You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What happened:
when trying to run vm - getting the following error:
failed to create virtual machine pod: admission webhook "mutatepods.kubemacpool.io" denied the request: failed to allocate requested mac address
What you expected to happen:
the mutatepods should ignore this pod since it is controlled by kubevirt (aka this mac is already given to the vm instance). running the vm should be successful.
How to reproduce it (as minimally and precisely as possible):
apply namespace with opt-in lables of vms and pods:
Anything else we need to know?:
Note that this is not related to the opt-in functionality. on the contrary - the opt-in functionality gives us a workaround where we only use the vm label and then can avoid this.
Environment:
KUBEVIRT_PROVIDER=k8s-1.17
The text was updated successfully, but these errors were encountered:
when virt-controller creates the virt-launcher pod, the pod is caught by the kmp webhook for pods.
It is then checked if it related to kubevirt vmi (isRelatedToKubevirt())
I think that because from some reason the webhook pod request i received with no namespace, then the vmi is recognized correctly and considered as a regular pod:
2020-05-10T15:50:26.199Z DEBUG Webhook mutatepods got a create pod event {"podName": "", "podNamespace": ""}
2020-05-10T15:50:26.199Z DEBUG PoolManager test {"requestURI": "apis/kubevirt.io/v1alpha3/namespaces//virtualmachines/kmp-opt-vm"}
2020-05-10T15:50:26.200Z DEBUG PoolManager get kubevirt virtual machine object response {"err": "the server could not find the requested resource", "response": ""}
2020-05-10T15:50:26.200Z DEBUG PoolManager this pod is an ephemeral vmi object allocating mac as a regular pod
What happened:
when trying to run vm - getting the following error:
What you expected to happen:
the mutatepods should ignore this pod since it is controlled by kubevirt (aka this mac is already given to the vm instance). running the vm should be successful.
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know?:
Note that this is not related to the opt-in functionality. on the contrary - the opt-in functionality gives us a workaround where we only use the vm label and then can avoid this.
Environment:
KUBEVIRT_PROVIDER=k8s-1.17
The text was updated successfully, but these errors were encountered: