You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note, the root CA /etc/grid-security/certificates/5fca1cb1.0 is a secret deployed by the Kubernetes deployment file client.yaml.
This same Base64 encoded value is referenced by the fts.yaml deployment file.
However, it is not included as a secret accessible by the pod during the installation of the rucio/rucio-daemons Helm chart.
If we look at the source code for values.yaml file in the Helm chart, there doesn't appear to be a way to pass a secrets value and pod mount point for the daemons-renew-fts-proxy-on-helm-install-* to use.
The text was updated successfully, but these errors were encountered:
Yes, if you do `kubectl get secrets` you should be able to access all of
the secrets within the default namespace.
What I haven't been able to figure out is how you can reference the secret
using the `daemons.yaml` file which supplies the overrides to the
`values.yaml` file that the published helm chart uses.
That `values.yaml` doesn't seem to have a spot to reference secrets.
/Vincent
It appears as if the pod
daemons-renew-fts-proxy-on-helm-install-*
created during the installation of the daemons Helm chartdoes not have access to a root CA.
If we pull the logs for
daemons-renew-fts-proxy-on-helm-install-*
when it is reportingError
, we see the following:As a sanity check, the FTS service within the Minikube cluster environment was validated from the
client
pod# kubectl exec -it client -- /bin/bash
Note, the root CA
/etc/grid-security/certificates/5fca1cb1.0
is a secret deployed by the Kubernetes deployment fileclient.yaml
.This same Base64 encoded value is referenced by the
fts.yaml
deployment file.However, it is not included as a secret accessible by the pod during the installation of the
rucio/rucio-daemons
Helm chart.If we look at the source code for
values.yaml
file in the Helm chart, there doesn't appear to be a way to pass a secrets value and pod mount point for thedaemons-renew-fts-proxy-on-helm-install-*
to use.The text was updated successfully, but these errors were encountered: