What Do I Do If the Container Cluster Protection Plug-in Fails to Be Uninstalled?
Possible Causes
If the cluster network is abnormal or the plug-in is running, uninstalling the plug-in on the HSS console may fail.
Solution
Perform the following operations on any cluster node to uninstall the container cluster protection plug-in:
- Log in to a cluster node.
- Create the file plugin.yaml in the /tmp directory and copy the following script content to the file:apiVersion: v1kind: Namespacemetadata:labels:admission.gatekeeper.sh/ignore: no-self-managingcontrol-plane: controller-managergatekeeper.sh/system: "yes"pod-security.kubernetes.io/audit: restrictedpod-security.kubernetes.io/audit-version: latestpod-security.kubernetes.io/enforce: restrictedpod-security.kubernetes.io/enforce-version: v1.24pod-security.kubernetes.io/warn: restrictedpod-security.kubernetes.io/warn-version: latestname: gatekeeper-system---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: assign.mutations.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: assignimage.mutations.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: assignmetadata.mutations.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: configs.config.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: constraintpodstatuses.status.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: constrainttemplatepodstatuses.status.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.11.3labels:gatekeeper.sh/system: "yes"name: constrainttemplates.templates.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: expansiontemplate.expansion.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: expansiontemplatepodstatuses.status.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: modifyset.mutations.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.10.0labels:gatekeeper.sh/system: "yes"name: mutatorpodstatuses.status.gatekeeper.sh---apiVersion: apiextensions.k8s.io/v1kind: CustomResourceDefinitionmetadata:annotations:controller-gen.kubebuilder.io/version: v0.11.3labels:gatekeeper.sh/system: "yes"name: providers.externaldata.gatekeeper.sh---apiVersion: rbac.authorization.k8s.io/v1kind: Rolemetadata:creationTimestamp: nulllabels:gatekeeper.sh/system: "yes"name: gatekeeper-manager-rolenamespace: gatekeeper-system---apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRolemetadata:creationTimestamp: nulllabels:gatekeeper.sh/system: "yes"name: gatekeeper-manager-role---apiVersion: rbac.authorization.k8s.io/v1kind: RoleBindingmetadata:labels:gatekeeper.sh/system: "yes"name: gatekeeper-manager-rolebindingnamespace: gatekeeper-systemroleRef:apiGroup: rbac.authorization.k8s.iokind: Rolename: gatekeeper-manager-rolesubjects:- kind: ServiceAccountname: gatekeeper-adminnamespace: gatekeeper-system---apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRoleBindingmetadata:labels:gatekeeper.sh/system: "yes"name: gatekeeper-manager-rolebindingroleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: gatekeeper-manager-rolesubjects:- kind: ServiceAccountname: gatekeeper-adminnamespace: gatekeeper-system---apiVersion: admissionregistration.k8s.io/v1kind: MutatingWebhookConfigurationmetadata:labels:gatekeeper.sh/system: "yes"name: gatekeeper-mutating-webhook-configuration---apiVersion: admissionregistration.k8s.io/v1kind: ValidatingWebhookConfigurationmetadata:labels:gatekeeper.sh/system: "yes"name: gatekeeper-validating-webhook-configuration
- Create the file uninstall.sh in the /tmp directory and copy the following script content to the file:#!/bin/bashkubectl delete -f /tmp/plugin.yamlkubectl delete ns cgs-provider
- Run the following command to uninstall the container cluster protection plug-in:bash /tmp/uninstall.sh
If information similar to the following is displayed, the plug-in has been uninstalled.
Parent topic: Container Security
- Possible Causes
- Solution