Open reidab opened 1 week ago
For anyone else who finds this, I've temporarily worked around it by explicitly adding extraEnv
values in the worker and launcher configuration to override the incorrectly-set env var.
extraEnv:
- name: CONTAINER_ORCHESTRATOR_SECRET_NAME
value: airbyte-gcs-log-creds
@airbytehq/platform-deployments can someone take a look into this?
Ran into the same issue, thanks @reidab for the workaround which worked for me also !
Helm Chart Version
airbyte-1.2.0
What step the error happened?
During the Sync
Relevant information
When using GCS storage, the Helm chart supports configuring credentials either using an existing k8s secret passed in
global.storage.storageSecretName
or by settingglobal.storage.gcs.credentialsJson
to the base-64 encoded JSON of the credentials file.If you pass the credentials JSON directly, this template will render a secret called
{{ .Release.Name }}-gcs-log-creds
: https://github.com/airbytehq/airbyte-platform/blob/4ece0a2719873d4ca28c44362b363ba2786381c7/charts/airbyte/templates/gcs-log-creds-secret.yaml#L1-L6This secret is only created if the following conditional is true:
This means that if
global.storage.storageSecretName
is set, this-gcs-log-creds
secret will not be created, leaving you with two options:global.storage.storageSecretName
global.storage.storageSecretName
unset and pass credentials to have the-gcs-log-creds
secret created automatically.Jumping over to the deployment templates for the worker and workload launcher pods, both of them define a
CONTAINER_ORCHESTRATOR_SECRET_NAME
using theairbyte.secretStoreName
helper pointed toglobal.storage.storageSecretName
.If
global.storage.storageSecretName
is not set,airbyte.secretStoreName
will fall back to a value ofairbyte-config-secrets
.Given all that, if you try to run using GCS storage with the configuration at the top of this post — with credentials passed to
global.storage.gcs.credentialsJson
andglobal.storage.storageSecretName
unset — you end up with your credentials stored in a secret called{deployment-name}-gcs-log-creds
, but your worker and launcher pods referencing a secret calledairbyte-config-secrets
that does not exist. This causes all worker pods to fail to start.It seems like the two options are:
{deployment-name}-gcs-log-creds
instead ofairbyte-config-secrets
whenglobal.storage.storageSecretName
is not set.global.storage.storageSecretName
to set the name of the secret it creates instead of always using{deployment-name}-gcs-log-creds
.Relevant log output