-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not able to configure dynamic Kubernetes Accounts using Vault in Spinnaker #28
Comments
I am running into the same issue. Credentials are visible in clouddriver/credentials endpoint and they seem correct. Spinnaker: 0SS 1.26.6 clouddriver log output:
Logs from a test deployment trying to use the newly added account
[
{
"accountType": "client1-ekscluster",
"challengeDestructiveActions": false,
"cloudProvider": "kubernetes",
"environment": "client1-ekscluster",
"name": "client1-ekscluster",
"primaryAccount": false,
"requiredGroupMembership": [],
"type": "kubernetes"
}
] clouddriver config spinnaker:
extensibility:
plugins-root-path: /opt/clouddriver/plugins
plugins:
Armory.EAP:
enabled: true
version: 0.1.2
repositories:
eap:
enabled: true
url: https://raw.githubusercontent.com/armory-plugins/external-accounts/master/plugins.json
armory:
external-accounts:
dir: /var/accounts
file-prefix:
default: clouddriver
kubernetes: kube
credentials:
poller:
enabled: true
types:
kubernetes:
reloadFrequencyMs: 180000 Using a side car to populate local files.
kubeconfig file is valid:
|
Never mind it was my bad. In one of structs for sidecar code, I had type Account struct {
Name string `json:"name"`
KubeconfigFilePath string `json:"kubeconfigFile"`
} Output file is not a JSON file so serialization tags are wrong. |
I had setup the config as mentioned in the doc https://docs.armory.io/docs/armory-admin/dynamic-accounts-configure/ , and configured spinnaker to access my kubernetes cloud providers accounts dynamically from vault .
I was able to successfully add kubernetes accounts as deployment targets. Deployments to those accounts were also successful.
But recently i observed, even though the accounts are getting added in the same manner, (that is, the account credentials are reflecting in the gate-endpoint/credentials url.) deployments are always happening to the cluster where Spinnaker is running( instead of the target accounts selected). Tried the same config several times but had no luck.
These are the clouddriver logs -
2021-04-29 12:36:36.772 INFO 1 --- [0.0-7002-exec-6] c.n.s.c.k.v.KubernetesValidationUtil : Validating credentials for spinpoc-GKE namespace
2021-04-29 12:36:36.786 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [ORCHESTRATION] Processing op: KubernetesDeployManifestOperation
2021-04-29 12:36:36.788 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Beginning deployment of manifest...
2021-04-29 12:36:36.789 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Swapping out artifacts in namespace demons from context...
2021-04-29 12:36:36.791 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Finding deployer for namespace...
2021-04-29 12:36:36.793 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Checking if all requested artifacts were bound...
2021-04-29 12:36:36.795 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Sorting manifests by priority...
2021-04-29 12:36:36.798 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Deploy order is: namespace demons
2021-04-29 12:36:36.800 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Finding deployer for namespace...
2021-04-29 12:36:36.802 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Annotating manifest namespace demons with artifact, relationships & moniker...
2021-04-29 12:36:36.804 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Swapping out artifacts in namespace demons from other deployments...
2021-04-29 12:36:36.815 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Submitting manifest namespace demons to kubernetes master...
2021-04-29 12:36:37.418 INFO 1 --- [tionProcessor-3] c.n.s.c.data.task.jedis.JedisTask : [DEPLOY_KUBERNETES_MANIFEST] Deploy manifest task completed successfully.
Kindly help me with this. Thanks in advance! :)
The text was updated successfully, but these errors were encountered: