You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Liqo-route and Liqo-gateway pod creation failed on a kubeadm cluster bootstrapped through ClusterAPI with Docker as the infrastructure provider (nodes are Docker containers).
After inspecting the logs of the Liqo-route DaemonSet, I discovered that this issue was caused by a pod security configuration. Specifically, the default Liqo namespace has a baseline pod security level in enforce mode, preventing Liqo-route and Liqo-gateway pods from being scheduled correctly.
As a workaround, I added labels to the Liqo namespace to change the pod security level to 'privileged,' allowing the pods to be scheduled correctly.
What you expected to happen:
A successfull installation process using the liqoctl CLI tool.
How to reproduce it (as minimally and precisely as possible):
Create a workload cluster using ClusterAPI with Docker as an infrastructure provider and install liqo using the liqoctl CLI tool.
Anything else we need to know?:
Environment:
Liqo version: latest
Liqoctl version: v0.10.0
Kubernetes version (use kubectl version): v1.28
Cloud provider or hardware configuration: docker
Node image:
Network plugin and version:
Install tools:
Others:
The text was updated successfully, but these errors were encountered:
the installation process will start After this. so, I opened a new terminal window, checked if the liqo namespace was created and run the following command:
Thanks for the information. Just an off-topic tip, you can install liqo using liqoctl install without generating the values file with --only-output-values and --dump-values-path flags.
Yes, I am aware of that. the reason I did that is that I thought I can change liqo namespace properties through the values.yaml file but that was not the case.
What happened:
Liqo-route and Liqo-gateway pod creation failed on a kubeadm cluster bootstrapped through ClusterAPI with Docker as the infrastructure provider (nodes are Docker containers).
After inspecting the logs of the Liqo-route DaemonSet, I discovered that this issue was caused by a pod security configuration. Specifically, the default Liqo namespace has a baseline pod security level in enforce mode, preventing Liqo-route and Liqo-gateway pods from being scheduled correctly.
As a workaround, I added labels to the Liqo namespace to change the pod security level to 'privileged,' allowing the pods to be scheduled correctly.
What you expected to happen:
A successfull installation process using the liqoctl CLI tool.
How to reproduce it (as minimally and precisely as possible):
Create a workload cluster using ClusterAPI with Docker as an infrastructure provider and install liqo using the liqoctl CLI tool.
Anything else we need to know?:
Environment:
kubectl version
): v1.28The text was updated successfully, but these errors were encountered: