-
Notifications
You must be signed in to change notification settings - Fork 4.3k
fix(helm): add missing RBAC permissions and fix TLS certificate naming for VPA admission controller #8968
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
|
|
Welcome @RotemK1! |
|
Hi @RotemK1. Thanks for your PR. I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: RotemK1 The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Thanks for openning this, but all of this will be solved once #8870 merges. /close |
|
@omerap12: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
PR Description Template
What type of PR is this?
/kind bug
What this PR does / why we need it:
This PR fixes two critical issues in the VPA Helm chart that prevent the admission controller from functioning correctly:
Missing RBAC Permissions: The ClusterRole for the admission controller was missing several required permissions:
create,update,deleteverbs formutatingwebhookconfigurations(needed for self-registration)deployments,statefulsets,replicasets,daemonsets(apps API group)jobs,cronjobs(batch API group)replicationcontrollers(core API group)Without these permissions, the admission controller fails with RBAC errors and cannot watch the resources it needs to provide recommendations.
TLS Certificate File Naming: The Helm chart creates TLS certificates with standard Kubernetes secret key names (
ca.crt,tls.crt,tls.key), but the VPA admission controller binary expects specific file names (caCert.pem,serverCert.pem,serverKey.pem). This mismatch causes the admission controller to fail to start with certificate file not found errors.Impact: These issues cause the VPA admission controller to fail during startup, preventing VPA from functioning properly. Users experience RBAC permission denied errors and TLS certificate file not found errors in the admission controller logs.
Environment Details:
registry.k8s.io/autoscaling/vpa-admission-controller:1.5.1Error Logs Observed:
After applying fixes, the admission controller starts successfully:
Which issue(s) this PR fixes:
Fixes #8938
Special notes for your reviewer:
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: