-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pull Flux manifests from registry with private PKI certificate #66
Comments
If you're using OperatorHub you don't need the artiract, OLM knows how to automatically update the Flux Operator, and the operator has the manifests embedded for air-gapped use. This would only be a problem if you would be an Enterprise customer, the artifact contains the CVE patches that ControlPlane ships for Flux. |
Ahhh, so I can just remove |
You would remove only the |
Anyway let's keep this issue opened as paying customers will actually have a problem with this. |
I confirm that the suggested fix (simplification) solved our issue in the air-gapped cluster! 🥳 Thanks Stefan! ❤️ |
Our cluster does not have a direct connection to the Internet, and must pull all images through a registry proxy. This registry is configured with a certificate chain rooted in our private self-signed CA. How can I make Flux Operator trust this root?
This error is logged from Flux Operator:
Flux Operator version: 0.6.0
Flux Operator installation method: OLM (operatorhub.io Subscription)
FluxInstance resource (irrelevant details omitted):
Note: Our CRIO config will ensure the
registry
(for Flux images), is rewritten when images are pulled by our cluster.The text was updated successfully, but these errors were encountered: