Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to solve problem with chaos-runner image? #4587

Open
Alan-Vlc opened this issue Apr 16, 2024 · 3 comments
Open

How to solve problem with chaos-runner image? #4587

Alan-Vlc opened this issue Apr 16, 2024 · 3 comments

Comments

@Alan-Vlc
Copy link

Alan-Vlc commented Apr 16, 2024

Good morning,

The experiment is launched but at the time of downloading the chaos-runner:3.5.1 image I encounter a 401 error when downloading the image.

I have tried downloading the image locally and everything works correctly, however I cannot get the runner pod to include the "Image Secret" from my custom image registry.

image

image

image

The rest of the images are correctly obtained from my custom image registry with the corresponding "Image secret". I have checked that in the values ​​with which I carried out the installation, the value of imageRegistryName and imagePullSecrets is correctly specified.

How can I solve this issue?

@namkyu1999
Copy link
Member

hi, can you re-upload the third image?

@Alan-Vlc
Copy link
Author

Alan-Vlc commented Apr 17, 2024

Hi,

Attached is a screenshot in which you can see the error when obtaining the chaos-runner image.

image

The error is caused because the value of "Image secret" is not being taken.

I take this opportunity to attach the values.yaml file that I use in the installation.

`
portalScope: cluster

nameOverride: ""

customLabels: {}

existingSecret: ""

adminConfig:
JWTSecret: "litmus-portal@123"
VERSION: "3.5.0"
SKIP_SSL_VERIFY: "false"
DBPASSWORD: ""
DBUSER: ""
DB_SERVER: ""
DB_PORT: ""
ADMIN_USERNAME: ""
ADMIN_PASSWORD: "
**********"

image:
imageRegistryName: docker.artifactory.gcp.***************.com

imagePullSecrets:
- name: regcred

ingress:
enabled: true
name: litmus-ingress
annotations:

 nginx.ingress.kubernetes.io/rewrite-target: /$1

tls:
- secretName: tls-crt-wildcard

ingressClassName: "chaos-nginx-ingress-controller"
host:
name: "litmus-chaos.dev.gcp.****************.com"
frontend:

  path: /(.*)
  frontend path
  pathType: ImplementationSpecific
backend:
  
  path: /backend/(.*)
    pathType: ImplementationSpecific

upgradeAgent:
enabled: true
controlPlane:
image:
repository: litmuschaos/upgrade-agent-cp
tag: "3.5.0"
pullPolicy: "Always"
restartPolicy: OnFailure
nodeSelector: {}
tolerations: []
affinity: {}
resources: {}

portal:
frontend:
replicas: 1
autoscaling:
enabled: false
minReplicas: 2
maxReplicas: 3
targetCPUUtilizationPercentage: 50
targetMemoryUtilizationPercentage: 50
updateStrategy: {}

image:
  repository: litmuschaos/litmusportal-frontend
  tag: 3.5.0
  pullPolicy: "Always"
containerPort: 8185
customLabels: {}


resources:
  requests:
    memory: "150Mi"
    cpu: "125m"
    ephemeral-storage: "500Mi"
  limits:
    memory: "512Mi"
    cpu: "550m"
    ephemeral-storage: "1Gi"
livenessProbe:
  failureThreshold: 5
  initialDelaySeconds: 30
  periodSeconds: 10
  successThreshold: 1
  timeoutSeconds: 5
readinessProbe:
  initialDelaySeconds: 5
  periodSeconds: 10
  successThreshold: 1
  timeoutSeconds: 1
service:
  annotations: {}
  type: ClusterIP
  port: 9091
  targetPort: 8185
virtualService:
  enabled: false
  hosts: []
  gateways: []
  pathPrefixEnabled: false
nodeSelector: {}
tolerations: []
affinity: {}

server:
replicas: 1
updateStrategy: {}
serviceAccountName: litmus-server-account
customLabels: {}
waitForMongodb:
image:
repository: mongo
tag: latest
pullPolicy: "Always"
securityContext:
{}
resources:
requests:
memory: "150Mi"
cpu: "25m"
ephemeral-storage: "500Mi"
limits:
memory: "512Mi"
cpu: "250m"
ephemeral-storage: "1Gi"
graphqlServer:
volumes:
- name: gitops-storage
emptyDir: {}
- name: hub-storage
emptyDir: {}
volumeMounts:
- mountPath: /tmp/
name: gitops-storage
- mountPath: /tmp/version
name: hub-storage
securityContext:
runAsUser: 2000
allowPrivilegeEscalation: false
runAsNonRoot: true
readOnlyRootFilesystem: true
image:
repository: litmuschaos/litmusportal-server
tag: 3.5.0
pullPolicy: "Always"
ports:
- name: gql-server
containerPort: 8080
- name: gql-rpc-server
containerPort: 8000
service:
annotations: {}
type: ClusterIP
graphqlServer:
port: 9002
targetPort: 8080
graphqlRpcServer:
port: 8000
targetPort: 8000
imageEnv:
SUBSCRIBER_IMAGE: "litmuschaos/litmusportal-subscriber:3.5.0"
EVENT_TRACKER_IMAGE: "litmuschaos/litmusportal-event-tracker:3.5.0"
ARGO_WORKFLOW_CONTROLLER_IMAGE: "litmuschaos/workflow-controller:v3.3.1"
ARGO_WORKFLOW_EXECUTOR_IMAGE: "litmuschaos/argoexec:v3.3.1"
LITMUS_CHAOS_OPERATOR_IMAGE: "litmuschaos/chaos-operator:3.5.0"
LITMUS_CHAOS_RUNNER_IMAGE: "litmuschaos/chaos-runner:3.5.0"
LITMUS_CHAOS_EXPORTER_IMAGE: "litmuschaos/chaos-exporter:3.5.0"
genericEnv:
TLS_SECRET_NAME: ""
TLS_CERT_64: ""
CONTAINER_RUNTIME_EXECUTOR: "k8sapi"
DEFAULT_HUB_BRANCH_NAME: "v3.5.x"
INFRA_DEPLOYMENTS: '["app=chaos-exporter", "name=chaos-operator", "app=event-tracker", "app=workflow-controller"]'
LITMUS_AUTH_GRPC_PORT: ":3030"
WORKFLOW_HELPER_IMAGE_VERSION: "3.5.0"
REMOTE_HUB_MAX_SIZE: "5000000"
INFRA_COMPATIBLE_VERSIONS: '["3.5.0"]'
SELF_AGENT: "true"
CHAOS_CENTER_UI_ENDPOINT: "litmus-chaos.dev.gcp.********************.com"
resources:
requests:
memory: "250Mi"
cpu: "225m"
ephemeral-storage: "500Mi"
limits:
memory: "712Mi"
cpu: "550m"
ephemeral-storage: "1Gi"
livenessProbe:
failureThreshold: 5
initialDelaySeconds: 30
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
readinessProbe:
initialDelaySeconds: 5
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 1
authServer:
replicas: 1
autoscaling:
enabled: false
minReplicas: 2
maxReplicas: 3
targetCPUUtilizationPercentage: 50
targetMemoryUtilizationPercentage: 50
securityContext:
runAsUser: 2000
allowPrivilegeEscalation: false
runAsNonRoot: true
readOnlyRootFilesystem: true
automountServiceAccountToken: true
image:
repository: litmuschaos/litmusportal-auth-server
tag: 3.5.0
pullPolicy: "Always"
ports:
- name: auth-server
containerPort: 3030
- name: auth-rpc-server
containerPort: 3000
service:
annotations: {}
type: ClusterIP
authServer:
port: 9003
targetPort: 3000
authRpcServer:
port: 3030
targetPort: 3030
env:
LITMUS_GQL_GRPC_PORT: ":8000"
resources:
requests:
memory: "250Mi"
cpu: "225m"
ephemeral-storage: "500Mi"
limits:
memory: "712Mi"
cpu: "550m"
ephemeral-storage: "1Gi"
volumeMounts: []
volumes: []

nodeSelector: {}
tolerations: []
affinity: {}

openshift:
route:
enabled: false
name: litmus-portal
customLabels: {}
annotations: {}
host: ""

mongodb:

livenessProbe:
timeoutSeconds: 20
readinessProbe:
timeoutSeconds: 20

enabled: true
auth:
enabled: true
rootUser: "root"
rootPassword: "***********"
existingSecret: ""
architecture: standalone
replicaCount: 1
persistence:
enabled: true
volumePermissions:
enabled: true
metrics:
enabled: false
prometheusRule:
enabled: false

@Devendranathashok
Copy link

Devendranathashok commented Apr 30, 2024

@Alan-Vlc , Please add docker secret to your Service account (litmus-admin).
ex:
kind: ServiceAccount
apiVersion: v1
metadata:
name: litmus-admin
namespace: litmus
labels:
name: litmus-admin
imagePullSecrets:

  • name: regcred

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants