-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
manager.go
"x509: certificate signed by unknown authority, unable to fully scrape metrics from source"
#541
Comments
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale This issue has never been responded to... There was a response in kubernetes/kops#6879 (comment) , but that revealed that there's a missing capability required for this to work 😕 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
I think problem was resolved by kubernetes/kops#10022 on kops side and #589 on Metrics Server side. Feel free to reopen if problem still persists. |
For my friends on EKS make sure you have the username set (and not set to just the session name like I did):
|
I've exhausted all the options and tried A TON of different possible fixes (been at it for more than a full day) but none worked, so I am thinking this may be a bug here and writing here
What happened:
I deployed
metrics-server
onto akops
cluster on AWS using the Helm chart with no changes.metrics-server
errors with the full logs listed below. Summarized by the title and a short snippet below:Per the FAQ, I tried to set
--kubelet-certificate-authority
to thekops
CA (hostPath
/srv/kubernetes/ca.crt
), but still got this error. I tried setting--client-ca-file
to that as well and still got this error.I tried changing
--requestheader-client-ca-file
(which seems to only be forkubeadm
and unrelated) to this CA cert as well as to theproxy-client
CA but then got theauthentication.go
error that that was supposed to fix per the FAQThe only thing that worked for me was setting
--kubelet-insecure-tls
which made the errors disappear and madekubectl top nodes
start working. But this is, of course, insecure and a MITM attack vector, but I couldn't get any other flag to work 😕Does the
--kubelet-certificate-authority
flag not work? I looked at various issues and none of them really resolve it, they all say to set--kubelet-insecure-tls
. Many are DNS issues which I'm not having.What you expected to happen:
Helm installation to either work without configuration (validating against the cluster CA) or to work once
--kubelet-certificate-authority
is specified.Anything else we need to know?:
I have set
--authentication-token-webhook=true
and--authorization-mode=Webhook
as you can see below viakops
config. (without these, and without performing arolling-update
after setting them, I get401 Unauthorized
instead, which is expected. Once they are set, this error happens instead).My error and config look very similar to #362 (comment) who also asked if the
--kubelet-certificate-authority
flag was ignored.I'm getting this error in multiple clusters, on multiple k8s and
kops
versions, all of them have the same error.Environment:
kops
on AWS. v1.15 and v1.17, errors in bothkubectl version
): v1.15.11 in some, v1.18.3 in others, errors in bothhelm upgrade --install metrics-server
with the defaults. Some changes tried as listed aboveOpen spoiler for logs:
Most relevant snippet:
Full logs:
/king bug
The text was updated successfully, but these errors were encountered: