-
Notifications
You must be signed in to change notification settings - Fork 726
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document limitation on Minikube without CNI #6075
Conversation
Fleet Server initialization fails on minikube when CNI is disabled
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
1 similar comment
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
@@ -532,6 +532,11 @@ To establish trust, the Pod needs to update the CA store through a call to `upda | |||
=== Running Endpoint Security integration | |||
Running Endpoint Security link:https://www.elastic.co/guide/en/security/current/install-endpoint.html[integration] is not yet supported in containerized environments, like Kubernetes. This is not an ECK limitation, but the limitation of the integration itself. Note that you can use ECK to deploy Elasticsearch, Kibana and Fleet Server, and add Endpoint Security integration to your policies if Elastic Agents running those policies are deployed in non-containerized environments. | |||
|
|||
=== Fleet Server initialization fails on minikube when CNI is disabled | |||
When deployed with ECK, the Fleet Server pod makes an http call to itself during fleet initialization using its service endpoint. Since a link:https://github.com/kubernetes/minikube/issues/1568[pod cannot reach itself through its service on minikube] when CNI is disabled, the call hangs until the connection times out and the pod goes into a crash loop. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, just adjust the case please:
When deployed with ECK, the Fleet Server pod makes an http call to itself during fleet initialization using its service endpoint. Since a link:https://github.com/kubernetes/minikube/issues/1568[pod cannot reach itself through its service on minikube] when CNI is disabled, the call hangs until the connection times out and the pod goes into a crash loop. | |
When deployed with ECK, the Fleet Server Pod makes an HTTP call to itself during Fleet initialization using its Service. Since a link:https://github.com/kubernetes/minikube/issues/1568[Pod cannot reach itself through its Service on minikube] when CNI is disabled, the call hangs until the connection times out and the Pod enters a crash loop. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the suggestion @thbkrkr.
Update docs/orchestrating-elastic-stack-applications/agent-fleet.asciidoc Co-authored-by: Thibault Richard <thbkrkr@users.noreply.github.com>
Jenkins test this please |
@elasticmachine run elasticsearch-ci/docs |
Document that Fleet Server initialization fails on minikube when CNI is disabled. Co-authored-by: Thibault Richard <thbkrkr@users.noreply.github.com>
Document that Fleet Server initialization fails on minikube when CNI is disabled. Co-authored-by: Farhim Ferdous <37705070+AluBhorta@users.noreply.github.com> Co-authored-by: Thibault Richard <thbkrkr@users.noreply.github.com>
Fleet Server initialization fails on minikube when CNI is disabled.