-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
argocd-redis secret-init initcontainer timeout #18356
Comments
I also encountered the same phenomenon by following stable, installed v2.11.0 and rolled back. kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/v2.11.0/manifests/install.yaml |
Same here, also rolled back to 2.11.0 |
Same here |
Hi, change the selector to something like app.kubernetes.io/name: argocd-redis-tmp after that delete the Redis pod, it will now be able to create the secret and the system will start running. |
Download install.yaml and add Kubernetes API port (in my case 16443) to network policy:
|
same here, fixed by #18358 |
I have same issue with argocd-redis-ha-haproxy |
We faced the same problem and also patched the
|
In my case I had to use v2.11.0 and also update NetworkPolicy as above mentioned. |
i had the same issue and patched the apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: argocd-redis-network-policy
spec:
egress:
- ports:
- port: 53
protocol: UDP
- port: 53
protocol: TCP
- port: 6443 # your kubernetes api port
protocol: TCP
ingress:
- from:
- podSelector:
matchLabels:
app.kubernetes.io/name: argocd-server
- podSelector:
matchLabels:
app.kubernetes.io/name: argocd-repo-server
- podSelector:
matchLabels:
app.kubernetes.io/name: argocd-application-controller
ports:
- port: 6379
protocol: TCP
podSelector:
matchLabels:
app.kubernetes.io/name: argocd-redis
policyTypes:
- Ingress
- Egress
|
I think I had the same issue on |
Fixed in 2.11.2 |
issue persist in helm install |
@sirTangale Can you raise an issue in argo-helm, please? 😃 Also I'd like to mention that the helm chart is handling it slightly different (via a helm hook). Before Helm will deploy the core components of Argo CD (server / repo-server / ...), Helm will wait until the Secret is generated (the Job runs to completion without errors). I highly appreciate detailed steps to reproduce. |
Issue still persists in 2.12.6 |
hello same isssue on GKE with argocd-server:
i tried to add egresse rule for argocd-repo-server-network-policy but it did not work! |
Describe the bug
secret-init
initContainer is failing to check/initargocd/argocd-redis
secretTo Reproduce
Expected behavior
InitContainer should succeed to check/init secret
argocd/argocd-redis
Screenshots
Version
Logs
The text was updated successfully, but these errors were encountered: