creamy-baker-21593
03/26/2022, 2:55 PMgreat-school-54368
03/26/2022, 2:56 PMcreamy-baker-21593
03/26/2022, 3:16 PMgreat-school-54368
03/26/2022, 3:18 PMgreat-school-54368
03/26/2022, 3:26 PMcreamy-baker-21593
03/26/2022, 3:32 PMcreamy-baker-21593
03/26/2022, 3:33 PMgreat-school-54368
03/26/2022, 3:34 PMcreamy-baker-21593
03/26/2022, 3:35 PMgreat-school-54368
03/26/2022, 3:36 PMcreamy-baker-21593
03/26/2022, 3:42 PMgreat-school-54368
03/26/2022, 4:22 PMgreat-school-54368
03/26/2022, 4:23 PMgreat-school-54368
03/26/2022, 4:25 PMkubectl get ManagedCertificate
, Did you install the cert manager ?creamy-baker-21593
03/26/2022, 4:26 PMcreamy-baker-21593
03/26/2022, 4:27 PMcreamy-baker-21593
03/26/2022, 4:28 PMcreamy-baker-21593
03/26/2022, 4:29 PMgreat-school-54368
03/26/2022, 5:02 PMgreat-school-54368
03/26/2022, 5:07 PM➜ ~ curl -L --header "Host: <http://flyte.openaimp.com|flyte.openaimp.com>" <https://34.70.204.255> -v
* Trying 34.70.204.255:443...
* Connected to 34.70.204.255 (34.70.204.255) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/cert.pem
* CApath: none
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (OUT), TLS alert, unknown CA (560):
* SSL certificate problem: unable to get local issuer certificate
* Closing connection 0
curl: (60) SSL certificate problem: unable to get local issuer certificate
More details here: <https://curl.se/docs/sslcerts.html>
curl failed to verify the legitimacy of the server and therefore could not
establish a secure connection to it. To learn more about this situation and
how to fix it, please visit the web page mentioned above.
great-school-54368
03/26/2022, 5:13 PMcreamy-baker-21593
03/26/2022, 5:40 PMgreat-school-54368
03/26/2022, 5:43 PMgreat-school-54368
03/26/2022, 6:17 PMsparkoperator:
enabled: true
plugin_config:
plugins:
spark:
# -- Spark default configuration
spark-config-default:
# We override the default credentials chain provider for Hadoop so that
# it can use the serviceAccount based IAM role or ec2 metadata based.
# This is more in line with how AWS works
- spark.hadoop.fs.s3a.aws.credentials.provider: "com.amazonaws.auth.DefaultAWSCredentialsProviderChain"
- spark.hadoop.mapreduce.fileoutputcommitter.algorithm.version: "2"
- spark.kubernetes.allocation.batch.size: "50"
- spark.hadoop.fs.s3a.acl.default: "BucketOwnerFullControl"
- spark.hadoop.fs.s3n.impl: "org.apache.hadoop.fs.s3a.S3AFileSystem"
- spark.hadoop.fs.AbstractFileSystem.s3n.impl: "org.apache.hadoop.fs.s3a.S3A"
- spark.hadoop.fs.s3.impl: "org.apache.hadoop.fs.s3a.S3AFileSystem"
- spark.hadoop.fs.AbstractFileSystem.s3.impl: "org.apache.hadoop.fs.s3a.S3A"
- spark.hadoop.fs.s3a.impl: "org.apache.hadoop.fs.s3a.S3AFileSystem"
- spark.hadoop.fs.AbstractFileSystem.s3a.impl: "org.apache.hadoop.fs.s3a.S3A"
- spark.hadoop.fs.s3a.multipart.threshold: "536870912"
- spark.blacklist.enabled: "true"
- spark.blacklist.timeout: "5m"
- spark.task.maxfailures: "8"
great-school-54368
03/26/2022, 6:18 PMboundless-pizza-95864
03/28/2022, 5:39 AMkubectl get <http://managedcertificates.networking.gke.io|managedcertificates.networking.gke.io>
only work with the GKE ingress. If you're using another ingress controller (like nginx, contour) with cert-manager you will have a different type of certificate: kubectl get <http://certificates.cert-manager.io|certificates.cert-manager.io>