Error while preparing a transport to talk with the registry:Unable to create round tripper:Get "https://projects.packages.broadcom.com/v2/":tls: failed to verify certificate:x509: certificate is valid for *.domain.local, not projects.packages.broadcom.com
Below symptoms are also observed:
TLS verification failures in kapp-controller logs when accessing https://projects.packages.broadcom.com.
DNS resolution differences between Supervisor nodes and pods inside the cluster.
Registry connectivity tests from Supervisor nodes succeeds, while the same tests inside the kapp-controller pod fail.
ndots:5).The Supervisor Management Network DNS configuration includes a search domain such as:
domain.localThe internal DNS server contains a record similar to:
projects.packages.broadcom.com.domain.local*.domain.localndots:5 setting, the resolver treats projects.packages.broadcom.com as a relative name.projects.packages.broadcom.com.domain.local
Since this name exists in the internal DNS zone, the lookup succeeds and returns the private endpoint.
The pod connects to this endpoint and receives a certificate for *.domain.local.
projects.packages.broadcom.com
projects.packages.broadcom.com and receive the proper public TLS certificate, which is why those checks succeed.To restore proper registry access and allow the upgrade to proceed, adjust the DNS configuration so that Kubernetes pods resolve the public registry endpoint correctly.
domain.local projects.packages.broadcom.com.domain.localRestart the following pods:
kapp-controller
coredns
image-controller
kubectl exec -it <kapp-controller-pod> -n <namespace> -- nslookup projects.packages.broadcom.comConfirm that:
The hostname resolves to the public IP address.
TLS verification succeeds when accessing the registry endpoint.
After DNS resolution is corrected:
Package installations should reconcile successfully.
The VKS upgrade process should continue and complete without registry access errors.
domain.local) can be restored in the Supervisor Management Network DNS configuration if required for internal name resolution.Compare DNS resolution results from nodes and pods.
Verify both the IP address and TLS certificate presented by the endpoint.
ndots resolver behavior can cause internal records to override public DNS entries, leading to unexpected connectivity or TLS verification issues.