Bugzilla – Attachment 871659 Details for
Bug 1218540
kubeadm random panic
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
IDP Log In
|
Forgot Password
Output of kubeadm init --v=5 --skip-phases=addon/kube-proxy
panic.txt (text/plain), 16.96 KB, created by
Ricardo Branco
on 2024-01-04 10:31:10 UTC
(
hide
)
Description:
Output of kubeadm init --v=5 --skip-phases=addon/kube-proxy
Filename:
MIME Type:
Creator:
Ricardo Branco
Created:
2024-01-04 10:31:10 UTC
Size:
16.96 KB
patch
obsolete
># kubeadm init --v=5 --skip-phases=addon/kube-proxy >I0104 11:24:51.453641 1187 initconfiguration.go:117] detected and using CRI socket: unix:///var/run/containerd/containerd.sock >I0104 11:24:51.454026 1187 interface.go:432] Looking for default routes with IPv4 addresses >I0104 11:24:51.454043 1187 interface.go:437] Default route transits interface "enp1s0" >I0104 11:24:51.454369 1187 interface.go:209] Interface enp1s0 is up >I0104 11:24:51.454448 1187 interface.go:257] Interface "enp1s0" has 4 addresses :[192.168.178.74/24 2a02:2455:18e5:b600:cffd:8b41:4b9c:9da/64 2a02:2455:18e5:b600:6569:d575:9581:90d4/64 fe80::c718:b7b4:7717:2fb4/64]. >I0104 11:24:51.454464 1187 interface.go:224] Checking addr 192.168.178.74/24. >I0104 11:24:51.454473 1187 interface.go:231] IP found 192.168.178.74 >I0104 11:24:51.454490 1187 interface.go:263] Found valid IPv4 address 192.168.178.74 for interface "enp1s0". >I0104 11:24:51.454497 1187 interface.go:443] Found active IP 192.168.178.74 >I0104 11:24:51.454514 1187 kubelet.go:196] the value of KubeletConfiguration.cgroupDriver is empty; setting it to "systemd" >I0104 11:24:51.462811 1187 version.go:187] fetching Kubernetes version from URL: https://kubic.opensuse.org/release/stable-1.txt >[init] Using Kubernetes version: v1.28.4 >[preflight] Running pre-flight checks >I0104 11:24:51.686354 1187 checks.go:563] validating Kubernetes and kubeadm version >I0104 11:24:51.686410 1187 checks.go:168] validating if the firewall is enabled and active >I0104 11:24:51.712878 1187 checks.go:203] validating availability of port 6443 >I0104 11:24:51.713383 1187 checks.go:203] validating availability of port 10259 >I0104 11:24:51.713483 1187 checks.go:203] validating availability of port 10257 >I0104 11:24:51.713559 1187 checks.go:280] validating the existence of file /etc/kubernetes/manifests/kube-apiserver.yaml >I0104 11:24:51.713580 1187 checks.go:280] validating the existence of file /etc/kubernetes/manifests/kube-controller-manager.yaml >I0104 11:24:51.713594 1187 checks.go:280] validating the existence of file /etc/kubernetes/manifests/kube-scheduler.yaml >I0104 11:24:51.713608 1187 checks.go:280] validating the existence of file /etc/kubernetes/manifests/etcd.yaml >I0104 11:24:51.713622 1187 checks.go:430] validating if the connectivity type is via proxy or direct >I0104 11:24:51.713645 1187 checks.go:469] validating http connectivity to first IP address in the CIDR >I0104 11:24:51.713668 1187 checks.go:469] validating http connectivity to first IP address in the CIDR >I0104 11:24:51.713678 1187 checks.go:104] validating the container runtime >I0104 11:24:51.751854 1187 checks.go:639] validating whether swap is enabled or not >I0104 11:24:51.751961 1187 checks.go:370] validating the presence of executable crictl >I0104 11:24:51.752099 1187 checks.go:370] validating the presence of executable conntrack >I0104 11:24:51.752529 1187 checks.go:370] validating the presence of executable ip >I0104 11:24:51.752548 1187 checks.go:370] validating the presence of executable iptables >I0104 11:24:51.752780 1187 checks.go:370] validating the presence of executable mount >I0104 11:24:51.752862 1187 checks.go:370] validating the presence of executable nsenter >I0104 11:24:51.752909 1187 checks.go:370] validating the presence of executable ebtables >I0104 11:24:51.752940 1187 checks.go:370] validating the presence of executable ethtool >I0104 11:24:51.752953 1187 checks.go:370] validating the presence of executable socat >I0104 11:24:51.752993 1187 checks.go:370] validating the presence of executable tc >I0104 11:24:51.753017 1187 checks.go:370] validating the presence of executable touch >I0104 11:24:51.753059 1187 checks.go:516] running all checks >I0104 11:24:51.767932 1187 checks.go:401] checking whether the given node name is valid and reachable using net.LookupHost >I0104 11:24:51.768025 1187 checks.go:605] validating kubelet version >I0104 11:24:51.890774 1187 checks.go:130] validating if the "kubelet" service is enabled and active >I0104 11:24:51.919049 1187 checks.go:203] validating availability of port 10250 >I0104 11:24:51.919186 1187 checks.go:329] validating the contents of file /proc/sys/net/bridge/bridge-nf-call-iptables >I0104 11:24:51.919230 1187 checks.go:329] validating the contents of file /proc/sys/net/ipv4/ip_forward >I0104 11:24:51.919256 1187 checks.go:203] validating availability of port 2379 >I0104 11:24:51.919346 1187 checks.go:203] validating availability of port 2380 >I0104 11:24:51.919626 1187 checks.go:243] validating the existence and emptiness of directory /var/lib/etcd >[preflight] Pulling images required for setting up a Kubernetes cluster >[preflight] This might take a minute or two, depending on the speed of your internet connection >[preflight] You can also perform this action in beforehand using 'kubeadm config images pull' >I0104 11:24:51.919756 1187 checks.go:828] using image pull policy: IfNotPresent >I0104 11:24:51.932683 1187 checks.go:854] pulling: registry.opensuse.org/kubic/kube-apiserver:v1.28.4 >I0104 11:25:01.279924 1187 checks.go:854] pulling: registry.opensuse.org/kubic/kube-controller-manager:v1.28.4 >I0104 11:25:13.469209 1187 checks.go:854] pulling: registry.opensuse.org/kubic/kube-scheduler:v1.28.4 >I0104 11:25:16.438150 1187 checks.go:854] pulling: registry.opensuse.org/kubic/kube-proxy:v1.28.4 >W0104 11:25:22.247889 1187 checks.go:835] detected that the sandbox image "registry.k8s.io/pause:3.8" of the container runtime is inconsistent with that used by kubeadm. It is recommended that using "registry.opensuse.org/kubic/pause:3.9" as the CRI sandbox image. >I0104 11:25:22.263242 1187 checks.go:854] pulling: registry.opensuse.org/kubic/pause:3.9 >I0104 11:25:23.896102 1187 checks.go:854] pulling: registry.opensuse.org/kubic/etcd:3.5.9-0 >I0104 11:25:32.677447 1187 checks.go:854] pulling: registry.opensuse.org/kubic/coredns:v1.10.1 >[certs] Using certificateDir folder "/etc/kubernetes/pki" >I0104 11:25:35.363358 1187 certs.go:112] creating a new certificate authority for ca >[certs] Generating "ca" certificate and key >I0104 11:25:35.492526 1187 certs.go:519] validating certificate period for ca certificate >[certs] Generating "apiserver" certificate and key >[certs] apiserver serving cert is signed for DNS names [kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local microos] and IPs [10.96.0.1 192.168.178.74] >[certs] Generating "apiserver-kubelet-client" certificate and key >I0104 11:25:35.957774 1187 certs.go:112] creating a new certificate authority for front-proxy-ca >[certs] Generating "front-proxy-ca" certificate and key >I0104 11:25:36.180691 1187 certs.go:519] validating certificate period for front-proxy-ca certificate >[certs] Generating "front-proxy-client" certificate and key >I0104 11:25:36.406497 1187 certs.go:112] creating a new certificate authority for etcd-ca >[certs] Generating "etcd/ca" certificate and key >I0104 11:25:36.499197 1187 certs.go:519] validating certificate period for etcd/ca certificate >[certs] Generating "etcd/server" certificate and key >[certs] etcd/server serving cert is signed for DNS names [localhost microos] and IPs [192.168.178.74 127.0.0.1 ::1] >[certs] Generating "etcd/peer" certificate and key >[certs] etcd/peer serving cert is signed for DNS names [localhost microos] and IPs [192.168.178.74 127.0.0.1 ::1] >[certs] Generating "etcd/healthcheck-client" certificate and key >[certs] Generating "apiserver-etcd-client" certificate and key >I0104 11:25:37.096428 1187 certs.go:78] creating new public/private key files for signing service account users >[certs] Generating "sa" key and public key >[kubeconfig] Using kubeconfig folder "/etc/kubernetes" >I0104 11:25:37.158122 1187 kubeconfig.go:103] creating kubeconfig file for admin.conf >[kubeconfig] Writing "admin.conf" kubeconfig file >I0104 11:25:37.339160 1187 kubeconfig.go:103] creating kubeconfig file