-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handle custom cluster-domain values doesn't work without certmanager #627
Comments
Hello @marandalucas 👋 I just had a look at it and I've tried re-creating the issue and it seems to be working fine on my side. Just so I understand:
I'm wondering: what version of the chart are you using and are you using the certificates created by the chart ? ( Also, could you share your certificate |
Hello @lucchmielowski 👍 If you want to recreate the issue you have to:
We'd like to avoid the cert-manager tool installation because of the following reasons:
Is there another way to fix this through parametrizing metrics-service-address or something like that? Thank you so much for this project |
Hi @marandalucas, sorry but I won't really have the time to test in GKE in the next few days, but both issues you shared looks to be linked to a miss-match between the cluster-domain of your cluster and your configuration and not an issue with the chart itself (I might have misunderstood something though) What makes me think of that is this part of the log you shared earlier :
as well as the
That does not seem related to a cert issue but more of an addressing issue Could it be possible that your GKE cluster is using the default
Also I understand that you don't want to setup |
Also, feel free to message me on the Kubernetes slack directly if you find it easier to have a "live" discussion about the issue. |
Hello @marandalucas , extraArgs:
# -- Additional KEDA Operator container arguments
keda:
k8s-cluster-domain: your-domain
clusterDomain: your-domain I guess that we could automatically set the arg with clusterDomain value? 🤔 @lucchmielowski WDYT? in any case, setting both you will be able to use KEDA without cert-manager. |
@lucchmielowski Hi! Thank you so much for this fix. #399
Unfortunately, It doesn't work for us.
HELM CONFIG
clusterDomain: gcp-prod-pv-na1-a.company.cluster.local
ERROR:
W0314 15:03:14.706154 1 logging.go:59] [core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: "keda-operator.keda.svc.gcp-prod-pv-na1-a.company.cluster.local:9666", ServerName: "keda-operator.keda.svc.gcp-prod-pv-na1-a.company.cluster.local:9666", }. Err: connection error: desc = "transport: authentication handshake failed: tls: failed to verify certificate: x509: certificate is valid for keda-operator, keda-operator, keda-operator.keda, keda-operator.keda.svc, keda-operator.keda.svc.cluster.local, keda-admission-webhooks, keda-admission-webhooks.keda, keda-admission-webhooks.keda.svc, keda-admission-webhooks.keda.svc.cluster.local, keda-operator-metrics-apiserver, keda-operator-metrics-apiserver.keda, keda-operator-metrics-apiserver.keda.svc, keda-operator-metrics-apiserver.keda.svc.cluster.local, not keda-operator.keda.svc.gcp-prod-pv-na1-a.company.cluster.local"
We wonder if you could fix it. We don't need cert-manager in our clusters.
Thanks in advance
The text was updated successfully, but these errors were encountered: