-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
linkerd check --proxy CLI command isn't working #13306
Comments
I will take this! |
@tstraley I just ran your exact command (on a different app namespace) You should see two additional sections in the output with the |
Ahh actually looks like the troublesome line in your output is:
The |
@MicahSee thanks for your response. Am I wrong in thinking that in the past, the The documentation around this flag still states that it is used to only run data-plane checks https://linkerd.io/2.16/reference/cli/check/ Even if control-plane checks are expected to be run now, why would it stop after a failure like this instead of proceeding to run the data-plane checks I asked for? I guess I'm also curious why the missing CRD is a fatal check in the first place, given that the installed version of linkerd in our cluster is |
@MicahSee - just wanted to check in on this and make sure you saw my reply above. Thanks. |
The EgressNetwork CRD showed up in edge-24.10.4. Your control plane is running edge-24.10.2, so it has no EgressNetwork CRD, but your I'll have to look back at history for the |
I was able to find where I could manually get this version of the CLI, but are there docs anywhere describing how to install a specific version? All I found was https://linkerd.io/2.16/getting-started/#step-1-install-the-cli which just installs the latest available.
Thanks. I'm not clear why checking CRDs or the jaeger extension would be necessary control-plane basics, but if this is the case, seems like the docs and CLI should not be saying |
What is the issue?
Attempting to run
linkerd check --proxy
results in the same operation as thelinkerd check
control-plane checks.I cannot get any validation of the data plane checks, even when trying to isolate to a namespace with
-n
flag.How can it be reproduced?
Logs, error output, etc
example:
output of
linkerd check -o short
Environment
K8s 1.30 (AWS EKS)
Possible solution
No response
Additional context
This workflow is critically essential for this administrative task of rotating the trust anchor cert bundle, otherwise we cannot readily identify if any meshed pods still need to be restarted to pick up the latest trust anchor https://linkerd.io/2-edge/tasks/manually-rotating-control-plane-tls-credentials/
Would you like to work on fixing this bug?
no
The text was updated successfully, but these errors were encountered: