-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Linkerd: Upgrade to 2.12 release #70
Comments
Helm chart The installation failure is the following helm install linkerd-viz --create-namespace linkerd/linkerd-viz
Error: INSTALLATION FAILED: unable to build kubernetes objects from release manifest: [unable to recognize "": no matches for kind "AuthorizationPolicy" in version "policy.linkerd.io/v1alpha1", unable to recognize "": no matches for kind "MeshTLSAuthentication" in version "policy.linkerd.io/v1alpha1", unable to recognize "": no matches for kind "NetworkAuthentication" in version "policy.linkerd.io/v1alpha1"] It fails because it is not able to find linkerd's CRDs that are installed only as part of new linkerd 2.12 chart ( Linkerd v2.12 has a a new installation procedure using helm Now the installation requires to deploy two different new charts (old chart
To solve this installation error, linkerd-viz previous release must be installed (specifying helm install linkerd-viz --version 2.11.4 linkerd/linkerd-viz |
Traefik proxy injection is not working with new versionlinkerd-control-plane helm chart includes configuration for # proxy injector configuration
proxyInjector:
# -- Do not create a secret resource for the proxyInjector webhook.
# If this is set to `true`, the value `proxyInjector.caBundle` must be set
# or the ca bundle must injected with cert-manager ca injector using
# `proxyInjector.injectCaFrom` or `proxyInjector.injectCaFromSecret` (see below).
externalSecret: false
# -- Namespace selector used by admission webhook.
namespaceSelector:
matchExpressions:
- key: config.linkerd.io/admission-webhooks
operator: NotIn
values:
- disabled
- key: kubernetes.io/metadata.name
operator: NotIn
values:
- kube-system
- cert-manager With this new configuration traefik proxy injection is not happening. Instead of removing kube-system namespace from the list of namespaces to be avoided, it is better to deploy traefik in a separate namespace. For doing that traefik k3s addon first need to be disabled. (k3s server argument Currently, Traefik k3s default configuration was already being changed by redeploying the Helm chart with a set of values (enabling prometheus metrics and access logs). Moreover a specific traefik namespace is being used for traefik resources: |
Upgrade software request
Upgrade Linkerd to the latest stable version, 2.12, released in Aug. See this linkerd announcement.
New features of release 2.12:
The text was updated successfully, but these errors were encountered: