-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Couchdb pods perpetually crashing under OpenShift #13
Comments
I don't think this chart has been tested under OpenShift; it's difficult to speculate on the cause of the problem without more detail from the pod logs. That said, I'd recommend using the CouchDB Operator instead of the Helm chart for OpenShift / OKD deployments. |
Here are the logs from the init-copy containers (they are crashing), and output of describe pods: My goal is where possible to use a consistent set of upstream tools to deploy supplemental components (e.g. mariadb, nexus, ELK, jupyterhub, NiFi, Jenkins, ...). This reduces the maintenance effort and UX variations across k8s envs. But I will take a look at the Operator. In the meantime if you have any suggestions on the reason for the crash I would appreciate it, since the logs really don't tell me anything. |
@blsaws those logs look to be from the |
Nothing is returned from the logs: |
@blsaws you might need to use the |
No its just silently failing exiting 1 as well on Rancher with PSPs enabled.
Logs are empty even with In order to reproduce, run K8s cluster with follwoing PSP:
as it is default by Rancher and similar to OKD when enabling PSPs/SecurityContextClasses |
Looks like I have same issue, pods can not be created because of psp:
|
Some environments enforce PodSecurityPolicy checks and deployment fails if objects PodSecurityPolicy, ClusterRole and ClusterRoleBinding are not declared. This commit adds PodSecurityPolicy, ClusterRole and ClusterRoleBinding objects and adds new configuration option podSecurityPolicy, which is disabled by default. Related to apache#13
PR #30 resolves my issues with pod security policies:
@blsaws Could you please check if it resolves your issue as well? |
Looks like my issue is different from the original one, since in my case pods were not even created because they did not satisfy policies on the cluster. |
Describe the bug
Couchdb pods are continuously crashing under OpenShift.
Version of Helm and Kubernetes:
Helm
$ helm version
Client: &version.Version{SemVer:"v2.12.3", GitCommit:"eecf22f77df5f65c823aacd2dbd30ae6c65f186e", GitTreeState:"clean"}
Server: &version.Version{SemVer:"v2.12.3", GitCommit:"eecf22f77df5f65c823aacd2dbd30ae6c65f186e", GitTreeState:"clean"}
OpenShift
$ oc version
oc v3.11.0+0cbc58b
kubernetes v1.11.0+d4cacc0
features: Basic-Auth GSSAPI Kerberos SPNEGO
Server https://127.0.0.1:8443
kubernetes v1.11.0+d4cacc0
What happened:
Deployed the couchdb helm chart, and the pods are continually crashing.
Deployment commands:
helm repo add couchdb https://apache.github.io/couchdb-helm
helm install --name acumos-couchdb --namespace acumos
--set service.type=NodePort --set allowAdminParty=true couchdb/couchdb
What you expected to happen:
Couchdb pods should become ready. This happens as expected under generic kubernetes.
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know:
The text was updated successfully, but these errors were encountered: