Help with Actions Runner Controller Service #676
Unanswered
crackedupcorson
asked this question in
Questions
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hey
I need some help with the controller service not responding after change in config within thevalues yaml (using Argo)
I'm running into an issues with getting the actions-runner-controller-webhook to run, and as a result, the RunnerDeployment and HRA won't become active.
I'm working on a POC to help see if this tool could be a viable option for wide use within our org, and had got it running and had a sample workflow executing - it's a fantastic tool and and the docs are great!
However, I wanted to go a step further and connect it up to an IAM role within the existing service account so that the runner could execute some terragrunt plans for PRs, and upon updating the values and deployment spec (for Argo to then apply), it lead to an unexpected error where the deployment webhook service seemingly had no endpoint
Internal error occurred: failed calling webhook "mutate.runnerdeployment.actions.summerwind.dev": Post https://actions- runner-controller-webhook.actions-runner-system.svc:443/mutate-actions-summerwind-dev-v1alpha1-runnerdeployment?timeout=30s: no endpoints available for service "actions-runner-controller-webhook"
A few key details
Here is our values-yaml, indented to actions-runner-controller as argo uses that as we're using umbrella/proxy charts within the same directory
Here is our RunnerDeployment, albeit a bit redacted
Here is our HRA, redacted too
Troubleshooting I've done so far
I've been able to get the status of the two services associated with this chart. should these services not expose an endpoint?
The controller pod is going into crashloopbackoff, which I guess is because the RunnerDeployment isn't completing so it's loading the default rather than the github_token (which this was was working with previously)? Here's the error:
Authentication failed: using private key of size 53 (/etc/actions-runner-controller/github_app_private_key...): could not parse private key: Invalid Key: Key must be PEM encoded PKCS1 or PKCS8 private key
I have a theory (from a quick investigation of the error on google) that there's an issue with argo/cert-manager and introducing IAM into the service account but I cannot be sure - we introduced OIDC as part of this POC to see if we could use GitHub actions for some terragrunt/terraform work
Beta Was this translation helpful? Give feedback.
All reactions