Skip to content

Helm update fails if 6443/tcp is missing from webhook egress networkpolicy #5787

@ExNG

Description

@ExNG

Describe the bug:
When updating cert-manager from v1.8.0 to v1.11.0 on OKD 4.12 a Network Policy with egress rules for the new webhook pod is created.
When afterwards the new webhook deployment is applied the resulting pod cannot connect to https://172.30.0.1:443/api thus helm install fails.
I understand this might be a bug verry specific to our environment but it's an easy fix.

Log output before fix:

cert-manager-webhook-7c4b9d44bc-j44rl cert-manager-webhook I0209 10:18:48.934179       1 feature_gate.go:249] feature gates: &{map[]}
cert-manager-webhook-7c4b9d44bc-j44rl cert-manager-webhook W0209 10:18:48.934378       1 client_config.go:618] Neither --kubeconfig nor --master was specified.  Using the inClusterConfig.  This might not work.
cert-manager-webhook-7c4b9d44bc-j44rl cert-manager-webhook E0209 10:19:18.942014       1 webhook.go:122] cert-manager "msg"="Failed initialising server" "error"="error building admission chain: Get \"https://172.30.0.1:443/api\": dial tcp 172.30.0.1:443: i/o timeout" 

And after:

cert-manager-webhook-7c4b9d44bc-p9lwq cert-manager-webhook I0209 10:20:35.793543       1 feature_gate.go:249] feature gates: &{map[]}
cert-manager-webhook-7c4b9d44bc-p9lwq cert-manager-webhook W0209 10:20:35.794006       1 client_config.go:618] Neither --kubeconfig nor --master was specified.  Using the inClusterConfig.  This might not work.
cert-manager-webhook-7c4b9d44bc-p9lwq cert-manager-webhook I0209 10:20:35.828322       1 webhook.go:129] cert-manager "msg"="using dynamic certificate generating using CA stored in Secret resource" "secret_name"="cert-manager-webhook-ca" "secret_namespace"="cert-manager"
cert-manager-webhook-7c4b9d44bc-p9lwq cert-manager-webhook I0209 10:20:35.829816       1 server.go:133] cert-manager/webhook "msg"="listening for insecure healthz connections" "address"=":6080"
cert-manager-webhook-7c4b9d44bc-p9lwq cert-manager-webhook I0209 10:20:35.830066       1 server.go:197] cert-manager/webhook "msg"="listening for secure connections" "address"=":10250"
cert-manager-webhook-7c4b9d44bc-p9lwq cert-manager-webhook I0209 10:20:36.842200       1 dynamic_source.go:266] cert-manager/webhook "msg"="Updated cert-manager webhook TLS certificate" "DNSNames"=["cert-manager-webhook","cert-manager-webhook.cert-manager","cert-manager-webhook.cert-manager.svc"]

Expected behaviour:
The webhook pod shall start without timeout error.

Steps to reproduce the bug:

  1. Install cert-manager v1.8.0 on OKD 4.11 using the helm chart
  2. Update to v1.11.0

Anything else we need to know?:

Environment details::

  • Kubernetes version: 1.25
  • Cloud-provider/provisioner: OKD 4.12 using terraform
  • cert-manager version: 1.11.0
  • Install method: helm

/kind bug

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/bugCategorizes issue or PR as related to a bug.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions