Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hello, when you try to do a fresh install of instana-agent with a pdb enabled for k8s sensor, unfortunately the operator is logging errors and never proceed to creation of deployments / daemonsets etc.
The error in the logs:
{"level":"error","ts":"2024-12-06T12:06:50Z","logger":"instana","msg":"Reconciler error","controller":"instanaagent","controllerGroup":"instana.io","controllerKind":"InstanaAgent","InstanaAgent":{"name":"instana-agent","namespace":"instana-agent"},"namespace":"instana-agent","name":"instana-agent","reconcileID":"15202b79-0ad8-42e1-90fe-74fb130ba531","error":"Multiple Errors:\npoddisruptionbudgets.policy "instana-agent-k8sensor" is forbidden: User "system:serviceaccount:instana-agent:instana-agent-operator" cannot patch resource "poddisruptionbudgets" in API group "policy" in the namespace "instana-agent"\nMultiple Errors:\nDaemonSet.apps "instana-agent" not found\nSecret "instana-agent-config" not found\nDaemonSet.apps "instana-agent" not found\nDeployment.apps "instana-agent-k8sensor" not found\n\n","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:324\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:261\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2\n\t/go/pkg/mod/sigs.k8s.io/[email protected]/pkg/internal/controller/controller.go:222"}
A simple way to test:
set it to false in the agent CRD to see the agent being created or put the correct permissions on the cluster role.