Skip to content

Conversation

@github-actions
Copy link

@github-actions github-actions bot commented Nov 23, 2025

kubectl diff reports that applying 5919a1c will change:

Errors/Warnings

=== Directory: ./choose-native-plants ===
The PersistentVolumeClaim "choose-native-plants-mongo-data" is invalid: 
* spec: Forbidden: spec is immutable after creation except resources.requests and volumeAttributesClassName for bound claims
  core.PersistentVolumeClaimSpec{
  	... // 2 identical fields
  	Resources:        {Requests: {s"storage": {i: {...}, s: "10Gi", Format: "BinarySI"}}},
  	VolumeName:       "pvc-d080ddf5991a4cf4",
- 	StorageClassName: &"linode-block-storage-retain",
+ 	StorageClassName: nil,
  	VolumeMode:       &"Filesystem",
  	DataSource:       nil,
  	... // 2 identical fields
  }
* spec.resources.requests.storage: Forbidden: field can not be less than status.capacity

@github-actions github-actions bot changed the title Deploy releases/k8s-manifests d414744 Deploy releases/k8s-manifests 4ad9761 Nov 23, 2025
@github-actions github-actions bot changed the title Deploy releases/k8s-manifests 4ad9761 Deploy releases/k8s-manifests 00e4a18 Nov 23, 2025
@github-actions github-actions bot changed the title Deploy releases/k8s-manifests 00e4a18 Deploy releases/k8s-manifests 5919a1c Nov 23, 2025
@ZacharyLeahan ZacharyLeahan merged commit ce0c3eb into deploys/k8s-manifests Nov 23, 2025
1 check passed
@github-actions
Copy link
Author

kubectl apply output (excluding unchanged) for ce0c3eb was:

customresourcedefinition.apiextensions.k8s.io/sealedsecrets.bitnami.com configured
clusterrole.rbac.authorization.k8s.io/grafana-clusterrole configured
clusterrole.rbac.authorization.k8s.io/prometheus-alertmanager configured
clusterrole.rbac.authorization.k8s.io/prometheus-pushgateway configured
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews configured
clusterrolebinding.rbac.authorization.k8s.io/sealed-secrets configured
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured
validatingwebhookconfiguration.admissionregistration.k8s.io/ingress-nginx-admission configured
configmap/cert-manager-webhook configured
configmap/cert-manager configured
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving configured
deployment.apps/choose-native-plants configured
statefulset.apps/data-warehouse-postgresql configured
configmap/grafana-dashboards-default configured
deployment.apps/grafana configured
deployment.apps/ingress-nginx-controller configured
deployment.apps/metrics-server configured
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection configured
secret/promtail configured
statefulset.apps/loki configured
statefulset.apps/database configured
deployment.apps/prometheus-alertmanager configured
deployment.apps/prometheus-kube-state-metrics configured
deployment.apps/prometheus-pushgateway configured
deployment.apps/prometheus-server configured
serviceaccount/prometheus-kube-state-metrics configured
deployment.apps/sealed-secrets configured
rolebinding.rbac.authorization.k8s.io/sealed-secrets-key-admin configured
service/sealed-secrets configured

Errors/Warnings

=== Directory: ./choose-native-plants ===
The PersistentVolumeClaim "choose-native-plants-mongo-data" is invalid: 
* spec: Forbidden: spec is immutable after creation except resources.requests and volumeAttributesClassName for bound claims
  core.PersistentVolumeClaimSpec{
  	... // 2 identical fields
  	Resources:        {Requests: {s"storage": {i: {...}, s: "10Gi", Format: "BinarySI"}}},
  	VolumeName:       "pvc-d080ddf5991a4cf4",
- 	StorageClassName: &"linode-block-storage-retain",
+ 	StorageClassName: nil,
  	VolumeMode:       &"Filesystem",
  	DataSource:       nil,
  	... // 2 identical fields
  }
* spec.resources.requests.storage: Forbidden: field can not be less than status.capacity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants