-
Notifications
You must be signed in to change notification settings - Fork 193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
F5-cis needs a restart to use updated kubeconfig secret #3727
Comments
Created [CONTCNTR-5196] for internal tracking. |
@achaudh25 Hi, need some information to reproduce the issue. can you confirm, if the kubeconfig is expired for the cluster, is the secret updated with new kubeconfig ? or secret with old kubeconfig is deleted and created with new kubeconfig? |
|
Hi avani, thanks for the info.
dev build: lavanyasirigudi/k8s-bigip-ctlr:kubeconfig_update_fix For primary clusters(i.e local cluster) where cis is running, kubeconfig is read from inClusterConfig provided by Kubernetes. Secret update will have no impact on local cluster. Please share your feedback with the build. |
We tested the new build in our environment and it worked for us. Thanks for help |
Just a follow up question when this will be released. |
Setup Details
CIS Version : 2.19
Build: f5networks/k8s-bigip-ctlr:latest
BIGIP Version: Big IP v17.1.1.3
AS3 Version: 3.52
Agent Mode: AS3
Orchestration: K8S
Orchestration Version:
Pool Mode: Nodeport
Additional Setup details: Rancher/Calico network
Description
When kubeconfig secret changes f5-cis still keep using the cached old secret. To update the secret f5-cis needs a restart.
Steps To Reproduce
Failed to watch CustomPolicy in secondary cluster User system:unauthenticated cannot get resources
Expected Result
Change in kubeconfig secret detected by f5-cis and no restart needed.
The text was updated successfully, but these errors were encountered: