Replies: 1 comment 1 reply
-
I think the custom resource looks good to me. What Strimzi does is that it basically just passes it on into the Pod configuration. As you did not shared the log, it is not clear if this is the only issue or not, but you can check if the Pod has the secret configured. And if it does, it means the secret has a wrong format or does not actually have the rights to pull the image. If the Pod does not have the secret configured, you should share the full cluster operator log to better understand why. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
I am encountering a problem with pulling already built and pushed images of Kafka connect from the Azure container registry.
Below are the versions I'm using:
Below is my dockerfile:
I have already created the pull-secret with the name
public-acr
using:kubectl create secret docker-registry public-acr --namespace kafka --docker-server=REGISTRYNAME.azurecr.io --docker-username=NAME --docker-password=PASSWORD
I have followed these steps to setup strimzi:
kafka-persistent.yaml:
The kafka connect yaml is where it gets interesting:
I used several different formats of using pull-secrets in the above kafka connect but just ended up in validation errors. I'm not sure if this schema is valid with
template
but there were no validation errors when deploying.Yet I get the error after deploying kafka connect to the AKS
Back-off pulling image
and the pod remains inpending
state.I'm facing this problem only under KafkaConnect deployment type. Other deployments with ACR is already working.
Is my kafkaconnect yaml wrong?
Beta Was this translation helpful? Give feedback.
All reactions