You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I've searched for similar issues and couldn't find anything matching
I've discussed this feature request in the K8sGPT Slack and got positive feedback
Is this feature request related to a problem?
Yes
Problem Description
Some of internally hosted model endpoints are protected using TLS certificates signed by private certificate authority. When k8sgpt is deployed as operator in cluster, we are unable to see details inside results CRD due to TLS errors in application logs.
Finished Reconciling k8sGPT with error: failed to call Analyze RPC: rpc error: code = Unknown desc = failed while calling AI provider openai: Post "https://XXnternal endpointXX/openai/v1/chat/completions": tls: failed to verify certificate: x509: certificate signed by unknown authority
XXXZ ERROR Reconciler error {"controller": "k8sgpt", "controllerGroup": "core.k8sgpt.ai", "controllerKind": "K8sGPT", "K8sGPT": {"name":"k8sgpt","namespace":"k8sgpt-operator-system"}, "namespace": "k8sgpt-operator-system", "name": "k8sgpt", "reconcileID": "XXX", "error": "failed to call Analyze RPC: rpc error: code = Unknown desc = failed while calling AI provider openai: Post "https://XXinternal endpointXX/openai/v1/chat/completions": tls: failed to verify certificate: x509: certificate signed by unknown authority"}
Solution Description
Overcome TLS by creating configmap for internal CA public certificate and probably mounting as a volume on deployment spec
volumeMounts:
- name: ca-certificates
mountPath: /etc/ssl/certs/ca.crt # Mount the configMap directly to the system certificates directory
subPath: ca.crt
volumes:
- name: ca-certificates
configMap:
name: ca-configmap
Benefits
This allows enterprises to use internally hosted model endpoint secured using TLS certs signed by internal CAs
Potential Drawbacks
I've tried above version, its not working for some reason may the cert is not getting trusted.
Additional Information
No response
The text was updated successfully, but these errors were encountered:
Checklist
Is this feature request related to a problem?
Yes
Problem Description
Some of internally hosted model endpoints are protected using TLS certificates signed by private certificate authority. When k8sgpt is deployed as operator in cluster, we are unable to see details inside results CRD due to TLS errors in application logs.
Finished Reconciling k8sGPT with error: failed to call Analyze RPC: rpc error: code = Unknown desc = failed while calling AI provider openai: Post "https://XXnternal endpointXX/openai/v1/chat/completions": tls: failed to verify certificate: x509: certificate signed by unknown authority
XXXZ ERROR Reconciler error {"controller": "k8sgpt", "controllerGroup": "core.k8sgpt.ai", "controllerKind": "K8sGPT", "K8sGPT": {"name":"k8sgpt","namespace":"k8sgpt-operator-system"}, "namespace": "k8sgpt-operator-system", "name": "k8sgpt", "reconcileID": "XXX", "error": "failed to call Analyze RPC: rpc error: code = Unknown desc = failed while calling AI provider openai: Post "https://XXinternal endpointXX/openai/v1/chat/completions": tls: failed to verify certificate: x509: certificate signed by unknown authority"}
Solution Description
Overcome TLS by creating configmap for internal CA public certificate and probably mounting as a volume on deployment spec
Benefits
This allows enterprises to use internally hosted model endpoint secured using TLS certs signed by internal CAs
Potential Drawbacks
I've tried above version, its not working for some reason may the cert is not getting trusted.
Additional Information
No response
The text was updated successfully, but these errors were encountered: