-
Notifications
You must be signed in to change notification settings - Fork 326
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
API Gateway controller ACL init is broken in v0.48.0 #1479
Comments
Hi @manobi , looking into this |
@nathancoleman if there is something I can do by editing the Helm release, just tell me and I can try to help you debug. |
@manobi The fix that I linked above allows the acl-init job to complete for the API Gateway controller successfully when following the Federation Between Kubernetes Clusters guide; however, there are other issues beyond that one which prevent the controller-per-cluster setup described in hashicorp/consul-api-gateway#300 from working. Does the setup described there match what you're wanting to do? |
@nathancoleman My setup is based on Federation Between Kubernetes Clusters guide. Having a single API gateway for all clusters is not a requirement for me. I only need the API gateway working in the secondary cluster, routing requests for services running in secondary cluster (unlike hashicorp/consul-api-gateway#300). |
@nathancoleman, whilst having a single API gateway would be very useful for me, it's not a definite requirement. At the moment I cannot get either option to work. Ideally I'd like to be able to expose each service one one API gateway, but also separate API gateways, depending on the use for the gateway (for example client visibility etc.) Also, a single datacenter doesn't really work due to the requirement for communication between pods in different clusters. It is important that the networks are kept separate. Please keep me updated, currently I don't have a good alternative solution. |
@codex70 please see #1344 (comment) |
Community Note
Overview of the Issue
v0.48.0 uses k8s-auth when in secondary datacenters [GH-1462](by @nathancoleman), but after this upgrade API Gateway controller acl-init never finishes.
As mentioned in original issue, the consul-api-gateway-controller service account does not seems to have enough permission to perform authentication:
I've managed to run the following command in
controller-acl-init
but not inapi-gateway-controller-acl-init
container:I have also been able to complete the
initContainer
using the "consul-controller" service account instead of "consul-api-gateway-controller".But right now the Helm chart is broken and I have to keep api gateway disabled to keep using it.
Reproduction Steps
Logs
Expected behavior
Consul api-gateway-controller service account is expected to have authorization to run api gateway acl init.
Environment details
Additional Context
The text was updated successfully, but these errors were encountered: