New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to authenticate private repository #75379
Comments
kubeadm is not supported on Windows ATM.
the client is way outdated compared to the server. try upgrading to 1.13. |
The versioning is my bad, the master and all nodes are on v1.13.4. The client was my kubectl version that I was using for cli commands. |
thanks for the details, it was mentioned to me recently that kubeadm no longer works correctly on Windows nodes, but i have no means to test this ATM. ...it used to work a couple of years ago. here is the tracking issue for kubeadm to get this working correctly again in 1.15 (hopefully): if you find kubeadm / windows problems, please report them in that ticket.
seems like SIG Windows will have to respond to the original issue about the registry and |
/assign |
I tried on following k8s windows cluster set up by aks-engine,
|
could you paste the error logs by |
I removed the cluster and created a full Linux cluster instead to move forward with what I had to do. That being said I'm still interested in figuring this out. |
@ddebrecenijr K8s on Windows should support private registry with
aks-engine is a tool to deploy k8s on Azure, it could provision both Linux and Windows nodes. |
I will try it out and see how it goes. Thank you. |
With the drop of v1.14.0 offering full support for windows nodes, I am going to try and upgrade my cluster and add the windows node. Closing unless the issue persists. |
Confirmed to work. It was an oversight on my part with nesting imagePullSecrets inside the containers array. |
What happened:
Attempting to use secrets to authenticate for my deployments on a local cluster does not work correctly.
Using imagePullSecrets does not appear to do anything, whether creating it directly from docker/config.json or inputting credentials manually.
What you expected to happen:
Secrets should authenticate private repositories as described in documentation.
How to reproduce it (as minimally and precisely as possible):
Setup minimal cluster via kubeadm running Ubuntu Server master and Windows Server node.
Anything else we need to know?:
Nodes are all Windows based.
Environment:
kubectl version
):Client Version: version.Info{Major:"1", Minor:"10", GitVersion:"v1.10.3", GitCommit:"2bba0127d85d5a46ab4b778548be28623b32d0b0", GitTreeState:"clean", BuildDate:"2018-05-21T09:17:39Z", GoVersion:"go1.9.3", Compiler:"gc", Platform:"windows/amd64"}
Server Version: version.Info{Major:"1", Minor:"13", GitVersion:"v1.13.4", GitCommit:"c27b913fddd1a6c480c229191a087698aa92f0b1", GitTreeState:"clean", BuildDate:"2019-02-28T13:30:26Z", GoVersion:"go1.11.5", Compiler:"gc", Platform:"linux/amd64"}
cat /etc/os-release
): Master: Ubuntu Server 18.04, Nodes: Windows Server 1809uname -a
): Linux 4.15.0-46-generic/sig node
/sig windows
The text was updated successfully, but these errors were encountered: