You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On a new EKS cluster (without anything previously installed), we're "tls: bad certificate" when trying to register a provisioner...which breaks our scale out. :(
We're using ArgoCD to install the karpenter helm chart....so our very ugly workaround is:
disable ArgoCD "auto-sync" for karpenter
delete all validating and mutating k8s webhooks
manually apply the desired Provisioner to the cluster (kubectl -f foo.yaml apply)
re-enable ArgoCD "auto-sync" for karpenter
observe karpenter restores the deleted k8s webhooks
rolling restart of the karpenter nodes (kubectl rollout restart deployment karpenter)
This allows us to get a Provisioner into the cluster (by skipping any validation), so the karpenter controller can build out nodes.
NOTE: any edits/updates of the Provisioner fail -- due the the same error: http: TLS handshake error from 10.42.172.163:50520: remote error: tls: bad certificate
BryanStenson-okta
changed the title
remote error: tls: bad certificate
webhook calls fails with "remote error: tls: bad certificate" and prevents management of Provisioners
Sep 27, 2023
Description
Observed Behavior:
On a new EKS cluster (without anything previously installed), we're "tls: bad certificate" when trying to register a provisioner...which breaks our scale out. :(
Karpenter: v0.27.6
EKS: v1.25.12-eks-2d98532
ArgoCD: v2.8.3+77556d9
Sample logs:
$ kubectl logs karpenter-provisioners-5cd99796cf-lrnbs -f
{"level":"info","ts":1695796080.7865567,"logger":"fallback","caller":"injection/injection.go:63","msg":"Starting informers..."}
2023/09/27 06:28:03 Registering 2 clients
2023/09/27 06:28:03 Registering 2 informer factories
2023/09/27 06:28:03 Registering 3 informers
2023/09/27 06:28:03 Registering 5 controllers
{"level":"INFO","time":"2023-09-27T06:28:03.864Z","logger":"controller","message":"Starting server","commit":"5a2fe84-dirty","path":"/metrics","kind":"metrics","addr":"[::]:8080"}
{"level":"INFO","time":"2023-09-27T06:28:03.867Z","logger":"controller","message":"Starting server","commit":"5a2fe84-dirty","kind":"health probe","addr":"[::]:8081"}
I0927 06:28:03.970155 1 leaderelection.go:248] attempting to acquire leader lease infra/karpenter-leader-election...
{"level":"INFO","time":"2023-09-27T06:28:04.009Z","logger":"controller","message":"Starting informers...","commit":"5a2fe84-dirty"}
2023/09/27 06:28:05 http: TLS handshake error from 10.42.172.163:50520: remote error: tls: bad certificate
...
I've x-posted this here, as possibly related/identical: knative/pkg#2560 (comment)
Expected Behavior:
no errors :)
Reproduction Steps (Please include YAML):
mostly stock helm chart (v0.27.0), with the following overrides (some details redacted here):
Versions:
kubectl version
): v1.25.12-eks-2d98532The text was updated successfully, but these errors were encountered: