Closed ereslibre closed 3 years ago
The service account was created in the wrong namespace, sorry for the noise. Closing, works flawlessly!
Also, don't use if you're not going to have a jaeger sidecar collecting the logs:
- name: KUBEWARDEN_LOG_FMT
value: jaeger
In this configuration, policy-server will attempt to connect to localhost:something
, it will expect the jaeger collector to be there listening for incoming traces. If nothing is listening, this will cause an error inside of the policy-server. I think policy-server will keep running, but I'm not 100% sure
In this configuration, policy-server will attempt to connect to localhost:something, it will expect the jaeger collector to be there listening for incoming traces. If nothing is listening, this will cause an error inside of the policy-server. I think policy-server will keep running, but I'm not 100% sure
It was running... but to be honest I was more focused on the behavior of the upper part of the stack. Thanks for the detail though!
Policy server deployments are not created
Reproducer:
Deploy cert-manager:
kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.5.3/cert-manager.yaml
Deploy the latest kubewarden-controller. The helm chart on the
new-architecture
branch, plus this patch:And run:
helm install --wait --namespace kubewarden --create-namespace kubewarden-controller charts/kubewarden-controller
This leads to policy servers custom resources being created, but were never reconciled. They don't have any conditions, and there is only one PolicyServer deployment: the default one.
Policies are all in pending state: