-
steps :
[a@dhcp47-98 files]$ k apply -f client-test-pod.yaml [a@dhcp47]$ k get pods events: 35m Normal Scheduled pod/smbclient Successfully assigned samba-operator-system/smbclient to minikube Hi plz, let me know if I missed any steps , |
Beta Was this translation helpful? Give feedback.
Replies: 16 comments 2 replies
-
Hello there. I'm happy to see someone new trying out samba operator! The yaml manifest client-test-pod.yaml depends on the config map sample-data1. This config map is currently kept at tests/files/data1.yaml. Create the configmap using something like |
Beta Was this translation helpful? Give feedback.
-
Hi Thanks the above problem is solved , but now
tshare2-85464f98c4-njldh <<<<-- is not coming up ? in events also not seen any errors |
Beta Was this translation helpful? Give feedback.
-
Events: Normal Scheduled 2m5s default-scheduler Successfully assigned samba-operator-system/tshare2-8bf9f566d-k2gw6 to minikube |
Beta Was this translation helpful? Give feedback.
-
If you're using the same YAML files from For tshare2 this is kept in the yaml file |
Beta Was this translation helpful? Give feedback.
-
I am trying to use something like
is it correct? |
Beta Was this translation helpful? Give feedback.
-
Looks mostly OK, but I do see that the secret resource specifies a namespace but the SmbSecurityConfig does not. So depending on what your Also, what password you use depends on your AD if you're using the same AD server container that the tests do, the password is different. But it's totally OK if want to change the password. So again, I can't say if it's right or wrong. But it is different. |
Beta Was this translation helpful? Give feedback.
-
@phlogistonjohn I am facing the same issue as @milindw96 mentioned. I am using the files from /test/files. Standalone pods are up and running without issues. But the pods with active-directory mode on smbsecurityconfig stuck at init state. Please clarify any prerequisite needs to be done before running the samba-operator for AD. |
Beta Was this translation helpful? Give feedback.
-
Hi @rravi6121 I suspect that the issue is similar too, the AD domain member instances has more dependencies that the standalone and more opportunities to get stuck. :-) Can you please run PS. It's generally better to copy and paste text from your terminal over a screenshot image. When you paste you can surround the text in three backticks (```) on their own line before and after your paste to make it clear what you pasted. An example:
|
Beta Was this translation helpful? Give feedback.
-
Thanks @phlogistonjohn, Please find the output of "kubectl describe pod" below:
|
Beta Was this translation helpful? Give feedback.
-
Thanks. Based on that output I suspect that "must-join" is unable to join the pod to active directory. The best thing we can do next is to see why must-join is not proceeding. That's usually because the join information doesn't match AD or AD is unreachable. Run |
Beta Was this translation helpful? Give feedback.
-
Thanks @phlogistonjohn I have deployed AD pod using yaml with "kubectl apply -f" command and that might be the reason for the issue. I tried deploying with shell script ./tests/test-deploy-ad-server.sh and the pod is up and running without issues
Steps followed:
|
Beta Was this translation helpful? Give feedback.
-
Hi @phlogistonjohn ,
I am trying to manually deploy the pods with the configuration yaml files and not using the shell script on tests folder. Please find the yaml files below: joinsecret.yaml
smbsecurityconfig.yaml
samba-ad-server-deployment.yaml
smbshare.yaml
coredns-snippet.template
/etc/hosts/ file inside samba-ad-server pod
Please let me know whether I have missed anything and help me on this. |
Beta Was this translation helpful? Give feedback.
-
Hi, I'm happy to help, but it feels like a lot of what in in this issue is general setup and debugging help rather than a defect/bug. Do you mind if I first convert this issue to a github discussion? |
Beta Was this translation helpful? Give feedback.
-
Sure @phlogistonjohn , It wont be a problem. |
Beta Was this translation helpful? Give feedback.
-
@phlogistonjohn I have gone through the debugging steps you have shared, I have setup a pod with dig and the windows AD server is reachable, But the error persist. So I doubt the configuration that I have done. Please find the configurations which I followed below and let me know if anything missed out.
|
Beta Was this translation helpful? Give feedback.
-
The issue with must-join failure is coredns of k8s cluster couldnt connect to the outside world where the windows AD lives in. To do this, copy the file https://github.com/samba-in-kubernetes/samba-operator/blob/master/tests/files/coredns-snippet.template. Replace "domain1.sink.test" to your realmname and change "AD_SERVER_IP" to the actual IP of the Domain Controller on this template. Run "kubectl edit cm -n kube-system coredns", it will open a editor with coredns configuration. Copy the content from template file created on the above step and paste it as a subsection of "Corefile: |" section. Wait for 30s and the changes would get effective. With this, k8s cluster reach outs to the AD DC through port 53. Test whether the domain reachable from the dnsutils pod and the smbshare pod would invoked without issues! Thanks @phlogistonjohn for these debugging/resolution steps. With this we can close this discussion! |
Beta Was this translation helpful? Give feedback.
The issue with must-join failure is coredns of k8s cluster couldnt connect to the outside world where the windows AD lives in.
To check whether k8s cluster able to reach out to your domain, setup a pod with "gcr.io/kubernetes-e2e-test-images/dnsutils:1.3" image on the same k8s cluster and run dig command. if the query status is "NXDOMAIN", then we need to teach our coredns of our cluster to reach out the windows AD DC.
To do this, copy the file https://github.com/samba-in-kubernetes/samba-operator/blob/master/tests/files/coredns-snippet.template. Replace "domain1.sink.test" to your realmname and change "AD_SERVER_IP" to the actual IP of the Domain Controller on this template.
Run "kubectl…