-
Notifications
You must be signed in to change notification settings - Fork 691
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Getting a "cannot fetch certificate" when working with kubeseal client #317
Comments
did you deploy the controller via the helm chart? |
No. I took the yaml from https://github.com/bitnami-labs/sealed-secrets/releases/download/v0.9.5/controller.yaml and applied it via |
Good. Is the controller actually running (or crashlooping)? (Edit: ah I remember now that you said you tried the port forwarding) |
Yes controller is running:
|
Can it be related to using OpenId Connect as authprovider? |
I installed the controller via helm:
Initial call worked but after a couple of minutes I tried again only to receive the following error: cmd:
|
possibly. I just realized we don't expose a flag to control log verbosity for the k8s client library. |
can I get some more info, like the version of the k8s clusters you guys are running? |
I'm running |
@creydr and me are running a Kubernetes cluster on-premise setup with Kubespray running on 1.14.3. We are in an enterprise context though but even without using http proxies in between it is not working (direct clearance exists so access is possible in general), so we don't think that it is proxy-related. |
please try: shell 1:
shell 2:
|
Very interesting, I get an CNTLM error message despite not having any proxies configured:
and
We have cntlm running on our k8s servers and this problem shows also when trying to access other services like the kubernetes-dashboard, we will investigate tomorrow, thanks for the tip so far! |
@JamesDowning is it possible the container got restarted for some reason? |
what do you think about #282? would that help? Access to the controller via the proxy is still useful for features such as |
@mkmik I can't be 100% sure as I'm not the only one operating the cluster but the pods events don't suggest so:
|
Hi @mkmik, I tested it with your branch from #320 and got the following output (still hangs without result):
When trying to access another service via
|
Ideally I'd like kubeseal to transparently access your ingress and thus avoiding the whole class of problems caused by proxying calls via the apiserver. |
just to doublecheck: you can access but you can not access:
? If so, I'm tempted to conclude that it's not a client side problem. Could you please share:
? |
yes that is correct. I can curl the dashboard, but not the cert.pem:
The config of my service is:
|
Hi, Thanks |
I cannot reproduce the issue |
I had the same issue in v1.14.7-gke.23 cluster. Installed via stable helm chart sealed-secrets. Only works in bare metal. But in GKE this issue still actual
EP
Get cert
|
In GKE check firewall on 8080 port. Tf example:
|
So I was having the same issue and not sure if this is the issue, but: For reference, I am using:
I followed the normal instructions, and ran into the error when trying to create a secret. Thanks to @mkmik comments it helped me realize what the issue is. When the helm chart spins it up it's using "sealed-secrets" vs. "sealed-secrets-controller": I noticed that if I do the proxy method previously mentioned and run it:
Same thing using kubeseal client:
But if I curl using what matches the actual service name it works:
The controller.yaml on the release page seems to be correct (i.e. https://github.com/bitnami-labs/sealed-secrets/releases/tag/v0.9.6). |
We had the same problem on GKE and private cluster. Solved by solution suggested by @gfrntz (firewall rule for masters) |
We have some documentation about that: https://github.com/bitnami-labs/sealed-secrets/blob/master/docs/GKE.md#private-gke-clusters Improvements to the docs welcome (possibly in the shape of a PR :-) ) |
@mkmik what do you think to add that issue description / problem to FAQ with the link to mentioned GKE documentation and this issue. I figured it out that the proxy problem based on the ticket and later noticed that this solution has been provided ;) Something like that: I have 'dial tcp IP:8080 timeout' error and 'Trying to reach http://IP:8080' error. What I should do? And here as a response link to documentation which you pointed and link to this issue. What do you think? If it ok I can create MR. |
The GKE specific instructions are linked twice from the main README: That said, I guess that a FAQ entry could help those people who only notice that something is broken after otherwise successfully installing it (I have to admit that more often than not I'm a non-RTFM person myself too). Pull request welcome! let's discuss the exact wording in the PR review. |
Today I run into the same problem. My configuration is:
When I run
After trying to access the certificate using Most probably that proxy URL has been changed in some version of Kubernetes |
You might been affected by #397 . There is an open PR against the helm chart (which contains a bug) but the maintainers of the helm chart are currently unresponsive. |
@mkmik Thanks for the tip. I tried updated helm version and it works now |
Ticket can be closed, we were able to solve the issue. After adding the kubernetes internal pod and service subnets to the proxy exceptions, requests to the sealed-secrets-controller were not incorrectly routed to the proxy anymore but to the correct service inside of the kubernetes cluster. |
thanks for the feedback |
There is an issue with helm so you must use |
yeah if you use any other name you must set the environment variable |
I was facing the same issue while trying to fetch certificate. Here are the steps that worked for me.
|
same issue for me :
|
@shashank0202 same for me, did you found any solution? |
@macdrorepo thats the solution that I have posted above. ( #317 (comment) ) |
This issue might also be related. ArgoCD replaces |
I am seeing this problem using kubeseal 0.17.1 and and controller 0.17.1. This is an on-premises deployment so no cloud components.
The release name is |
Had the same issue with:
Replacing kubeseal.exe with the latest version fixed the problem for me. |
When trying to seal a secret with the kubeseal client like in the follwing, kubeseal hangs:
kubeseal < mysecret.yml -o yaml
When I set a timeout with the
--request-timeout
option, I get a more detailed message:using it via:
kubeseal < mysecret.yml -o yaml --cert certfile.cert
works.What am I doing wrong?
Some details about my setup:
Thanks for your help
The text was updated successfully, but these errors were encountered: