-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nodeinit pods failing in 1.15.5 #32674
Comments
Actually, I think it may have been introduced here: |
Do you have any custom helm config related to the nodeinit pod? |
|
@dlahn can you provide the steps you used for both 1.15.4 and 1.15.5? Thank you |
@aanm I think it may have happened here, https://github.com/cilium/cilium/pull/31641/files#diff-0ea42ad21164b19bec1732225e254d3096d1e4040481c00053669287d81015fe, so I mispoke, and I think the last working verison was 1.15.3. If we simply upgrade the helm chart to the newest version, we receive these errors. The only way to get 1.15.4 to work is to add this to the nodeinit section:
However, this doesn't work in 1.15.5 |
Any ideas here? |
Hi! |
Adding these annotations seems to have resolved the issue for us. |
I ended up with the same issue/solution, found it by doing a helm chart diff. Which leads to the followup question of why containerd doesn't support the new profile type ? ..... Are you also running rancher RKE2? |
For me containerd is working fine in the end. The problem was coming from opentelemetry operator which has a mutating admission webhook and was removing the appArmorProfile key from the pod definition. |
Just cert-manager and cnpg for those (and an istio-sidecar-injector despite having removed istio a while ago) weirdly cilium did run fine after adding the annotations back? Haven't tried with a new cluster just yet. |
well cert-manager is not the problem. I'm using it too and the mutating webhook is not transforming the securityContext. |
I don't know cnpg but a quick look shows that you have some references to appArmorProfile in releases/cnpg-1.23.2.yaml |
Yeah but that webhook only applies to cnpg postgress backup objects according to it's rules. Either way the created cilium pods end up with the apparmor context defined as expected in the running pod spec |
Fixed, see the solution in here |
Is there an existing issue for this?
What happened?
We have recently tried to upgrade to 1.15.5 and the latest pre-release, but our nodeinit pods are failing with the following error:
Reverting to 1.15.4 resolves the issue.
Cilium Version
1.15.5
Kernel Version
.
Kubernetes Version
v1.30.0-gke.145700
Regression
1.15.4
Sysdump
No response
Relevant log output
Anything else?
No response
Cilium Users Document
Code of Conduct
The text was updated successfully, but these errors were encountered: