually. Ops Manager can keep displaying an Automation Agent which has been shut down.

If you want to remove deployments of MongoDB on Kubernetes, use the resource specification to delete resources first so no dead Automation Agents remain.

To troubleshoot any issues that might occur, see:

The best strategy is to create Kubernetes Operator and its resources in different namespaces so that the following operations would work correctly:

kubectl delete pods --all

or

kubectl delete namespace mongodb

If the Kubernetes Operator and resources sit in the same mongodb namespace, then operator would also be removed in the same operation. This would mean that it could not clean the configurations, which would have to be done in the Ops Manager Application.

We recommend that you enable HTTPS before deploying your Ops Manager resources. However, if you enable HTTPS after deployment, your managed resources can no longer communicate with Ops Manager and the Kubernetes Operator reports your resources' status as Failed.

To resolve this issue, you must delete your Pods by running the following command for each Pod:

kubectl delete pod <replicaset-pod-name>

After deletion, Kubernetes automatically restarts the deleted Pods. During this period, the resource is unreachable and incurs downtime.

Tip

See also:

You can't use Ops Manager to upgrade the MongoDB Agent's that run on the Application Database Pods. The MongoDB Agent version that runs on these Pods is embedded in the Application Database Docker image.

You can use the Kubernetes Operator to upgrade the MongoDB Agent version on Application Database Pods as MongoDB publishes new images.

If you pull the Kubernetes Operator images from a container registry hosted in IBM Cloud Paks, the IBM Cloud Paks changes the names of the images by adding a digest SHA to the official image names. This action results in error messages from the Kubernetes Operator similar to the following:

Failed to apply default image tag "cp.icr.io/cp/cpd/ibm-cpd-mongodb-agent@
sha256:10.14.24.6505-1": couldn't parse image reference "cp.icr.io/cp/cpd/
ibm-cpd-mongodb-agent@sha256:10.14.24.6505-1": invalid reference format

As a workaround, update the Ops Manager Application Database resource definition in spec.applicationDatabase.podSpec.podTemplate to specify the new names for the Kubernetes Operator images that contain the digest SHAs, similar to the following example.

applicationDatabase:
# The version specified must match the one in the image provided in the `mongod` field
version: 4.4.11-ubi8
members: 3
podSpec:
podTemplate:
spec:
containers:
- name: mongodb-agent
image: 'cp.icr.io/cp/cpd/ibm-cpd-mongodb-agent@sha256:689df23cc35a435f5147d9cd8a697474f8451ad67a1e8a8c803d95f12fea0b59'

The Automation Agent in Cloud Manager and Ops Manager reports host memory (RAM) usage instead of the Kubernetes container memory usage.

Back

Troubleshoot