-
Notifications
You must be signed in to change notification settings - Fork 70
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restore renders downstream cluster unusable if this one resides in a non-fleet-default
namespace
#574
Comments
… renders downstream cluster unusable if this one resides in a non-`fleet-default` namespace rancher#574)
hey @hwo-wd - I don't need the secret itself, but can you provide me with a YAML representation (names and relevant metadata) of the situation you are encountering here? Having a bit more context could be very helpful here to get us up to speed without replication. Also if you are a paying Rancher subscriber, please open a support case and provide your Support Engineer reference to this issue. They can create an internal issue to mirror it and which can help expedite the investigation and resolution of issues like this. As your Support Engineer can securely collect more specific details and provide them to us. |
Thanks for coming back to me, Dan. |
@hwo-wd - I think that for the time being you should feel comfortable making modifications to your Rancher Backups Our team will triage the issue further and likely investigate it as part of our on going effort to audit and improve fleet related integrations. While the fix you propose seems easy enough, for other users it could have unintended affects. |
Rancher Server Setup
104.0.1+up5.0.1
Describe the bug
Creating a provisioning.v2 cluster (e.g., via gitops) in a namespace different than
fleet-default
, creating a backup, pruning any Rancher resources and then restoring leads to said cluster being in an irrecoverably (?) state:To Reproduce
Steps to reproduce the behavior:
fleet-default
namespace and let it be provisioned using CAPIkubectl apply -f https://raw.githubusercontent.com/rancher/rancher-cleanup/main/deploy/rancher-cleanup.yaml
; note that this will delete themachine-plan
secret, even-though it resides in a non-Rancher-default namespace2.
above-machine-plan$
secret not residing in thefleet-default
namespace.A possible fix, which is tough to maintain over time until #487 gets a thing, is to broaden the backup of the
machine-plan
by creating a new ResourceSet and enhancing the existing one by the following:This way, the important
machine-plan
secret is part of the backup and gets restored, thus the downstream cluster system agent can connect just fine.Expected behavior
machine-plan
secrets are essential and should be backed up independent of the namespace they reside inNote: I'd be happy to contribute a PR, I just don't know whether the
namespaceRegexp: "^.*"
might be too generic in your taste, albeit the resource selectors are still quite specificThe text was updated successfully, but these errors were encountered: