Pods cannot restart if secret expires
Pods that restart after the expiration of Docker registry secrets created during deployment do not have access to pull images.
Problem
If you created a Docker registry secret during deployment to enable Netcool® Operations Insight® to access
the internal OpenShift® image repository, then any pods
that restart when this secret has expired will not have access to pull images, and
ImagePullBackoff
errors will occur.
Resolution
To resolve this, you must recreate the secret that the pods
rely on by using the following
command:
Where:oc create secret docker-registry noi-registry-secret
--docker-username=docker_user
--docker-password=docker_pass
--docker-server=docker-reg.reg_namespace.svc:5000/namespace
- noi-registry-secret is the name of the secret that you are creating.
Suggested value is
noi-registry-secret
- docker_user is the Docker user, for example
kubeadmin
- docker_pass is the Docker password
- docker-reg is your Docker registry
- reg_namespace is the namespace that your Docker registry is in.
- namespace is the name of the namespace that you want to deploy to.