install-helm fails on most recent k8s version
Summary
install-helm fails because the helm version it uses is too old, which tries to use a deprecated api for k8s deployments. See: https://github.com/helm/helm/issues/6374
Even if following the workaround for helm, gitlab will not recognize that there is already a properly installed tiller service. It would be nice to have a workaround so it recognizes an existing tiller.
Steps to reproduce
Use the latest version of microk8s which brings apiserver version 1.16.0.
What is the current bug behavior?
Something went wrong while installing Helm Tiller
Operation failed. Check pod logs for install-helm for more details.
What is the expected correct behavior?
Installed and recognized helm tiller.
Relevant logs
Pod logs
+ helm init --tiller-tls --tiller-tls-verify --tls-ca-cert /data/helm/helm/config/ca.pem --tiller-tls-cert /data/helm/helm/config/cert.pem --tiller-tls-key /data/helm/helm/config/key.pem --service-account tiller Creating /root/.helm Creating /root/.helm/repository Creating /root/.helm/repository/cache Creating /root/.helm/repository/local Creating /root/.helm/plugins Creating /root/.helm/starters Creating /root/.helm/cache/archive Creating /root/.helm/repository/repositories.yaml Adding stable repo with URL: https://kubernetes-charts.storage.googleapis.com Adding local repo with URL: http://127.0.0.1:8879/charts $HELM_HOME has been configured at /root/.helm. Error: error installing: the server could not find the requested resource
Details of package version
Provide the package version installation details
ii gitlab-ce 12.3.5-ce.0 amd64 GitLab Community Edition (including NGINX, Postgres, Redis)
Environment details
- Operating System: Ubuntu 18.04 bionic
- Installation Target, remove incorrect values:
- Bare Metal Machine
- Installation Type, remove incorrect values:
- New Installation
- Is there any other software running on the machine: microk8s
- Is this a single or multiple node installation?
- Resources
- CPU: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz
- Memory total: 16GB
Configuration details
Provide the relevant sections of `/etc/gitlab/gitlab.rb`
external_url 'https://git.myhost.de'
gitlab_rails['ldap_enabled'] = true
gitlab_rails['ldap_servers'] = YAML.load <<-'EOS' # remember to close this block with 'EOS' below
main:
label: 'myhost'
host: '127.0.0.1'
port: 389
uid: 'uid'
method: 'plain' # "tls" or "ssl" or "plain"
bind_dn: 'uid=gitlab,ou=Tokens,dc=myhost'
password: 'xxxxx'
allow_username_or_email_login: true
base: 'ou=Users,dc=myhost'
user_filter: '(&(objectClass=inetOrgPerson)(memberof=cn=Gitlab,ou=Access,dc=myhost))'
EOS
registry_external_url 'https://registry.git.myhost.de'
gitlab_rails['registry_enabled'] = true
gitlab_rails['registry_host'] = "registry.git.myhost.de"
gitlab_rails['registry_port'] = "443"
gitlab_rails['registry_path'] = "/var/opt/gitlab/gitlab-rails/shared/registry"
registry['enable'] = true
registry['username'] = "registry"
registry['group'] = "registry"
registry['dir'] = "/var/opt/gitlab/registry"
unicorn['port'] = 9090
postgresql['shared_buffers'] = "3GB" # recommend value is 1/4 of total RAM, up to 14GB.
postgresql['work_mem'] = "50MB"
nginx['enable'] = true
nginx['ssl_client_certificate'] = nil # Most root CA's are included by default
nginx['ssl_certificate'] = nil
nginx['ssl_certificate_key'] = nil
nginx['listen_addresses'] = ['127.0.0.1']
nginx['listen_port'] = 3333 # override only if you use a reverse proxy: https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/doc/settings/nginx.md#setting-the-nginx-listen-port
nginx['listen_https'] = false # override only if your reverse proxy internally communicates over HTTP: https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/doc/settings/nginx.md#supporting-proxied-ssl
registry_nginx['enable'] = true
registry_nginx['redirect_http_to_https'] = false
registry_nginx['redirect_http_to_https_port'] = 80
registry_nginx['ssl_certificate'] = nil
registry_nginx['ssl_certificate_key'] = nil
registry_nginx['ssl_client_certificate'] = nil
registry_nginx['listen_port'] = 3334
registry_nginx['listen_https'] = false
registry_nginx['listen_addresses'] = ['127.0.0.1']
prometheus['enable'] = false
Edited by exi