Bug ID 1109525: K3s cluster is unhealthy when the system date or time is changed

Last Modified: Oct 19, 2025

Affected Product(s):
F5OS Velos(all modules)

Fixed In:
F5OS-A 1.4.0, F5OS-A 1.2.0

Opened: May 25, 2022

Severity: 3-Major

Symptoms

When the system date is changed, some of the k3s cluster certificates becomes invalid, and pods enter into an unknown/non-operational state. Once the system date and time are made current, most pods will be recovered. Some of the virt-controller/virt-operator/virt-api kubevirt pods are in a failed state but tenant functionality is not affected.

Impact

Some of the k3s pods go into a failed/non-operational state.

Conditions

System date and time is changed back and forth.

Workaround

Re-spinning the certificates will restore the pods. Delete the pods to trigger a re-spin of certificates that are in a terminating or crashed state. The orchestration manager will start the pod with a new certificate. Command to delete the pod: #kubectl delete pod <pod-name> -n <name-space>

Fix Information

Only change the system date and time when necessary.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips