-
Hello, I am very new to both kubernetes and running Talos linux. So apologies for the very basic questions, but I have basically narrowed my issues down to how talos linux sets up kubernetes. I'm in need of a workflow that works for deploying things onto kubernetes without tons of manual work involved in editing the machine configs and predicting which namespaces things will go into. I still wanna do things the "right way" but I also want to balance that with being able to get beyond the boilerplate of managing the actual cluster, and move on to deployments. My issue comes when I try to deploy helm charts or applications onto the cluster, I always run into a whole list of errors and while I sorta understand what is causing the issues (it's the pod security admission policy) and I know I should tag the namespace with whatever policy I want, but even if I tag (which I did in this case with a more privileged policy) I still end up with the following style of errors. I'm more or less looking for advice on a workflow that you might use to manage this situation without tons of overhead.
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 5 replies
-
What you see is not an error, but rather a warning. Please look into Talos documentation which also references Kubernetes documentaiton. You can update the profiles enforced/autdited/warned in the machine config if you want to change the defaults. |
Beta Was this translation helpful? Give feedback.
-
@simira I have a similar issue. By default, Istio appears to not be working... The first Istio official sample fail, so when running: https://istio.io/latest/docs/tasks/traffic-management/ingress/ingress-control/ I get in events: Error creating: pods "httpbin-ff5c59f7c-nw9qb" is forbidden: violates PodSecurity "baseline:latest": non-default capabilities (container "istio-init" must not include "NET_ADMIN", "NET_RAW" in securityContext.capabilities.add) Then, trying to fix this, it appears I need to install -> https://artifacthub.io/packages/helm/istio-official/cni However... the parameters has tendency to change for different flavor of Kubernetes, so I wonder if you could take a look of what should be the right parameters, and add Istio in the smoke tests of Talos. See https://istio.io/latest/docs/setup/additional-setup/cni/#hosted-kubernetes-settings |
Beta Was this translation helpful? Give feedback.
What you see is not an error, but rather a warning.
Please look into Talos documentation which also references Kubernetes documentaiton.
You can update the profiles enforced/autdited/warned in the machine config if you want to change the defaults.