You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
$ helm install contour ~/code/charts-1/bitnami/contour -n default
manifest_sorter.go:192: info: skipping unknown hook: "crd-install"
manifest_sorter.go:192: info: skipping unknown hook: "crd-install"
manifest_sorter.go:192: info: skipping unknown hook: "crd-install"
manifest_sorter.go:192: info: skipping unknown hook: "crd-install"
NAME: contour
LAST DEPLOYED: Tue Jun 30 03:17:21 2020
NAMESPACE: default
STATUS: deployed
REVISION: 1
TEST SUITE: None
NOTES:
1. Get Contours's load balancer IP/hostname:
NOTE: It may take a few minutes for this to become available.
You can watch the status by running:
$ kubectl get svc contour --namespace default -w
Once 'EXTERNAL-IP' is no longer '<pending>':
$ kubectl describe svc contour --namespace default | grep Ingress | awk '{print $3}'
2. Configure DNS records corresponding to Kubernetes ingress resources to point to the load balancer IP/hostname found in step 1
Which chart:
bitnami/contour 1.0.0
Describe the bug
The envoy container fails to bind to port 80 or 443 without running it as root on a vanillla aws eks cluster.
To Reproduce
Steps to reproduce the behavior:
0. Vanilla EKS cluster with default eks.priveleged PSP
See: https://docs.aws.amazon.com/eks/latest/userguide/pod-security-policy.html
Expected behavior
I expect the chart to work without any modifications on a default EKS cluster.
Version of Helm and Kubernetes:
helm version
:kubectl version
:Additional context
Launch
Envoy container log error
The text was updated successfully, but these errors were encountered: