-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cert-Manager vs. OpenShift Service serving-cert-secret-name Annotation (1.3.9) #137
Comments
I've got 14'000 CertificateRequest resources. 🚀 |
ok, thanks for reporting this. We expect people using OCP to install via OLM and people using other kube distributions to install via helm. We don't test helm on OCP. thanks for the finding. |
unfortunately, we only have access to Certified and Marketplace operators. but not community operators. |
can you use |
The root cause for using |
Add the same problem. A major one ! It have generated so much certificaterequest that it cause etcd problem (grownth and performance) and make some of our clusters to crash because openshift-kube-apiserver was overhlem. Need to document helm installation with openshift and set a flag to disable use of service serving certificate in service. template : v1_service_cert-utils-operator-controller-manager-metrics-service.yaml |
I've configured
enableCertManager=true
in my helm values.I discovered the Service
cert-utils-operator-controller-manager-metrics-service
has theservice.alpha.openshift.io/serving-cert-secret-name: cert-utils-operator-certs
annotation.and additionally the Certificate resource
metrics-serving-cert
is created which also points to the secretcert-utils-operator-certs
.Now the openshift service-ca controller and Cert-Manager fight to manage the secret.
The text was updated successfully, but these errors were encountered: