You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I understand that the AWX Operator is open source software provided for free and that I might not receive a timely response.
Bug Summary
With the feature introduced by the ffba1b4, a InitContainer named init-database was introduced to validate the database status by calling the wait-for-migrations script. I really liked this approach though, so we have a dedicated task for it.
Therefore, if the workload/namespace is meshed with Istio, the initContainerrequires an special UID to be captured by the Istio, otherwise the initContainer will not be able to reach out to the database. Note that this issue does not happen with a regular pod, as the sidecar will get injected as expected, whereas on the initContainer there is no sidecar yet.
To fix the issue, we need to expose to this deployment the ability to override the securityContext to runAsUser.
To address this issue, I stopped the operator (to avoid reconciliation) and manually patch the awx-task deployment which then works as expected.
I don't think thats a reasonable solution as our end goal here is to run istio successfully while using awx-operator, which we can do now we just have to pause controller enforcement to do so until a proper patch is released.
A more proper solution is to create inject.istio.io/templates in istiod that allows the injection of whatever you need in awx-task or any other object. (so you can inject securityContext even with controller enforcement)
And than use task_label to add the new custom label template to force the injection in awx-task pod.
Please confirm the following
Bug Summary
With the feature introduced by the ffba1b4, a
InitContainer
namedinit-database
was introduced to validate the database status by calling thewait-for-migrations
script. I really liked this approach though, so we have a dedicated task for it.Therefore, if the workload/namespace is meshed with Istio, the
initContainer
requires an special UID to be captured by the Istio, otherwise theinitContainer
will not be able to reach out to the database. Note that this issue does not happen with a regular pod, as thesidecar
will get injected as expected, whereas on theinitContainer
there is no sidecar yet.To fix the issue, we need to expose to this deployment the ability to override the
securityContext
torunAsUser
.To address this issue, I stopped the operator (to avoid reconciliation) and manually patch the
awx-task
deployment which then works as expected.AWX Operator version
2.15.0
AWX version
24.2.0
Kubernetes platform
kubernetes
Kubernetes/Platform version
1.29
Modifications
yes
Steps to reproduce
Expected results
Work as expect
Actual results
Fails to connect to the database due to
initContainer
being unable to reach out to the network.Additional information
N/A
Operator Logs
N/A
Tasks
The text was updated successfully, but these errors were encountered: