Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Missing serviceaccount causes karmada-static-resource-job failure when using Custom Certificate Mode #6185

Open
seanlaii opened this issue Mar 5, 2025 · 3 comments · May be fixed by #6188
Labels
kind/question Indicates an issue that is a support question.

Comments

@seanlaii
Copy link
Contributor

seanlaii commented Mar 5, 2025

Please provide an in-depth description of the question you have:
When installing the Karmada chart using Helm with certs.mode set to custom (values.yaml, L128), I encountered an issue. The karmada-static-resource-job (karmada-static-resource-job.yaml, L32) fails because it relies on a ServiceAccount that is only created when certs.mode is set to auto (pre-install-job.yaml, L449–498). This results in the static-resource-job failing due to a missing ServiceAccount, which in turn causes the remaining components to hang at the init container stage.

What do you think about this question?:
Is this behavior expected when using the custom certificate mode, and should the user manually create the required ServiceAccount?

Environment:

  • Karmada version: 1.12.2
  • Kubernetes version: 1.31
  • Others:
@seanlaii seanlaii added the kind/question Indicates an issue that is a support question. label Mar 5, 2025
@seanlaii seanlaii changed the title Missing ServiceAccount Causes karmada-static-resource-job Failure When Using Custom Certificate Mode Missing serviceaccount causes karmada-static-resource-job failure when using Custom Certificate Mode Mar 5, 2025
@zhzhuang-zju
Copy link
Contributor

Is this behavior expected when using the custom certificate mode, and should the user manually create the required ServiceAccount?

@seanlaii I don't think so. The certificate mode should have nothing to do with the ServiceAccount. I suspect it was introduced in release 1.10. Could you try using the Helm chart of release 1.9 and see if it can succeed?

@seanlaii
Copy link
Contributor Author

seanlaii commented Mar 7, 2025

Hi @zhzhuang-zju ,

Thanks for the reply! I've tested with release 1.9 as you advised, and I can confirm that it functions as expected.

Furthermore, I've investigated the installation issue with the current release. I found that by relocating the resource definitions for the Role, RoleBinding, and ServiceAccount (specifically, lines 448-498 in pre-install-job.yaml) outside of the certMode conditional check, the installation proceeds successfully. This modification ensures that these essential resources are created regardless of the selected mode.

If the maintainers concur that this behavior constitutes an issue, I would be happy to submit a pull request to address it.

Thank you again for your assistance!

@zhzhuang-zju
Copy link
Contributor

If the maintainers concur that this behavior constitutes an issue, I would be happy to submit a pull request to address it.

Glad to hear that, feel free to submit the PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/question Indicates an issue that is a support question.
Projects
None yet
2 participants