-
Notifications
You must be signed in to change notification settings - Fork 454
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x509: certificate relies on legacy Common Name field #1395
Comments
Hi @tenzen-y, thank you for creating this. I think this problem happens because K8s 1.19 is using Go 1.15. |
I'm using on-prem.
Does that mean that Katib is using some certificates that does not contain SANs? Thanks. |
Same problem here. I'm using on-prem MicroK8s 1.19 probably built using Go 1.15. Any workaround? Thx in advance! |
Same problem. This may be due to an older version of the vendored controller-runtime library. As workaround, I create a Secret called |
Sorry for the long reply @tenzen-y. Thank you @zuiurs, it makes sense. We use 0.1.9 controller-runtime version, which is pretty old. For the default bootstrapping, certificate for the webhook server is located in Although, you can use your local file system to generate cert, check here. In the meantime, we are working on removing auto generation for the webhooks from the Katib controller, check this: kubeflow/manifests#1379. cc @knkski
|
@zuiurs @andreyvelich For those who have encountered the same problem, here are the steps I took.
|
Thanks, @tenzen-y @zuiurs and @andreyvelich
Just rename ca.pem -> ca-cert.pem, server.pem -> cert.pem & server-key.pem -> key.pem Finally delete the existing katib controller secret, create a new secret using |
any ideas how to fix you mentioned create certificates ,i get the same issue today on rancher 2.5 with kubernetes 1.19.6 |
@shantanuVerma7 : I tried your steps creating 1-5 steps but get error at step 5 as belowopen -ca=ca.pem: no such file or directory
|
I'm still getting the same issue. I tried the following (for # Generating CA
openssl genrsa -out ca-key.pem 2048
openssl req -x509 -new -nodes -key ca-key.pem -sha256 -days 1024 -out ca-cert.pem
# Generating client certificate
openssl genrsa -out key.pem 2048
openssl req -new -sha256 -key key.pem -subj "/C=US/ST=CA/O=MyOrg, Inc./CN=katib-controller.kubeflow.svc" -out csr.pem
openssl x509 -req -in csr.pem -CA ca-cert.pem -CAkey ca-key.pem -CAcreateserial -out cert.pem -days 500 -sha256
# Updateing katib-controller secret
kubectl delete secret -n kubeflow katib-controller
kubectl create secret -n kubeflow generic katib-controller --from-file=ca-cert.pem --from-file=ca-key.pem --from-file=cert.pem --from-file=key.pem
# Check the katib-controller pod name and then
kubectl delete pod katib-controller-7fcc95676b-2nskf -n kubeflow After that I simply get a connection refused... |
Hi @trog-levrai.
Where did you get it ? |
Alright I figured things out for my case. If you're trying to use So here's what worked for me with the Write the following files:
From there you can run (note the
|
Hi @trog-levrai trog-levrai Using your suggestion I was able to generate the certificates and was able to place it as secrets, all the steps you suggested worked like a charm, but post that I started getting
Can you help, How to fix that now ? |
/kind bug
What steps did you take and what happened:
[A clear and concise description of what the bug is.]
bash scripts/v1beta1/deploy.sh
What did you expect to happen:
I expected the experiment to start.
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
I found related topics in the release note for 1.19.0
https://kubernetes.io/docs/setup/release/notes/
Environment:
kfctl version
): Noneminikube version
): Nonekubectl version
): 1.19.4/etc/os-release
): ubuntu16.04(4.15.0-72-generic)The text was updated successfully, but these errors were encountered: