GitLab.com Chart Bump failing in staging due to Zoekt Changes
The regular weekly chart bump at gitlab-com/gl-infra/k8s-workloads/gitlab-com!3195 (merged) introduced some new configuration changes to the Zoekt service in staging. This chart bump failed to apply because it looks like it was drastically renaming or changing the configuration in a way that Kubernetes was not happy with.
The full failed job is at https://ops.gitlab.net/gitlab-com/gl-infra/k8s-workloads/gitlab-com/-/jobs/11689555
The error is:
Error: UPGRADE FAILED: an error occurred while rolling back the release. original upgrade error: cannot patch "gitlab-gitlab-zoekt" with kind Service: Service "gitlab-gitlab-zoekt" is invalid: spec.clusterIPs[0]: Invalid value: []string{"None"}: may not change once set: no ConfigMap with the name "gitlab-gitlab-zoekt-nginx-conf" found
Executing helm get hooks gitlab --namespace gitlab
gitlab, gitlab-gitlab-zoekt, NetworkPolicy (networking.k8s.io) has changed:
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
annotations: {}
labels:
app.kubernetes.io/instance: gitlab
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: gitlab-zoekt
- app.kubernetes.io/version: 0.0.6
- helm.sh/chart: gitlab-zoekt-0.7.0
+ app.kubernetes.io/version: 0.1.1
+ helm.sh/chart: gitlab-zoekt-0.8.0
name: gitlab-gitlab-zoekt
namespace: gitlab
spec:
egress:
- ports:
- port: 443
protocol: TCP
to:
- ipBlock:
cidr: 0.0.0.0/0
except:
- 10.0.0.0/8
- 192.168.0.0/16
- 172.16.0.0/12
- 169.254.169.252/32
- 169.254.169.254/32
- ports:
- port: 988
protocol: TCP
to:
- ipBlock:
cidr: 169.254.169.252/32
- ports:
- port: 80
protocol: TCP
to:
- ipBlock:
cidr: 169.254.169.254/32
- ports:
- port: 53
protocol: UDP
- port: 53
protocol: TCP
- ports:
- port: 9999
protocol: TCP
- port: 9998
protocol: TCP
- port: 2305
protocol: TCP
to:
- ipBlock:
cidr: 10.0.0.0/8
ingress:
- from:
- ipBlock:
cidr: 10.0.0.0/8
ports:
- port: 443
protocol: TCP
- from:
- namespaceSelector:
matchLabels:
name: monitoring
podSelector:
matchLabels:
app.kubernetes.io/name: prometheus
ports:
- port: indexer
protocol: TCP
- port: webserver
protocol: TCP
podSelector:
matchLabels:
app.kubernetes.io/instance: gitlab
app.kubernetes.io/name: gitlab-zoekt
policyTypes:
- Egress
- Ingress
gitlab, gitlab-gitlab-zoekt, Service (v1) has changed:
apiVersion: v1
kind: Service
metadata:
annotations:
cloud.google.com/load-balancer-type: Internal
external-dns.alpha.kubernetes.io/hostname: zoekt.gstg.gke.gitlab.net.
external-dns.alpha.kubernetes.io/ttl: "300"
networking.gke.io/internal-load-balancer-allow-global-access: "true"
labels:
app: gitlab-zoekt
app.kubernetes.io/instance: gitlab
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: gitlab-zoekt
- app.kubernetes.io/version: 0.0.6
- chart: gitlab-zoekt-0.7.0
- helm.sh/chart: gitlab-zoekt-0.7.0
+ app.kubernetes.io/version: 0.1.1
+ chart: gitlab-zoekt-0.8.0
+ helm.sh/chart: gitlab-zoekt-0.8.0
heritage: Helm
release: gitlab
shard: default
stage: main
tier: sv
name: gitlab-gitlab-zoekt
namespace: gitlab
spec:
- loadBalancerIP: 10.224.34.112
+ clusterIP: None
ports:
- name: gateway
port: 443
selector:
app.kubernetes.io/instance: gitlab
app.kubernetes.io/name: gitlab-zoekt
- type: LoadBalancer
gitlab, gitlab-gitlab-zoekt, ServiceAccount (v1) has changed:
apiVersion: v1
kind: ServiceAccount
metadata:
annotations:
iam.gke.io/gcp-service-account: gitlab-gitlab-zoekt@gitlab-staging-1.iam.gserviceaccount.com
labels:
app: gitlab-zoekt
app.kubernetes.io/instance: gitlab
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: gitlab-zoekt
- app.kubernetes.io/version: 0.0.6
- chart: gitlab-zoekt-0.7.0
- helm.sh/chart: gitlab-zoekt-0.7.0
+ app.kubernetes.io/version: 0.1.1
+ chart: gitlab-zoekt-0.8.0
+ helm.sh/chart: gitlab-zoekt-0.8.0
heritage: Helm
release: gitlab
shard: default
stage: main
tier: sv
name: gitlab-gitlab-zoekt
namespace: gitlab
gitlab, gitlab-gitlab-zoekt, StatefulSet (apps) has changed:
apiVersion: apps/v1
kind: StatefulSet
metadata:
annotations:
secret.reloader.stakater.com/reload: gitlab-zoekt-gateway-cert
labels:
app: gitlab-zoekt
app.kubernetes.io/instance: gitlab
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: gitlab-zoekt
- app.kubernetes.io/version: 0.0.6
- chart: gitlab-zoekt-0.7.0
- helm.sh/chart: gitlab-zoekt-0.7.0
+ app.kubernetes.io/version: 0.1.1
+ chart: gitlab-zoekt-0.8.0
+ helm.sh/chart: gitlab-zoekt-0.8.0
heritage: Helm
release: gitlab
shard: default
stage: main
tier: sv
name: gitlab-gitlab-zoekt
namespace: gitlab
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/instance: gitlab
app.kubernetes.io/name: gitlab-zoekt
serviceName: gitlab-gitlab-zoekt
template:
metadata:
annotations:
- checksum/config: 1cc2ed659ba23cc7e620481f4be6227a0ce7dea79d98c3a1540e91e6fdbe9bf9
+ checksum/config: af6cd75f4867d1e728733ae0629a067096d816d3994aff1da7cb1c342a844515
labels:
app.kubernetes.io/instance: gitlab
app.kubernetes.io/name: gitlab-zoekt
spec:
containers:
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-zoekt-dynamic-indexserver:v0.0.1-5f25b
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
path: /
port: 6060
name: zoekt-dynamic-indexserver
ports:
- containerPort: 6060
name: indexserver
readinessProbe:
httpGet:
path: /
port: 6060
resources:
limits:
cpu: 6
memory: 4Gi
requests:
cpu: 4
memory: 2Gi
securityContext:
runAsGroup: 1000
runAsUser: 1000
volumeMounts:
- mountPath: /data/repos
name: zoekt-data
- mountPath: /data/index
name: zoekt-index
- env:
- name: GOOGLE_CLOUD_PROFILER_ENABLED
value: "true"
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-zoekt-indexer:v0.1.0-598fd
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-zoekt-indexer:v0.1.1-10574
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
path: /indexer/health
port: 6065
name: zoekt-indexer
ports:
- containerPort: 6065
name: indexer
readinessProbe:
httpGet:
path: /indexer/health
port: 6065
resources:
limits:
cpu: 6
memory: 4Gi
requests:
cpu: 4
memory: 2Gi
securityContext:
runAsGroup: 1000
runAsUser: 1000
volumeMounts:
- mountPath: /data/index
name: zoekt-index
- env:
- name: GOOGLE_CLOUD_PROFILER_ENABLED
value: "true"
image: registry.gitlab.com/gitlab-org/build/cng/gitlab-zoekt-webserver:v0.0.2-fcb27
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
path: /
port: 6070
name: zoekt-webserver
ports:
- containerPort: 6070
name: webserver
readinessProbe:
httpGet:
path: /
port: 6070
resources:
limits:
cpu: 4
memory: 4Gi
requests:
cpu: 2
memory: 2Gi
securityContext:
runAsGroup: 1000
runAsUser: 1000
volumeMounts:
- mountPath: /data/index
name: zoekt-index
- image: nginx:latest
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
path: /
port: 443
scheme: HTTPS
name: zoekt-gateway
ports:
- containerPort: 443
name: gateway
readinessProbe:
httpGet:
path: /
port: 443
scheme: HTTPS
resources:
limits:
cpu: 4
memory: 1Gi
requests:
cpu: 2
memory: 512Mi
securityContext: {}
volumeMounts:
- mountPath: /etc/nginx/nginx.conf
name: nginx-conf
readOnly: true
subPath: nginx.conf
- mountPath: /etc/ssl/tls.crt
name: gateway-cert
readOnly: true
subPath: tls.crt
- mountPath: /etc/ssl/tls.key
name: gateway-cert
readOnly: true
subPath: tls.key
- mountPath: /etc/nginx/basicauth
name: basicauth
initContainers:
- command:
- sh
- -c
- printf "$(cat /etc/nginx/basicauth-credentials/gitlab_username):$(openssl
passwd -6 $(cat /etc/nginx/basicauth-credentials/gitlab_password))\n" >
/etc/nginx/basicauth/.htpasswd
image: nginx:latest
name: create-htpasswd
volumeMounts:
- mountPath: /etc/nginx/basicauth
name: basicauth
- mountPath: /etc/nginx/basicauth-credentials
name: basicauth-credentials
nodeSelector:
gitlab.com/node-type: generic-mem
securityContext:
fsGroup: 1000
serviceAccountName: gitlab-gitlab-zoekt
terminationGracePeriodSeconds: 60
volumes:
- configMap:
items:
- key: nginx.conf
path: nginx.conf
- name: gitlab-gitlab-zoekt-nginx-conf
+ name: gitlab-gitlab-zoekt-zoekt-gateway-nginx-conf
name: nginx-conf
- name: gateway-cert
secret:
items:
- key: tls.crt
path: tls.crt
- key: tls.key
path: tls.key
secretName: gitlab-zoekt-gateway-cert
- emptyDir:
sizeLimit: 1Mi
name: basicauth
- name: basicauth-credentials
secret:
secretName: gitlab-zoekt-basicauth-v1
volumeClaimTemplates:
- metadata:
name: zoekt-data
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 512Gi
storageClassName: pd-balanced
- metadata:
name: zoekt-index
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 128Gi
storageClassName: pd-balanced
gitlab, gitlab-zoekt-gateway-cert, Certificate (cert-manager.io) has changed:
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
labels:
app: gitlab-zoekt
app.kubernetes.io/instance: gitlab
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: gitlab-zoekt
- app.kubernetes.io/version: 0.0.6
- chart: gitlab-zoekt-0.7.0
- helm.sh/chart: gitlab-zoekt-0.7.0
+ app.kubernetes.io/version: 0.1.1
+ chart: gitlab-zoekt-0.8.0
+ helm.sh/chart: gitlab-zoekt-0.8.0
heritage: Helm
release: gitlab
shard: default
stage: main
tier: sv
name: gitlab-zoekt-gateway-cert
namespace: gitlab
spec:
dnsNames:
- zoekt.gstg.gke.gitlab.net
issuerRef:
group: cert-manager.io
kind: ClusterIssuer
name: cloud-dns
secretName: gitlab-zoekt-gateway-cert
gitlab, gitlab-gitlab-zoekt-nginx-conf, ConfigMap (v1) has been removed:
- apiVersion: v1
- data:
- nginx.conf: |-
- user nginx;
-
- events {
- use epoll;
- }
-
- http {
- upstream dynamic_index_server {
- server 127.0.0.1:6060;
- }
-
- upstream indexer {
- server 127.0.0.1:6065;
- }
-
- upstream webserver {
- server 127.0.0.1:6070;
- }
-
- server {
- listen 443 ssl;
- ssl_certificate /etc/ssl/tls.crt;
- ssl_certificate_key /etc/ssl/tls.key;
- ssl_protocols TLSv1.2 TLSv1.3;
- auth_basic "Zoekt Basic Authentication required";
- auth_basic_user_file /etc/nginx/basicauth/.htpasswd;
- server_tokens off;
-
- location = / {
- auth_basic off;
- proxy_pass http://webserver/;
- }
-
- location = /metrics {
- auth_basic off;
- proxy_pass http://webserver/metrics;
- }
-
- location /index {
- proxy_pass http://dynamic_index_server;
- proxy_read_timeout 30m;
- }
-
- location = /indexer/metrics {
- auth_basic off;
- proxy_pass http://indexer;
- }
-
- location /indexer {
- proxy_pass http://indexer;
- proxy_read_timeout 30m;
- }
-
- location / {
- proxy_pass http://webserver;
- }
- }
- }
- kind: ConfigMap
- metadata:
- labels:
- app: gitlab-zoekt
- app.kubernetes.io/instance: gitlab
- app.kubernetes.io/managed-by: Helm
- app.kubernetes.io/name: gitlab-zoekt
- app.kubernetes.io/version: 0.0.6
- chart: gitlab-zoekt-0.7.0
- helm.sh/chart: gitlab-zoekt-0.7.0
- heritage: Helm
- release: gitlab
- shard: default
- stage: main
- tier: sv
- name: gitlab-gitlab-zoekt-nginx-conf
- namespace: gitlab
gitlab, gitlab-gitlab-zoekt-deployment-nginx-conf, ConfigMap (v1) has been added:
+ apiVersion: v1
+ data:
+ nginx.conf: |-
+ user nginx;
+
+ events {
+ use epoll;
+ }
+
+ http {
+ server {
+ listen 443 ssl;
+ ssl_certificate /etc/ssl/tls.crt;
+ ssl_certificate_key /etc/ssl/tls.key;
+ ssl_protocols TLSv1.2 TLSv1.3;
+ server_tokens off;
+
+ proxy_http_version 1.1;
+
+ proxy_set_header Host $host;
+ proxy_set_header X-Forwarded-For $remote_addr;
+
+ resolver kube-dns.kube-system.svc.cluster.local;
+
+ set $backend_gateway gitlab-gitlab-zoekt.gitlab.svc.cluster.local:443;
+
+ location = /health {
+ return 200;
+ }
+
+ location / {
+ proxy_pass https://$backend_gateway;
+ }
+
+ location ~ ^/nodes/([^/]+)/(.*) {
+ set $target_host https://$1:443/$2;
+
+ proxy_pass $target_host;
+ }
+ }
+ }
+ kind: ConfigMap
+ metadata:
+ labels:
+ app: gitlab-zoekt
+ app.kubernetes.io/instance: gitlab
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/name: gitlab-zoekt
+ app.kubernetes.io/version: 0.1.1
+ chart: gitlab-zoekt-0.8.0
+ helm.sh/chart: gitlab-zoekt-0.8.0
+ heritage: Helm
+ release: gitlab
+ shard: default
+ stage: main
+ tier: sv
+ name: gitlab-gitlab-zoekt-deployment-nginx-conf
+ namespace: gitlab
gitlab, gitlab-gitlab-zoekt-gateway, Deployment (apps) has been added:
+ apiVersion: apps/v1
+ kind: Deployment
+ metadata:
+ labels:
+ app: gitlab-zoekt
+ app.kubernetes.io/instance: gitlab
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/name: gitlab-zoekt
+ app.kubernetes.io/version: 0.1.1
+ chart: gitlab-zoekt-0.8.0
+ helm.sh/chart: gitlab-zoekt-0.8.0
+ heritage: Helm
+ release: gitlab
+ shard: default
+ stage: main
+ tier: sv
+ name: gitlab-gitlab-zoekt-gateway
+ spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app.kubernetes.io/instance: gitlab
+ app.kubernetes.io/name: gitlab-zoekt-gateway
+ template:
+ metadata:
+ annotations:
+ checksum/config: 416c69fe7896876c7bfe3291327135a1a6ad4e3823b6b4dca95ef010c19a22b0
+ labels:
+ app.kubernetes.io/instance: gitlab
+ app.kubernetes.io/name: gitlab-zoekt-gateway
+ spec:
+ containers:
+ - image: nginx:latest
+ imagePullPolicy: IfNotPresent
+ livenessProbe:
+ httpGet:
+ path: /health
+ port: 443
+ scheme: HTTPS
+ name: zoekt-gateway
+ ports:
+ - containerPort: 443
+ name: gateway
+ readinessProbe:
+ httpGet:
+ path: /
+ port: 443
+ scheme: HTTPS
+ resources:
+ limits:
+ cpu: 4
+ memory: 1Gi
+ requests:
+ cpu: 2
+ memory: 512Mi
+ securityContext: {}
+ volumeMounts:
+ - mountPath: /etc/nginx/nginx.conf
+ name: nginx-conf
+ readOnly: true
+ subPath: nginx.conf
+ - mountPath: /etc/ssl/tls.crt
+ name: gateway-cert
+ readOnly: true
+ subPath: tls.crt
+ - mountPath: /etc/ssl/tls.key
+ name: gateway-cert
+ readOnly: true
+ subPath: tls.key
+ volumes:
+ - configMap:
+ items:
+ - key: nginx.conf
+ path: nginx.conf
+ name: gitlab-gitlab-zoekt-deployment-nginx-conf
+ name: nginx-conf
+ - name: gateway-cert
+ secret:
+ items:
+ - key: tls.crt
+ path: tls.crt
+ - key: tls.key
+ path: tls.key
+ secretName: gitlab-zoekt-gateway-cert
gitlab, gitlab-gitlab-zoekt-gateway, Service (v1) has been added:
+ apiVersion: v1
+ kind: Service
+ metadata:
+ annotations:
+ cloud.google.com/load-balancer-type: Internal
+ external-dns.alpha.kubernetes.io/hostname: zoekt.gstg.gke.gitlab.net.
+ external-dns.alpha.kubernetes.io/ttl: "300"
+ networking.gke.io/internal-load-balancer-allow-global-access: "true"
+ labels:
+ app: gitlab-zoekt
+ app.kubernetes.io/instance: gitlab
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/name: gitlab-zoekt
+ app.kubernetes.io/version: 0.1.1
+ chart: gitlab-zoekt-0.8.0
+ helm.sh/chart: gitlab-zoekt-0.8.0
+ heritage: Helm
+ release: gitlab
+ shard: default
+ stage: main
+ tier: sv
+ name: gitlab-gitlab-zoekt-gateway
+ namespace: gitlab
+ spec:
+ loadBalancerIP: 10.224.34.112
+ ports:
+ - name: gateway
+ port: 443
+ selector:
+ app.kubernetes.io/instance: gitlab
+ app.kubernetes.io/name: gitlab-zoekt-gateway
+ type: LoadBalancer
gitlab, gitlab-gitlab-zoekt-zoekt-gateway-nginx-conf, ConfigMap (v1) has been added:
+ apiVersion: v1
+ data:
+ nginx.conf: |-
+ user nginx;
+
+ events {
+ use epoll;
+ }
+
+ http {
+ upstream dynamic_index_server {
+ server 127.0.0.1:6060;
+ }
+
+ upstream indexer {
+ server 127.0.0.1:6065;
+ }
+
+ upstream webserver {
+ server 127.0.0.1:6070;
+ }
+
+ server {
+ listen 443 ssl;
+ ssl_certificate /etc/ssl/tls.crt;
+ ssl_certificate_key /etc/ssl/tls.key;
+ ssl_protocols TLSv1.2 TLSv1.3;
+ auth_basic "Zoekt Basic Authentication required";
+ auth_basic_user_file /etc/nginx/basicauth/.htpasswd;
+ server_tokens off;
+
+ location = / {
+ auth_basic off;
+ proxy_pass http://webserver/;
+ }
+
+ location = /metrics {
+ auth_basic off;
+ proxy_pass http://webserver/metrics;
+ }
+
+ location /index {
+ proxy_pass http://dynamic_index_server;
+ proxy_read_timeout 30m;
+ }
+
+ location = /indexer/metrics {
Upgrading release=gitlab, chart=../../vendor/charts/gitlab/gstg
+ auth_basic off;
+ proxy_pass http://indexer;
+ }
+
+ location /indexer {
+ proxy_pass http://indexer;
+ proxy_read_timeout 30m;
+ }
+
+ location / {
+ proxy_pass http://webserver;
+ }
+ }
+ }
+ kind: ConfigMap
+ metadata:
+ labels:
+ app: gitlab-zoekt
+ app.kubernetes.io/instance: gitlab
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/name: gitlab-zoekt
+ app.kubernetes.io/version: 0.1.1
+ chart: gitlab-zoekt-0.8.0
+ helm.sh/chart: gitlab-zoekt-0.8.0
+ heritage: Helm
+ release: gitlab
+ shard: default
+ stage: main
+ tier: sv
+ name: gitlab-gitlab-zoekt-zoekt-gateway-nginx-conf
+ namespace: gitlab
Error: identified at least one change, exiting with non-zero exit code (detailed-exitcode parameter enabled)
Error: plugin "diff" exited with error
helm.go:84: [debug] plugin "diff" exited with error
Comparing release=gitlab, chart=../../vendor/charts/gitlab/gstg
FAILED RELEASES:
NAME CHART VERSION
gitlab ../../vendor/charts/gitlab/gstg
hook[cleanup] logs | Enabling Gitlab.com access
hook[cleanup] logs | PING gitlab.com (172.65.251.78): 56 data bytes
hook[cleanup] logs | 64 bytes from 172.65.251.78: seq=0 ttl=60 time=11.343 ms
hook[cleanup] logs | 64 bytes from 172.65.251.78: seq=1 ttl=60 time=11.051 ms
hook[cleanup] logs |
hook[cleanup] logs | --- gitlab.com ping statistics ---
hook[cleanup] logs | 2 packets transmitted, 2 packets received, 0% packet loss
hook[cleanup] logs | round-trip min/avg/max = 11.051/11.197/11.343 ms
hook[cleanup] logs | PING registry.gitlab.com (35.227.35.254): 56 data bytes
hook[cleanup] logs | 64 bytes from 35.227.35.254: seq=0 ttl=106 time=32.387 ms
hook[cleanup] logs | 64 bytes from 35.227.35.254: seq=1 ttl=106 time=31.688 ms
hook[cleanup] logs |
hook[cleanup] logs | --- registry.gitlab.com ping statistics ---
hook[cleanup] logs | 2 packets transmitted, 2 packets received, 0% packet loss
hook[cleanup] logs | round-trip min/avg/max = 31.688/32.037/32.387 ms
hook[cleanup] logs | PING charts.gitlab.io (35.185.44.232): 56 data bytes
hook[cleanup] logs | 64 bytes from 35.185.44.232: seq=0 ttl=107 time=31.230 ms
hook[cleanup] logs | 64 bytes from 35.185.44.232: seq=1 ttl=107 time=30.691 ms
hook[cleanup] logs |
hook[cleanup] logs | --- charts.gitlab.io ping statistics ---
hook[cleanup] logs | 2 packets transmitted, 2 packets received, 0% packet loss
hook[cleanup] logs | round-trip min/avg/max = 30.691/30.960/31.230 ms
hook[cleanup] logs |
in ./helmfile.yaml: in .helmfiles[2]: in releases/gitlab/helmfile.yaml: failed processing release gitlab: command "/usr/local/bin/helm" exited with non-zero status:
PATH:
/usr/local/bin/helm
ARGS:
0: helm (4 bytes)
1: upgrade (7 bytes)
2: --install (9 bytes)
3: gitlab (6 bytes)
4: ../../vendor/charts/gitlab/gstg (31 bytes)
5: --wait (6 bytes)
6: --timeout (9 bytes)
7: 3600s (5 bytes)
8: --atomic (8 bytes)
9: --create-namespace (18 bytes)
10: --namespace (11 bytes)
11: gitlab (6 bytes)
12: --values (8 bytes)
13: /tmp/helmfile3540399013/gitlab-gitlab-values-679cb8589c (55 bytes)
14: --values (8 bytes)
15: /tmp/helmfile3700336405/gitlab-gitlab-values-85cbb6cbb5 (55 bytes)
16: --values (8 bytes)
17: /tmp/helmfile242750944/gitlab-gitlab-values-6f85fbb7cd (54 bytes)
18: --values (8 bytes)
19: /tmp/helmfile2958647095/gitlab-gitlab-values-6f85fbb7cd (55 bytes)
20: --set (5 bytes)
21: *** STRIP *** (13 bytes)
22: --set (5 bytes)
23: *** STRIP *** (13 bytes)
24: --set (5 bytes)
25: *** STRIP *** (13 bytes)
26: --set (5 bytes)
27: *** STRIP *** (13 bytes)
28: --set (5 bytes)
29: *** STRIP *** (13 bytes)
30: --reset-values (14 bytes)
31: --history-max (13 bytes)
32: 10 (2 bytes)
ERROR:
exit status 1
EXIT STATUS
1
Error: UPGRADE FAILED: an error occurred while rolling back the release. original upgrade error: cannot patch "gitlab-gitlab-zoekt" with kind Service: Service "gitlab-gitlab-zoekt" is invalid: spec.clusterIPs[0]: Invalid value: []string{"None"}: may not change once set: no ConfigMap with the name "gitlab-gitlab-zoekt-nginx-conf" found
The chart bump in staging was reverted with gitlab-com/gl-infra/k8s-workloads/gitlab-com!3196 (merged)
Edited by Dylan Griffith