IBM Multicloud Manager known issues and limitations

Review the known issues for IBM Multicloud Manager. Additionally, see IBM Multicloud Manager troubleshooting for troubleshooting topics.

Cannot create a Helm release on a managed cluster

You are unable to deploy Helm charts that contain images on a managed cluster. To fix this error, you must configure ClusterImagePolicy. Run the following command to configure ClusterImagePolicy:

apiVersion: securityenforcement.admission.cloud.ibm.com/v1beta1
kind: ClusterImagePolicy
metadata:
  annotations:
    helm.sh/hook: post-install
    helm.sh/hook-weight: "1"
  name: ibmcloud-default-cluster-image-policy
spec:
  repositories:
  - name: <repo_name>

Applications fail to install during Helm deployment

Applications fail to install during deployment when the ClusterImagePolicy is not configured.

Note: Be sure to configure ClusterImagePolicy. View the Cannot create a Helm release on a remote cluster section for information about configuring the policy.

To fix this error, reinstall your application by following the tasks:

  1. Verify the status of your application by running the following command:

    helm list --tls
    
  2. To delete your application, run the following command:

    helm delete releaseName --purge
    
  3. Edit and locate the ClusterImagePolicy to push your images to your application. Run the following command:

    kubectl get clusterimagepolicy
    
  4. Edit the ClusterImagePolicy by running the following command:

    kubectl edit clusterimagepolicy <policyname>
    
  5. Reinstall your application. Run the following command:

    helm install chartName
    

For more details, see the Helm community issue Opens in a new tab.

Helm release does not appear for 3.2.0 managed cluster

If you configure a 3.2.0 managed cluster on an IBM Cloud Private 3.2.1 hub cluster, the hub cluster does not display Helm releases for your managed cluster on the Helm Release page or on the Search page.

To fix the error, complete the following procedure:

  1. Log in to your managed cluster and patch the secret with the following command:

    kubectl patch secret multicluster-endpoint-tiller-client-certs -n multicluster-endpoint --type='json' -p='[{"op":"add","path":"/data/ca.crt","value":"'$(kubectl get secret -n kube-system cluster-ca-cert -o jsonpath={.data.tls\\.crt})'"}]'
    
  2. Restart the search-collector pod. To restart the search-collector pod, delete the pod with the name multicluster-endpoint-search-collector-<pod-name>. Kubernetes restarts the pod.

Missing data in Grafana for OpenShift

If any of your managed clusters are OpenShift Container Platform clusters, data for the clusters can be missing within the Grafana dashboard for cluster monitoring.

Subscription status remains healthy when deployable source is deleted

If a deployable that was deployed to a managed cluster through a subscription is deleted from the source location where it was stored, the deployable is not removed from the managed cluster. For instance, if a Helm release is deleted from the Helm repository, the Helm release is not removed from the managed cluster and continues to work. The deleted deployable remains on the managed cluster until the associated subscription is deleted or updated to replace the deployable.

ObjectBucket channels support including only one resource in each object

When you are including resources into the object store, do not include multiple resources in a single object. Object stores are used to store Kubernetes resource YAML files as objects. These files define the Kubernetes resource without wrapping the resource. To include these objects in a channel, each file can define only a single Kubernetes resource.

Resource count for an application is different than the resource count for application channels

From the management console Application page, when you view the Resource highlights for an application, the total number of resources for the Resource summary can be different than the number of resources that is shown in the Resources by channel charts.

When the resources are counted for the Resources by channel chart, the number of related resources for the subscriptions that are associated with the application are counted. Resources, such as Helm releases, which can be related to multiple subscriptions are counted separately for each subscription. This count can result in a higher total of resources for the Resources by channel chart.

Security findings data causes the management console to timeout

When you click the Security findings tab from the IBM Cloud Private management console, a timeout error is returned. The Security Advisor legato microservice is not returning the data quickly.

Update your security findings retention policy to resolve this issue. For more information, see the Security findings data retention policy in IBM Cloud Private security findings.

Remediation field is empty

The Remediation field in the detail panel for security findings becomes empty for all of your policies that are associated with your cluster. The Remediation field becomes empty for the following reasons:

Permission issue with Docker Version 18.03 with Ubuntu 16.04 LTS

If you use Docker Version 18.03 or higher with Ubuntu 16.04 LTS, containers that run as non-root might have permission issues. This issue appears to be due to a problem between the overlay storage driver and the kernel.

Visual Web Terminal is not working in the Microsoft Edge browser

The Visual Web Terminal does not load in the Microsoft™ Edge browser. You can use the Chrome or Firefox browsers to use the Visual Web Terminal.

Hub cluster resources display as local-cluster in management console search results

Search returns and lists each cluster with the resource that you search. For resources in the hub cluster, the cluster name is displayed as local-cluster.

Mapping error for a certificate policy

When you create a certificate policy without a certificate policy controller for a third-party cluster, you might receive the following violation message:

   mapping error from raw object: no matches for kind "CertificatePolicy" in version "policies.ibm.com/v1alpha1"

You must unbind the certificate policy from your third-party cluster. Complete the following steps to unbind each of your certificate policies:

  1. Log in to your {{site.data.keyword.mcm_nptm}} hub cluster.

  2. From the navigation menu, click Automate infrastructure > Clusters.

  3. Create a unique label for each of your clusters with IBM Multicloud Manager services installed. Select the Options icon (Options icon) > Edit Labels.

  4. Add a new label for each of your clusters with IBM Multicloud Manager services installed by selecting the Add icon. For example, create the following label:

    cloud = common services
    
  5. From the navigation menu, click Govern risk > Policies tab to view your policies.

  6. Edit your certificate policy by updating the placement policy. Update the spec.clusterLabels parameter by removing and adding labels. Your placement policy might resemble the following content:

    spec:
      clusterLabels:
        matchExpressions:
          - key: cloud
            operator: In
            values:
              - common-services
    

Your certificate policies are unbound from your third-party clusters.

Image security enforcement is only supported by IBM Multicloud Manager registries

When you enable Vulnerability Advisor (VA) scanning in the ImagePolicy and ClusterImagePolicy specification, you are unable to create workloads in the associated namespaces. The VA scanning integration with image security enforcement only supports the built-in IBM Multicloud Manager registry. For more information, see Scanning an image registry with the Vulnerability Advisor (VA).