Closed bennysp closed 1 year ago
You can mount the CA via the Helm values
extraVolumes:
- name: ssl-certs
configMap:
name: your-ca
extraVolumeMounts:
- name: ssl-certs
mountPath: /etc/ssl/certs
readOnly: true
With your ConfigMap in the same namespace as the autoscaler.
apiVersion: v1
data:
ca-certificates.crt: |
-----BEGIN CERTIFICATE-----
...
...
-----END CERTIFICATE-----
kind: ConfigMap
metadata:
name: your-ca
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
Which component are you using?: cluster-autoscaler
What version of the component are you using?:
Component version: 1.26.1
What k8s version are you using (
kubectl version
)?:kubectl version
OutputWhat environment is this in?:
What did you expect to happen?:
N/A
What happened instead?:
F0121 21:22:16.799439 1 rancher_provider.go:69] failed to create rancher cloud provider: failed to get ServerGroups: Get "https://rancher.domain.com/api?timeout=32s": x509: certificate signed by unknown authority
How to reproduce it (as minimally and precisely as possible):
Deploy rancher with custom CA for the Management cluster.
Anything else we need to know?:
My Rancher cluster is using a custom CA. I believe the cloud config may need an option to specify the CA (like in a kubeconfig file).