Jose Caballero

Results 14 comments of Jose Caballero

I am also having issues with `auth.existingSecret` in bitnami/mongodb 13.0.0. My custom config: ``` arbiter: enabled: false architecture: replicaset replicaCount: 3 extraEnvVars: - name: LOG_LEVEL value: DEBUG auth: rootUser: admin...

I am having this issue in AKS: ```kubectl flame mypod -t 1m --lang java -f mypod.svg mycontainer Verifying target pod ... ✔ Launching profiler ... ❌ ``` When inspecting the...

It is not working in AKS either: ```kubectl flame mypod -t 1m --lang java -f mypod.svg mycontainer Verifying target pod ... ✔ Launching profiler ... ❌ ``` When inspecting the...

> Since kubectl-flame doesn't support containerd, I'd like to introduce a workaround for using async-profiler. kubectl-flame's java profiling support uses async-profiler. I have scripts in https://github.com/lhotari/k8s-diagnostics-toolbox for creating flamegraphs in...

I am getting this message while installing the chart via Helm provider for Terraform (hashicorp/helm v2.7.1): ``` Chart.yaml: chart type is not valid in apiVersion 'v1'. It is valid in...

I am using the Velero Helm chart 2.31.6 which has the Velero app version 1.9.1. I am not really sure on how to check the Velero AWS plugin version. I...

Yes, it is using v1.5.0 and it is enabled: ``` apiVersion: apps/v1 kind: Deployment metadata: annotations: deployment.kubernetes.io/revision: "1" meta.helm.sh/release-name: velero meta.helm.sh/release-namespace: backups creationTimestamp: "2022-09-06T10:24:42Z" generation: 5 labels: app.kubernetes.io/instance: velero app.kubernetes.io/managed-by:...

When I try /validate, I get the following message: ``` {"response":{"uid":"","allowed":false,"status":{"metadata":{},"message":"contentType=, expected application/json","code":400}}} ``` Probably, the /readyz path is not served via https. But it is strange that the webhook...

I also tried creating the resource via `kubectl`: ``` apiVersion: trust.cert-manager.io/v1alpha1 kind: Bundle metadata: name: linkerd-identity-trust-roots namespace: cert-manager spec: sources: - secret: name: linkerd-trust-anchor key: "ca.crt" target: configMap: key: "ca-bundle.crt"...

I would also love to see this feature in kaniko. I have sometimes issues when a container image with a big size of big blobs gets uploaded to my registry.