-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Helm Install results in a CVAT instance where I am unable to login #3725
Comments
I'm having the exact same issue. Software works well in Docker Compose, but fails when I install it on a Google kubernetes cluster with the helm install. |
I've also been looking at this, but with an external postgres sql database. I installed with an override file:
Containing After install I can't login or create a super user using:
I get errors around the database usage. To understand I logged in and took a look around:
The password is not the one I set, ip address isn't the one I set, etc. So I changed the environment variables from the terminal and was able to successfully create a user:
I have been tinkering with the |
I found a bug related to using an external database and made a fix here: #3779 I am able to run I checked the frontend app and noticed that it also has some environment variables related to the postgres database that are not using my settings in the
|
I was experiencing the same issue last week. Similarly, I deployed CVAT on Kubernetes cluster with my modified deployment files. The main reason of this issue is about request routing on k8s cluster. Ingress on k8s is more complicated than the original docker-compose network.
I used ingress to configure routing. I see ingress is mentioned in helm chart but routing rules are not configured correctly. |
From the comments of @shortcipher3 and @TianbaoLi, I was curios if these errors were due to sub-packages that have changed from release v1.4.0 to v1.6.0. Performing the helm install with CVAT 1.4.0 resulted in the same behavior and errors but a bit different log information: 2021-10-11 18:44:27,051 DEBG 'ssh-agent' stdout output: 2021-10-11 18:44:27,051 DEBG 'ssh-agent' stderr output: 2021-10-11 18:44:27,055 DEBG 'rqworker_default_0' stderr output: 2021-10-11 18:44:27,058 DEBG 'rqworker_low' stderr output: 2021-10-11 18:44:27,062 DEBG 'git_status_updater' stderr output: 2021-10-11 18:44:27,063 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:44:27,064 DEBG 'runserver' stderr output: 2021-10-11 18:44:28,065 INFO success: ssh-agent entered RUNNING state, process has stayed up for > than 1 seconds (startsecs) 2021-10-11 18:46:38,042 DEBG 'rqworker_default_0' stderr output: 2021-10-11 18:46:38,044 DEBG 'runserver' stderr output: 2021-10-11 18:46:38,045 DEBG 'rqscheduler' stderr output: 2021-10-11 18:46:38,045 DEBG 'rqworker_default_0' stderr output: 2021-10-11 18:46:38,046 DEBG 'git_status_updater' stderr output: 2021-10-11 18:46:38,046 DEBG 'rqworker_low' stderr output: 2021-10-11 18:46:38,047 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:46:38,048 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:46:38,049 DEBG 'rqworker_low' stderr output: 2021-10-11 18:46:38,049 DEBG 'runserver' stderr output: 2021-10-11 18:46:38,050 DEBG 'git_status_updater' stderr output: 2021-10-11 18:46:38,160 DEBG 'rqscheduler' stderr output: 2021-10-11 18:46:38,170 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,173 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,379 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,381 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,383 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,383 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:46:38,388 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,389 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,394 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,400 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,407 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,411 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,416 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,422 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,429 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,433 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,435 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,439 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,442 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,444 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,449 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:38,456 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:45,380 DEBG 'rqworker_default_1' stderr output: WARNINGS: 2021-10-11 18:46:45,382 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:46:45,383 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:46:45,383 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:46:45,384 