Known issues
This page lists known issues for Config Connector.
Many of the issues listed here have been fixed. The Fixed version column indicates the version in which the fix was introduced. To receive this fix, upgrade to the listed version or later.
If you're part of the Google Developer Program, save this page to receive notifications when a release note related to this page is published. To learn more, see Saved Pages.
To filter the known issues by a product version or category, select your filters from the following drop-down menus.
Select your Config Connector version:
Select your problem category:
Or, filter the known issues:
| Category | Earliest identified version | Fixed version | Issue and workaround |
|---|---|---|---|
| Resources | 1.134 | 1.134.2 |
Fixed: SQLInstance stuck in Updating state with "merge" annotation errorAffected
invalid value "merge" for "cnrm.cloud.google.com/state-into-spec" annotation
This issue occurs because a stricter validation introduced in version 1.134.0 incorrectly rejected the "merge" strategy for |
| Direct Reconciler | 1.131 | 1.134 |
Fixed: Issues with direct reconcilersConfig Connector version 1.132.0 introduced issues affecting resources that use the direct reconciler. Duplicate controller name errorIn version 1.132.0, resources such as
error registering controller: error adding direct controller for SpannerInstance to a manager: error creating new controller: controller with name spannerinstance-controller already exists.
SecretManagerSecret "last-applied-configuration" errorIf you enable the direct reconciler for a
[kubectl.kubernetes.io/last-applied-configuration] must follow pattern [a-z0-9A-Z]+([_\.\-]*[a-z0-9A-Z]+)*), be less than 64 characters, and must have a UTF encoding of less than 128 bytes
This occurs because Config Connector incorrectly attempts to pass internal Kubernetes annotations as labels to the Secret Manager API. |
| Installation, Networking | Kubernetes 1.19 | 1.43 |
Fixed: Failed calling webhook x509: certificate relies on legacy Common Name field errorIf you see an error similar to the following example, you might be experiencing an issue with certificates:
Error from server (InternalError): error when creating "/mnt/set-weaver-dns-record.yml": Internal error occurred: failed calling webhook "annotation-defaulter.cnrm.cloud.google.com": Post "https://cnrm-validating-webhook.cnrm-system.svc:443/annotation-defaulter?timeout=30s": x509: certificate relies on legacy Common Name field, use SANs or temporarily enable Common Name matching with GODEBUG=x509ignoreCN=0
This issue occurs with Kubernetes versions 1.19 and later. Config Connector versions 1.43 and later support the automatic generation of the certificate, which should prevent this issue. Workaround: To workaround this issue, you can delete the relevant certificates and the Pods: kubectl delete -n cnrm-system secrets cnrm-webhook-cert-abandon-on-uninstall kubectl delete -n cnrm-system secrets cnrm-webhook-cert-cnrm-validating-webhook kubectl delete -n cnrm-system pods -l "cnrm.cloud.google.com/component=cnrm-webhook-manager" After you have deleted these resources, the correct certificate should regenerate. |