Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

failed to mount volume for mtls cert for target allocator #3563

Open
travisghansen opened this issue Dec 20, 2024 · 0 comments
Open

failed to mount volume for mtls cert for target allocator #3563

travisghansen opened this issue Dec 20, 2024 · 0 comments
Labels
bug Something isn't working needs triage

Comments

@travisghansen
Copy link

Component(s)

collector, target allocator

What happened?

Description

When mtls support is enabled in the operator deployments that do not have target allocator enabled are failing because the secret does not exist:

MountVolume.SetUp failed for volume "default-ta-client-cert" : secret "default-ta-client-cert" not found

The secret isn't being created (presumably) because target allocator isn't enabled on the CR but the deployment is still requiring the mount.

Steps to Reproduce

Enable mtls for TA. Deploy a collector without TA enabled.

Expected Result

No mtls secrets are created, no secrets are required to start the collector.

Actual Result

TLS secrets are not created (as expected when TA is disabled), secret is required by the collector pod to start.

Kubernetes Version

1.31

Operator version

ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator:0.114.1

Collector version

otel/opentelemetry-collector-k8s:0.114.0

Environment information

No response

Log output

No response

Additional context

open-telemetry/opentelemetry-helm-charts#1469

@travisghansen travisghansen added bug Something isn't working needs triage labels Dec 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working needs triage
Projects
None yet
Development

No branches or pull requests

1 participant