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:46:45,385 DEBG 'rqworker_default_1' stderr output: 2021-10-11 18:46:45,438 DEBG 'rqworker_default_0' stderr output: WARNINGS: 2021-10-11 18:46:45,457 DEBG 'rqworker_default_0' stderr output: 2021-10-11 18:46:45,458 DEBG 'rqworker_default_0' stderr output: 2021-10-11 18:46:45,459 DEBG 'rqworker_default_0' stderr output: 2021-10-11 18:46:45,460 DEBG 'rqworker_default_0' stderr output: 2021-10-11 18:46:45,461 DEBG 'rqworker_default_0' stderr output: 2021-10-11 18:46:45,510 DEBG 'rqworker_low' stderr output: WARNINGS: 2021-10-11 18:46:45,512 DEBG 'rqworker_low' stderr output: 2021-10-11 18:46:45,513 DEBG 'rqworker_low' stderr output: 2021-10-11 18:46:45,514 DEBG 'rqworker_low' stderr output: 2021-10-11 18:46:45,515 DEBG 'rqworker_low' stderr output: 2021-10-11 18:46:45,516 DEBG 'rqworker_low' stderr output: 2021-10-11 18:46:46,137 DEBG 'runserver' stdout output: 2021-10-11 18:46:46,138 DEBG 'runserver' stderr output: WARNINGS: 2021-10-11 18:46:46,888 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:46,892 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:46,893 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:46,898 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:47,503 DEBG 'runserver' stdout output: 0 static files copied to '/home/django/static', 182 unmodified. 2021-10-11 18:46:47,798 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:47,800 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:47,804 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:47,809 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:52,472 DEBG 'runserver' stderr output: WARNINGS: 2021-10-11 18:46:52,473 DEBG 'runserver' stdout output: 2021-10-11 18:46:52,475 DEBG 'runserver' stdout output: 2021-10-11 18:46:52,516 DEBG 'runserver' stderr output: 2021-10-11 18:46:52,517 DEBG 'runserver' stderr output: 2021-10-11 18:46:52,545 DEBG 'runserver' stderr output: 2021-10-11 18:46:52,550 DEBG 'runserver' stderr output: 2021-10-11 18:46:52,550 DEBG 'runserver' stderr output: 2021-10-11 18:46:52,747 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:52,749 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:52,755 DEBG 'ssh-agent' stderr output: 2021-10-11 18:46:52,760 DEBG 'ssh-agent' stderr output: blarson@ipc:/data/git/cvat$ |
FYI, I'm using CVAT 1.6. |
@TianbaoLi , thanks for comments and your suggestions. @bhlarson , we are going to support helm charts officially in the nearest future. For now I will close the issue. |
Thanks very much. I use this configuration in k8s and work apiVersion: extensions/v1beta1
kind: Ingress
metadata:
name: cvat-ingress
namespace: mynamespace
annotations:
kubernetes.io/ingress.class: nginx
kubernetes.io/tls-acme: "true"
ingress.kubernetes.io/ssl-redirect: "true"
nginx.ingress.kubernetes.io/use-regex: "true"
nginx.ingress.kubernetes.io/secure-backends: "true"
nginx.ingress.kubernetes.io/proxy-body-size: "0"
nginx.ingress.kubernetes.io/proxy-send-timeout: "120"
nginx.ingress.kubernetes.io/proxy-read-timeout: "120"
cert-manager.io/cluster-issuer: example.issuer.name
spec:
rules:
- host: myhost
http:
paths:
- path: /
backend:
serviceName: cvat-ui
servicePort: 80
- path: /api/.*|git/.*|tensorflow/.*|auto_annotation/.*|analytics/.*|static/.*|admin|admin/.*|documentation/.*|dextr/.*|reid/.*
backend:
serviceName: cvat-server
servicePort: 8080 |
if don't user ingress, only nodeport how should change routed |
My actions before raising this issue
Following the helm-chart install procedure produces a CVAT instance that is impossible to log in to:
Expected Behaviour
I would expect the superuser login described in How to crate a superuser or "Create an account" to successfully log into the CVAT annotation tool.
Current Behaviour
Instead, The "Could not check autorization on the sever" message was returned each time. The error details on the browser console only returns "Not Allowed" which is not helpful in diagnosing the problem.
Possible Solution
Steps to Reproduce (for bugs)
Helm Install:
Helm Overrides:
Helm Install from clone of CVAT repository
CVAT runtime following helm install:
Port forward backend:
Port forward frontend:
Chrome version: Chrome/94.0.4606.61 Safari/537.36" "-"
Context
Without the helm install, we cannot evaluate CVAT in our Kubernetes production environment.
Your Environment
git log -1
):docker version
(e.g. Docker 17.0.05):Kubernetes
Kubernetes and helm versions:
Logs from `cvat` container
Backend log:
Frontend Log:
Next steps
The text was updated successfully, but these errors were encountered: