Troubleshooting
Troubleshooting
1. How can I resolve 'Token not authorized' errors in ChkkAgent pods?
1. How can I resolve 'Token not authorized' errors in ChkkAgent pods?
2. How do I use an existing Service Account with the Chkk Kubernetes Connector?
2. How do I use an existing Service Account with the Chkk Kubernetes Connector?
Answer: Please refer to the Chkk Kubernetes Connector documentation for instructions on how to use an existing Service Account.
3. How can I use an existing secret with the Chkk Kubernetes Connector?
3. How can I use an existing secret with the Chkk Kubernetes Connector?
Answer: Please refer to the Chkk Kubernetes Connector documentation for instructions on how to use an existing Secret.
4. Why can't I create JIRA tickets for Operational Risks?
4. Why can't I create JIRA tickets for Operational Risks?
Answer: Make sure that the Jira project and issue type do not have any required custom fields. Chkk by default only supports providing the default fields to Jira. If you require the use of mandatory custom fields, contact us on Chkk support Slack/MS Team Channel or email us at support@chkk.io.
5. How do I ignore specific Risks using my Infrastructure as Code (IaC)?
5. How do I ignore specific Risks using my Infrastructure as Code (IaC)?
Answer:
You can ignore Risks by adding the chkk.io/ignore
annotation to your Kubernetes resources in your IaC.
Ignoring all Risks
Use a wildcard (*
) in the annotation:
Ignoring specific Risks
Specify the ARSig IDs you wish to ignore:
6. How do I set Cluster Name and Environment using the ChkkAgent CRD?
6. How do I set Cluster Name and Environment using the ChkkAgent CRD?
Answer: Please refer to the Chkk Kubernetes Connector documentation for guidance on configuring the Cluster Name and Environment using the ChkkAgent CRD.
Alternatively, you can update these settings via the Chkk Dashboard by navigating to Risk Ledger > Clusters
and clicking Edit on the relevant cluster card, or by modifying the values in the cluster’s Properties tab.
Note: If the Cluster Name or Environment is defined through Infrastructure as Code (IaC), it cannot be modified from the Dashboard.
7. How do I specify Cluster Name and Environment with the Terraform module?
7. How do I specify Cluster Name and Environment with the Terraform module?
Answer: Please refer to the Chkk Kubernetes Connector documentation for guidance on configuring the Cluster Name and Environment using the Chkk Kubernetes Connector Terraform Module.
Alternatively, you can update these settings via the Chkk Dashboard by navigating to Risk Ledger > Clusters
and clicking Edit on the relevant cluster card, or by modifying the values in the cluster’s Properties tab.
Note: If the Cluster Name or Environment is defined through Infrastructure as Code (IaC), it cannot be modified from the Dashboard.
8. How do I manually clear the finalizer from the ChkkAgent custom resource?
8. How do I manually clear the finalizer from the ChkkAgent custom resource?
Answer: When a Kubernetes custom resource is deleted, any configured finalizers must be cleared before the object is fully removed. If a finalizer is misconfigured or cannot complete its cleanup, the resource remains stuck in the terminating state. To force-remove the finalizer and allow the deletion to complete, run the following command:
This command manually clears the finalizer from the metadata, allowing the resource to be removed successfully.
9. How do I fix 'failed to determine if *v1.ConfigMap is namespaced: Forbidden' errors in ChkkAgent pods?
9. How do I fix 'failed to determine if *v1.ConfigMap is namespaced: Forbidden' errors in ChkkAgent pods?
Answer: This error commonly indicates that a proxy server or firewall is blocking requests to the Kube API Server. Verify that your Kube API Server address is allowlisted or permitted within your network’s proxy/firewall configurations.
Example log snippet:
10. How do I fix 'Get <CHKK_API_ENDPOINT>/v1/connector/k8s/config: Forbidden' errors in ChkkAgent pods?
10. How do I fix 'Get <CHKK_API_ENDPOINT>/v1/connector/k8s/config: Forbidden' errors in ChkkAgent pods?
Answer: This error is likely caused by your proxy server or firewall blocking traffic to and from the “chkk.io” domain. The ChkkAgent needs to communicate with the Chkk API to sync the cluster state. To fix this issue, you need to allowlist the “chkk.io” domain and its subdomains in your proxy server or firewall.
11. How do I uninstall the Chkk Operator to remove a Cluster?
11. How do I uninstall the Chkk Operator to remove a Cluster?
Answer:
Deactivate the Cluster in the Chkk Dashboard
In the Dashboard, deactivate the cluster you want to remove.
Remove Custom Resources
- List all
ChkkAgent
resources:
- Delete all
ChkkAgent
resources:
Remove Chkk Operator (Helm-based)
- Check installed charts:
- Uninstall the chart:
- Delete the namespace:
Remove Chkk Operator (K8s YAML-based)
- List resources in
chkk-system
:
- Delete Operator resources:
- Delete the namespace:
Remove the ChkkAgent CRDs
Finally, remove the CRD:
12. Why is my cluster stuck in onboarding or showing no or single-digit operational risks in Risk Ledger?
12. Why is my cluster stuck in onboarding or showing no or single-digit operational risks in Risk Ledger?
Answer: This can happen due to a few common misconfigurations: either the Chkk Agent RBAC is incomplete or incorrect, explicit filter rules (especially wildcard-based) are excluding key namespaces, or Chkk API endpoints are not reachable due to network restrictions.
Ensure Chkk Agent RBAC is correctly configured
ChkkAgent requires specific Kubernetes permissions to access resources for analysis. Please ensure you are using the RBAC definitions provided with the official Chkk Operator Helm Chart or Kubernetes Manifests. Missing or custom-modified roles/clusterroles may cause incomplete onboarding.
Audit filter rules used to exclude namespaces
If you have applied filter rules to exclude namespaces, review them carefully—especially if you’re using a wildcard (e.g., *
).
Wildcard exclusions can unintentionally block all namespaces from being scanned, resulting in no or limited coverage.
Verify network connectivity to Chkk API endpoints
The Chkk Agent must be able to communicate with Chkk’s API services. Ensure your firewall or proxy settings allowlist all the domains listed in the Chkk Operator prerequisites documentation.
Wait for the next scheduled scan cycle
Once any misconfigurations are resolved, the Chkk Agent will pick up the changes during the next scheduled scan. The cluster should then get onboarded.
If the issue persists after 24 hours, please reach out to your Chkk support contact for further investigation.
13. Why is my Chkk Operator failing with 'x509: certificate signed by unknown authority' when connecting to *.chkk.io?
13. Why is my Chkk Operator failing with 'x509: certificate signed by unknown authority' when connecting to *.chkk.io?
14. How do I override default container images during cluster onboarding?
14. How do I override default container images during cluster onboarding?
Answer: Both the Chkk Operator and the ChkkAgent Custom Resource Definition (CRD) support overriding default container images.
Default Images:
- Chkk Operator:
public.ecr.aws/chkk/operator:<VERSION>
- ChkkAgent:
- Agent Manager:
public.ecr.aws/chkk/cluster-agent-manager:<VERSION>
- Agent:
public.ecr.aws/chkk/cluster-agent:<VERSION>
- Agent Manager:
1. Create the namespace
2. Add the Chkk Helm repository
3. Install the Chkk Operator with a custom image
4. Create a ChkkAgent resource with custom images
15. How do I activate a cluster that was previously deactivated?
15. How do I activate a cluster that was previously deactivated?
Answer:
- Navigate to Configure > Settings > Clusters > Deactivated Clusters in your Chkk Dashboard.
- Locate the cluster you wish to restore and select Activate Cluster.
- After activation, the cluster will reappear in Risk Ledger and in the Artifact Register, allowing normal management.
16. How do I troubleshoot common issues with the Chkk MCP Server?
16. How do I troubleshoot common issues with the Chkk MCP Server?
Answer:
Here are solutions to the most common Chkk MCP Server issues:
- Authorization error (e.g.,
Received Login Error. Code: 403 Body: {"error":"forbidden","message":"Not authorized"}
):- Make sure your AWS credentials are valid and the associated IAM Role or User has been added to Chkk.
- Double-check that your AWS identity has been added to Chkk.
- No risks returned:
- Ensure your cluster ID is correct and you have access.
- Still stuck?
- Check logs in the Cursor output panel or run the server manually for debug output.