-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to pass imagePullSecrets for the mover pods #1296
Comments
hi @dheerajjoshim thanks we will have to see whether we should expose this as an option on the replicationsource/dest or not. Getting the imagePullSecrets from the controller itself may not work as the secrets need to be local to the namespace the mover pod runs in. One thing you can do right now if you don't want to modify the serviceaccount after it's created by volsync is to use your own. Each mover spec has a |
@tesshuflower Yes. Maybe reusing the secret from the VolSync controller namespace is not possible in all cases. That said, I wasn't aware of the |
I think it may not have been documented as it was originally added for an internal use-case. Nonetheless, you can still use it if you wish. Each spec.[movertype]. section has a moverServiceAccount field, for example here for
|
For: backube#1296 Signed-off-by: Tesshu Flower <[email protected]>
@dheerajjoshim I've created a PR to add info about the moverServiceAccount to the documentation (#1303). You can see the docs built in the PR here: https://volsync--1303.org.readthedocs.build/en/1303/usage/moverserviceaccount.html Could you let me know if you have any feedback? Anything missing when it comes to your scenario? |
Hi @tesshuflower |
Describe the bug
Mover pods fail with an
ErrImagePull
error when the images are present in the secure registry. VolSync controller exposes theimagePullSecrets
variable in the helm chart. However the same is not used while creating the jobs during the reconciliation.Steps to reproduce
Use secure registries to deploy the VolSync controller and mover pods
Expected behaviour
Either one of the following
imagePullSecrets
specified during the controller deployment is reused during the mover job creation.imagePullSecrets
specified during the controller deployment is reused during the mover service account creation.imagePullSecrets
to the controller which can then be used while creating the jobs.Additional context
The workaround is to add an image pull secret to the mover service accounts after the job creation. The pod will eventually be up and running.
The text was updated successfully, but these errors were encountered: