/var/log/vmware/wcp/wcpsvc.log
contains entries similar to:
YYYY-MM-DDThh:mm:ss.xxxxZ debug wcp [kubelifecycle/kube_instance.go:4395] [opID=XXXXXXXX-56c23714-4bb3-4079-878b-YYYYYYYYYYYY] Cluster is not ready yet, would retry in 1m0s time.
YYYY-MM-DDThh:mm:ss.xxxxZ debug wcp [kubelifecycle/kube_instance.go:4395] [opID=XXXXXXXX-56c23714-4bb3-4079-878b-YYYYYYYYYYYY] Cluster is not ready yet, would retry in 1m0s time.
YYYY-MM-DDThh:mm:ss.xxxxZ debug wcp [kubelifecycle/kube_instance.go:4395] [opID=XXXXXXXX-56c23714-4bb3-4079-878b-YYYYYYYYYYYY] Cluster is not ready yet, would retry in 1m0s time.
YYYY-MM-DDThh:mm:ss.xxxxZ debug wcp [kubelifecycle/kube_instance.go:4395] [opID=XXXXXXXX-56c23714-4bb3-4079-878b-YYYYYYYYYYYY] Cluster is not ready yet, would retry in 1m0s time.
YYYY-MM-DDThh:mm:ss.xxxxZ debug wcp [kubelifecycle/kube_instance.go:4395] [opID=XXXXXXXX-56c23714-4bb3-4079-878b-YYYYYYYYYYYY] Cluster is not ready yet, would retry in 1m0s time.
vSphere with Tanzu
Service accounts like wcp-cluster-user, wcp-vmop-user, wcp-storage-user etc. get locked while the reset is happening at the wcpsvc side. This has been observed across VC 7.x , 8.x and 9 as well.
Password rotation will have 2 parts to it:
Now, there can be scenarios where the step 1 is completed and step 2 is ignored due cluster being unhealthy or client creation errors. As this is a go routine and not part of the reconcile loop the retry to update the secret will only happen after the scheduled 1 minute retry delays. While the credentials stay invalid at the supervisor cluster side, the consumer of the secret mostly operators keep on fetching sessions using the invalid password. This will cause the service account to get locked.
To fix this issue, please follow the steps outlined in the following KB CSI: Correct sync between CSI pod secret and workload_storage_management user password in vSphere with Tanzu