Troubleshoot your Okteto instance
UPGRADE FAILED: “$name” has no deployed releases
This error will occur on your second install/upgrade if your initial install failed. If the first instal failed, delete the existing install before trying again:
helm uninstall <release-name>
Registry or Buildkit pods keep restarting
This can happen when the pods can't read/write from your cloud storage bucket. Double check that the cloud IAM you created has read/write access to the specified bucket.
Another reason this might happen is if the SSL certificate is not valid. You can check its status by running:
kubectl get certificate -l=app.kubernetes.io/part-of=okteto -n=okteto
Invalid Certificate
Okteto uses Let's Encrypt to generate the wildcard certificate. If the certificate is not valid, check the following:
- The cloud provider credentials you are using have read/write access to the subdomain you selected
- The subdomain can be resolved from the internet
The logs of the cert-manager
pod might also contain information on the problem. You can get the logs by by running:
kubectl logs -f -l=app.kubernetes.io/name=cert-manager --namespace=okteto
Deployment pipelines stay in "progressing" forever
This can happen for several reasons, among others, the installer job couldn't be started due to an error in Kubernetes API, or due to an overload in the cluster. In order to find out what the problem is, there's a way to list all the jobs and pods for a specific pipeline.
You need the pipeline name (it is the name displayed on Okteto UI) and the namespace where it is deployed. With that information, you can get jobs and pods running these commands:
kubectl get jobs -l=dev.okteto.com/pipeline-name=movies -l=dev.okteto.com/pipeline-namespace=cindylopez --namespace=okteto
kubectl get pods -l=dev.okteto.com/pipeline-name=movies -l=dev.okteto.com/pipeline-namespace=cindylopez --namespace=okteto
Using a Custom CNI
If you're using a custom CNI on your cluster then there may be some additional configuration needed for webhooks. In certain cases the CNI used on the worker nodes is not the same as the CNI used by the control plane and host networking will need to be used for webhooks. In addition, the ports may need to be changed to avoid collisions.
The certificate manager webhook is configured by setting cert-manager.webhook.hostNetwork
and okteto webhook by settingwebhook.hostNetwork
to true
.
Additionaly, the ports are set with cert-manager.webhook.securePort
and webhook.port
.
More information on webhook configuration can be found here.
Docker Hub credentials misconfiguration
As you can configure your own Docker Hub account in Okteto, it could happen that the credentials are not properly set. If that is the case, kubelet won't be able to pull public images from Docker Hub, which can be an important issue in the cluster.
If this ever happens in your cluster, there is a way to fix it:
- Update the container image used by the daemonset pods. Important note, use a container registry different than Docker Hub to pull the image without credential problems. For example, you can use
ghcr.io/okteto/busybox
. - Change or remove the credentials for the Docker Hub registry.
- Upgrade your cluster with the new configuration.
After this, the Okteto daemonset will be able to configure the right credentials for Docker Hub. Once you verify everything is working, you can restore the original base image for the Okteto daemonset.
We are here to help
Reach out to us, we're always happy to help!