-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
.spec.volumes: field not declared in schema #381
Comments
|
@jtaleric Can you try running |
@vprashar2929 so, |
I want to do the same thing, on a bare metal (VM-based) cluster, deployed with kubespray, kubeadm. I already have prometheus operator deployed, as well. |
This PR address the issue sustainable-computing-io#381 by: * Enabling cert-manager that is necessary by webhooks during the deployment of Operator on k8s. * Adding support to deploy cert-manager when running `make deploy` target. * Including the installation of `cmctl`, a command line tool to manage cert-manager on k8s. Signed-off-by: Vibhu Prashar <[email protected]>
This PR address the issue sustainable-computing-io#381 by: * Enabling cert-manager that is necessary by webhooks during the deployment of Operator on k8s. * Adding support to deploy cert-manager when running `make deploy` target. * Including the installation of `cmctl`, a command line tool to manage cert-manager on k8s. Signed-off-by: Vibhu Prashar <[email protected]>
This PR address the issue sustainable-computing-io#381 by: * Enabling cert-manager that is necessary by webhooks during the deployment of Operator on k8s. * Added a separate config for k8s that contains the manifests that are specific for deploying on k8s. * `config/default` points to OpenShift specific manifests * `config/k8s` points to manifests specific for k8s * Added overlays in manager to isolate k8s and OpenShift Signed-off-by: Vibhu Prashar <[email protected]>
This PR address the issue sustainable-computing-io#381 by: * Enabling cert-manager that is necessary by webhooks during the deployment of Operator on k8s. * Added a separate config for k8s that contains the manifests that are specific for deploying on k8s. * `config/default` points to OpenShift specific manifests * `config/k8s` points to manifests specific for k8s * Added overlays in manager to isolate k8s and OpenShift Signed-off-by: Vibhu Prashar <[email protected]>
Anyone found out the workaround yet ? |
@elafontaine We will address this post by merging this. In the meantime, as a workaround, I suggest you can use operator-sdk to install operator on k8s
|
The last command did not execute correctly for me...
I'm was trying to avoid dealing with the openshift related tooling, but to keep using the operators as they're very useful :). Anyway, removing the last part of the command (the namespace option) I was able to deploy, but the
|
Ah, my bad you also need SCC CRD to be added. Can you also run these commands?
|
so I'm sorry, I didn't saw your message and I tried to start from the
I think the error may be related as it's a problem with the TLS volume again... |
that's correct |
ok, I've been continuing to try to deploy the operator, but it does require the cert-manager and only running the Can you help me understand why is the certificate signing a requirement for kepler operator ? |
#418 now addresses this issue. Now you can run Kepler operator on the vanilla k8s cluster: https://github.com/sustainable-computing-io/kepler-operator?tab=readme-ov-file#run-kepler-operator-on-vanilla-kubernetes |
@elafontaine Yes you can use
Operator make use of webhooks which need to communicate securely over HTTPS. That is why we need valid TLS certs to establish the connection |
Attempting to deploy, with
Following the docs to deploy the operator, I ran :
The text was updated successfully, but these errors were encountered: