-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
registry-creds addon: secrets stored with different name to defaults #2805
Comments
The flow for registry-creds is: |
Yes, I ran both of these steps. |
There is a similar issue with Docker Registry secret on the (currently latest) version 0.28. Minikube logs:
It's looking for a As a workaround, I created a copy of the |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
This sounds like an annoying behavior. Help wanted! |
To re-copy the secrets with the correct names:
|
Ran into this today. Some more info for anyone who may feel like tackling this (I might give it a go if I can find some time): If you look at the generated replication controller manifest for the registry-cred addon, it's clear that the goal is to be able to eschew the registry-cred args all-together and override them via env vars, a la:
Luckily, registry-creds allows for this! https://github.com/upmc-enterprises/registry-creds/blob/master/main.go#L350
....for some parameters. Unfortunately, the AWS access credentials are not included for some odd reason. It looks like there are 3 options to fix this:
|
Hello, ok @tstromberg, I will try to propose something very soon. |
/assign |
I ran into this ImagePullBackOff issue when deploying an application on minikube with an image stored in AWS ECR and the code in this comment above resolves it.
Followed this doc https://minikube.sigs.k8s.io/docs/tutorials/configuring_creds_for_aws_ecr/ completely, troubleshooing section did not help either until I stmbled upon this issue and executed the above code did the image get successfully pulled. |
I set this up today and did not run into this issue. Maybe it is fixed now? |
Ran into this issue with |
Environment:
Minikube version (use
minikube version
): v0.26.1cat ~/.minikube/machines/minikube/config.json | grep DriverName
): hyperkitcat ~/.minikube/machines/minikube/config.json | grep -i ISO
orminikube ssh cat /etc/VERSION
): v0.26.0What happened:
Using private ECR registry images with
registry-creds
addon.What you expected to happen:
Installing and configuring
registry-creds
with valid credentials would allow ECR images to be retrieved by minikube while creating pods.How to reproduce it (as minimally and precisely as possible):
minikube addons configure registry-creds
Output of
minikube logs
(if applicable):Anything else do we need to know:
awsecr-cred
registry-creds
to override this value, so it is left looking for secrets that don't exist:The text was updated successfully, but these errors were encountered: