Helm cant pull registry image
After helm upgrade i got error:
Failed to pull image "myhostofgitlab.ru/common-core-executor:1bac97ef": rpc error: code = Unknown desc = Error response from daemon: Head https://myhostofgitlab.ruv2/common-core-executor/manifests/1bac97ef: denied: access forbidden
I create cred like this:
apiVersion: v1
kind: Secret
data:
.dockerconfigjson: eyJhdXRocyI6eyJodHRwczovL2hvc3QtZm9yLXN0YWNrLW92ZXJmbG93OnsidXNlcm5hbWUiOiJzdGFja292ZXJmbG93IiwicGFzc3dvcmQiOiJzdGFja292ZXJmbG93IiwiYXV0aCI6Inh4eCJ9fX0=
metadata:
name: regcred
namespace: prod-common-service
type: kubernetes.io/dockerconfigjson
and my --dry-run:
NAME: prod-common-core-executor
LAST DEPLOYED: Sat Feb 26 17:59:26 2022
NAMESPACE: prod-common-service
STATUS: pending-install
REVISION: 1
TEST SUITE: None
USER-SUPPLIED VALUES:
affinity: {}
autoscaling:
enabled: false
maxReplicas: 100
minReplicas: 1
targetCPUUtilizationPercentage: 80
branch: prod
env:
- name: APPLICATION_NAME
value: common-service
fullnameOverride: ""
image:
pullPolicy: Always
repository: mycorrectrep
tag: 1bac97ef
imagePullSecrets:
- name: regcred
ingress:
annotations:
kubernetes.io/ingress.class: internal-ingress
nginx.ingress.kubernetes.io/client-body-buffer-size: 10M
nginx.ingress.kubernetes.io/proxy-body-size: 10M
nginx.ingress.kubernetes.io/ssl-redirect: "false"
enabled: true
hosts:
- host: prod.common-core-executor.k8s.test.zone
paths:
- path: /
tls:
- hosts:
- prod.common-core-executor.k8s.test.zone
log:
enable: true
name: prod-common-core-executor
nameOverride: ""
nodeSelector: {}
podAnnotations: null
podSecurityContext: {}
replicaCount: 1
resources:
limits:
cpu: 2000m
memory: 1025Mi
requests:
cpu: 200m
memory: 256Mi
secret:
name: prod--secret
securityContext: {}
service:
name: prod-common-core-executor
names:
- name: http
port: 8000
protocol: TCP
targetPort: 8000
type: ClusterIP
tolerations: []
COMPUTED VALUES:
affinity: {}
autoscaling:
enabled: false
maxReplicas: 100
minReplicas: 1
targetCPUUtilizationPercentage: 80
branch: prod
env:
- name: APPLICATION_NAME
value: common-service
fullnameOverride: ""
image:
pullPolicy: Always
repository: mycorrectregistryrep
tag: 1bac97ef
imagePullSecrets:
- name: regcred
ingress:
annotations:
kubernetes.io/ingress.class: internal-ingress
nginx.ingress.kubernetes.io/client-body-buffer-size: 10M
nginx.ingress.kubernetes.io/proxy-body-size: 10M
nginx.ingress.kubernetes.io/ssl-redirect: "false"
enabled: true
hosts:
- host: prod.common-core-executor.k8s.test.zone
paths:
- path: /
tls:
- hosts:
- prod.common-core-executor.k8s.test.zone
log:
enable: true
name: prod-common-core-executor
nameOverride: ""
nodeSelector: {}
podAnnotations: null
podSecurityContext: {}
replicaCount: 1
resources:
limits:
cpu: 2000m
memory: 1025Mi
requests:
cpu: 200m
memory: 256Mi
secret:
name: prod--secret
securityContext: {}
service:
name: prod-common-core-executor
names:
- name: http
port: 8000
protocol: TCP
targetPort: 8000
type: ClusterIP
tolerations: []
HOOKS:
MANIFEST:
---
# Source: common-core-executor/templates/service.yaml
apiVersion: v1
kind: Service
metadata:
name: prod-common-core-executor
labels:
helm.sh/chart: common-core-executor-0.1.0
branch: prod
log: json
app.kubernetes.io/name: prod-common-core-executor
app.kubernetes.io/version: "1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
type: ClusterIP
ports:
- port: 8000
targetPort: 8000
protocol: TCP
name: http
selector:
app.kubernetes.io/name: prod-common-core-executor
---
# Source: common-core-executor/templates/deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: prod-common-core-executor
labels:
helm.sh/chart: common-core-executor-0.1.0
branch: prod
log: json
app.kubernetes.io/name: prod-common-core-executor
app.kubernetes.io/version: "1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: prod-common-core-executor
template:
metadata:
labels:
helm.sh/chart: common-core-executor-0.1.0
branch: prod
log: json
app.kubernetes.io/name: prod-common-core-executor
app.kubernetes.io/version: "1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
imagePullSecrets:
- name: regcred
securityContext:
{}
containers:
- name: common-core-executor
securityContext:
{}
image: "mycorrectregistry:1bac97ef"
imagePullPolicy: Always
ports:
- name: http
containerPort: 8000
protocol: TCP
env:
- name: APPLICATION_NAME
value: common-service
- name: SERVER_HTTP_PORT
value: "8000"
envFrom:
- secretRef:
name: prod-common-service-secret
resources:
limits:
cpu: 2000m
memory: 1025Mi
requests:
cpu: 200m
memory: 256Mi