Skip to content
This repository has been archived by the owner on Nov 1, 2022. It is now read-only.

couldn't get resource list for webhook.certmanager.k8s.io/v1beta1 #2554

Closed
aungzy opened this issue Oct 25, 2019 · 11 comments · Fixed by #2749
Closed

couldn't get resource list for webhook.certmanager.k8s.io/v1beta1 #2554

aungzy opened this issue Oct 25, 2019 · 11 comments · Fixed by #2749
Assignees

Comments

@aungzy
Copy link

aungzy commented Oct 25, 2019

Describe the bug
After installing flux in OpenShift 4.2 cluster, the operator was able to refresh git repository, but not able to sync resources.
I am seeing the following 2 error messages:

type="internal kubernetes error"
kubernetes_caller=k8s.io/[email protected]+incompatible/discovery/cached/memory/memcache.go:111
err="couldn't get resource list for webhook.certmanager.k8s.io/v1beta1: the server is currently unable to handle the request"

component=sync-loop
err="collating resources in cluster for sync: unable to retrieve the complete list of server APIs: webhook.certmanager.k8s.io/v1beta1: the server is currently unable to handle the request"

To Reproduce
Steps to reproduce the behaviour:
0. What's your setup? As per https://docs.fluxcd.io/en/latest/tutorials/get-started.html

Expected behavior
Flux should be able to successfully run kubectl apply command to sync resources.

Additional context

  • Flux version: 1.15.0
  • Kubernetes version: 1.14 (with OpenShift 4.2)
  • Git provider: Gitlab CE
@aungzy aungzy added blocked-needs-validation Issue is waiting to be validated before we can proceed bug labels Oct 25, 2019
@martintomac
Copy link

I had the same issue. Upgrading cert-manager solved the issue for me.

Additional context

Flux version: 1.15.0
Kubernetes version: 1.16 (Rancher)
Git provider: Gitlab CE

@ambis
Copy link

ambis commented Nov 18, 2019

Same problem here. Started out of the blue as per the logs (2019-11-15 midnight). No changes in flux source repo, none of the cluster components other than my app itself is automated for updates.

Running k3s v0.10.2, cert manager 0.11.0 and flux 1.15.0.

I deleted cert-manager completely with delete -f and flux reapplied it (now that it started working), and boom, here comes the error again.

@cmanzi
Copy link

cmanzi commented Jan 7, 2020

Can confirm I'm seeing this with Flux 1.17.0 as well. Both cert-manager and metrics-server API services. Restarting the Flux pod seems to get fix it.

@2opremio 2opremio changed the title Error in collating resources in cluster for sync couldn't get resource list for webhook.certmanager.k8s.io/v1beta1 Jan 10, 2020
@2opremio 2opremio self-assigned this Jan 10, 2020
@2opremio 2opremio removed the blocked-needs-validation Issue is waiting to be validated before we can proceed label Jan 10, 2020
@2opremio
Copy link
Contributor

I will make sure we exclude webhook.certmanager.k8s.io resources by default, and make the excluded resources configurable as per #2642

@2opremio
Copy link
Contributor

Note that this is a problem with Kubernetes or the configuration of Kubernetes itself, which fails to answer List requests for webhook.certmanager.k8s.io/v1beta1

@2opremio 2opremio added enhancement and removed bug labels Jan 10, 2020
@aungzy
Copy link
Author

aungzy commented Jan 11, 2020

Thanks @2opremio !

@clearclaw
Copy link

ETA on this?

@2opremio
Copy link
Contributor

2opremio commented Jan 15, 2020

I am going to work on this tomorrow, can't promise a specific date when it will be released.

@clearclaw
Copy link

Thanks. We use cert-manager heavily and this is rather balling things up while I'm trying to sell the team on Flux, so a quick point release would be appreciated.

@stefanprodan
Copy link
Member

@clearclaw having Flux ignore the webhook resource doesn't solve the underlying issue with your cluster. My guess is that either your cluster etcd is corrupted or you need to create a firewall rule see cert-manager/cert-manager#2109

@clearclaw
Copy link

Ahh, excellent pointer! And yeah, we're using private GKE clustes with private nodes, which breaks a few common assumptions about network accessibility. Good catch. Thanks.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

7 participants