for kubelet.conf >[kubeconfig] Writing "kubelet.conf" kubeconfig file >I0104 11:25:37.568758 1187 kubeconfig.go:103] creating kubeconfig file for controller-manager.conf >[kubeconfig] Writing "controller-manager.conf" kubeconfig file >I0104 11:25:37.862030 1187 kubeconfig.go:103] creating kubeconfig file for scheduler.conf >[kubeconfig] Writing "scheduler.conf" kubeconfig file >[etcd] Creating static Pod manifest for local etcd in "/etc/kubernetes/manifests" >I0104 11:25:38.048667 1187 local.go:65] [etcd] wrote Static Pod manifest for a local etcd member to "/etc/kubernetes/manifests/etcd.yaml" >[control-plane] Using manifest folder "/etc/kubernetes/manifests" >[control-plane] Creating static Pod manifest for "kube-apiserver" >I0104 11:25:38.048727 1187 manifests.go:102] [control-plane] getting StaticPodSpecs >I0104 11:25:38.049103 1187 certs.go:519] validating certificate period for CA certificate >I0104 11:25:38.049182 1187 manifests.go:128] [control-plane] adding volume "ca-certs" for component "kube-apiserver" >I0104 11:25:38.049210 1187 manifests.go:128] [control-plane] adding volume "etc-ca-certificates" for component "kube-apiserver" >I0104 11:25:38.049221 1187 manifests.go:128] [control-plane] adding volume "etc-pki" for component "kube-apiserver" >I0104 11:25:38.049250 1187 manifests.go:128] [control-plane] adding volume "k8s-certs" for component "kube-apiserver" >I0104 11:25:38.050067 1187 manifests.go:157] [control-plane] wrote static Pod manifest for component "kube-apiserver" to "/etc/kubernetes/manifests/kube-apiserver.yaml" >[control-plane] Creating static Pod manifest for "kube-controller-manager" >I0104 11:25:38.050096 1187 manifests.go:102] [control-plane] getting StaticPodSpecs >I0104 11:25:38.050416 1187 manifests.go:128] [control-plane] adding volume "ca-certs" for component "kube-controller-manager" >I0104 11:25:38.050462 1187 manifests.go:128] [control-plane] adding volume "etc-ca-certificates" for component "kube-controller-manager" >I0104 11:25:38.050473 1187 manifests.go:128] [control-plane] adding volume "etc-pki" for component "kube-controller-manager" >I0104 11:25:38.050483 1187 manifests.go:128] [control-plane] adding volume "flexvolume-dir" for component "kube-controller-manager" >I0104 11:25:38.050493 1187 manifests.go:128] [control-plane] adding volume "k8s-certs" for component "kube-controller-manager" >I0104 11:25:38.050517 1187 manifests.go:128] [control-plane] adding volume "kubeconfig" for component "kube-controller-manager" >I0104 11:25:38.051089 1187 manifests.go:157] [control-plane] wrote static Pod manifest for component "kube-controller-manager" to "/etc/kubernetes/manifests/kube-controller-manager.yaml" >[control-plane] Creating static Pod manifest for "kube-scheduler" >I0104 11:25:38.051118 1187 manifests.go:102] [control-plane] getting StaticPodSpecs >I0104 11:25:38.051321 1187 manifests.go:128] [control-plane] adding volume "kubeconfig" for component "kube-scheduler" >I0104 11:25:38.052005 1187 manifests.go:157] [control-plane] wrote static Pod manifest for component "kube-scheduler" to "/etc/kubernetes/manifests/kube-scheduler.yaml" >I0104 11:25:38.052047 1187 kubelet.go:67] Stopping the kubelet >[kubelet-start] Writing kubelet environment file with flags to file "/var/lib/kubelet/kubeadm-flags.env" >[kubelet-start] Writing kubelet configuration to file "/var/lib/kubelet/config.yaml" >[kubelet-start] Starting the kubelet >I0104 11:25:38.577213 1187 waitcontrolplane.go:83] [wait-control-plane] Waiting for the API server to be healthy >[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory "/etc/kubernetes/manifests". This can take up to 4m0s >[apiclient] All control plane components are healthy after 13.019412 seconds >I0104 11:25:51.599085 1187 uploadconfig.go:112] [upload-config] Uploading the kubeadm ClusterConfiguration to a ConfigMap >[upload-config] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace >I0104 11:25:51.667198 1187 uploadconfig.go:126] [upload-config] Uploading the kubelet component config to a ConfigMap >[kubelet] Creating a ConfigMap "kubelet-config" in namespace kube-system with the configuration for the kubelets in the cluster >I0104 11:25:51.745232 1187 uploadconfig.go:131] [upload-config] Preserving the CRISocket information for the control-plane node >I0104 11:25:51.745313 1187 patchnode.go:31] [patchnode] Uploading the CRI Socket information "unix:///var/run/containerd/containerd.sock" to the Node API object "microos" as an annotation >[upload-certs] Skipping phase. Please see --upload-certs >[mark-control-plane] Marking the node microos as control-plane by adding the labels: [node-role.kubernetes.io/control-plane node.kubernetes.io/exclude-from-external-load-balancers] >[mark-control-plane] Marking the node microos as control-plane by adding the taints [node-role.kubernetes.io/control-plane:NoSchedule] >[bootstrap-token] Using token: cj9fkn.948op5l1um7bsfq9 >[bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles >[bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to get nodes >[bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials >[bootstrap-token] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token >[bootstrap-token] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster >[bootstrap-token] Creating the "cluster-info" ConfigMap in the "kube-public" namespace >I0104 11:25:52.988711 1187 clusterinfo.go:47] [bootstrap-token] loading admin kubeconfig >I0104 11:25:52.990386 1187 clusterinfo.go:58] [bootstrap-token] copying the cluster from admin.conf to the bootstrap kubeconfig >I0104 11:25:52.991083 1187 clusterinfo.go:70] [bootstrap-token] creating/updating ConfigMap in kube-public namespace >I0104 11:25:53.027475 1187 clusterinfo.go:84] creating the RBAC rules for exposing the cluster-info ConfigMap in the kube-public namespace >I0104 11:25:53.096722 1187 kubeletfinalize.go:90] [kubelet-finalize] Assuming that kubelet client certificate rotation is enabled: found "/var/lib/kubelet/pki/kubelet-client-current.pem" >[kubelet-finalize] Updating "/etc/kubernetes/kubelet.conf" to point to a rotatable kubelet client certificate and key >I0104 11:25:53.099027 1187 kubeletfinalize.go:134] [kubelet-finalize] Restarting the kubelet to enable client certificate rotation >Post "https://192.168.178.74:6443/api/v1/namespaces/kube-system/services?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) >unable to create a new DNS service >k8s.io/kubernetes/cmd/kubeadm/app/phases/addons/dns.createDNSService > cmd/kubeadm/app/phases/addons/dns/dns.go:269 >k8s.io/kubernetes/cmd/kubeadm/app/phases/addons/dns.createCoreDNSAddon > cmd/kubeadm/app/phases/addons/dns/dns.go:255 >k8s.io/kubernetes/cmd/kubeadm/app/phases/addons/dns.coreDNSAddon > cmd/kubeadm/app/phases/addons/dns/dns.go:157 >k8s.io/kubernetes/cmd/kubeadm/app/phases/addons/dns.EnsureDNSAddon > cmd/kubeadm/app/phases/addons/dns/dns.go:102 >k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/init.runCoreDNSAddon > cmd/kubeadm/app/cmd/phases/init/addons.go:112 >k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/workflow.(*Runner).Run.func1 > cmd/kubeadm/app/cmd/phases/workflow/runner.go:259 >k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/workflow.(*Runner).visitAll > cmd/kubeadm/app/cmd/phases/workflow/runner.go:446 >k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/workflow.(*Runner).Run > cmd/kubeadm/app/cmd/phases/workflow/runner.go:232 >k8s.io/kubernetes/cmd/kubeadm/app/cmd.newCmdInit.func1 > cmd/kubeadm/app/cmd/init.go:111 >github.com/spf13/cobra.(*Command).execute > vendor/github.com/spf13/cobra/command.go:940 >github.com/spf13/cobra.(*Command).ExecuteC > vendor/github.com/spf13/cobra/command.go:1068 >github.com/spf13/cobra.(*Command).Execute > vendor/github.com/spf13/cobra/command.go:992 >k8s.io/kubernetes/cmd/kubeadm/app.Run > cmd/kubeadm/app/kubeadm.go:50 >main.main > cmd/kubeadm/kubeadm.go:25 >runtime.main > /usr/lib64/go/1.21/src/runtime/proc.go:267 >runtime.goexit > /usr/lib64/go/1.21/src/runtime/asm_amd64.s:1650 >error execution phase addon/coredns >k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/workflow.(*Runner).Run.func1 > cmd/kubeadm/app/cmd/phases/workflow/runner.go:260 >k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/workflow.(*Runner).visitAll > cmd/kubeadm/app/cmd/phases/workflow/runner.go:446 >k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/workflow.(*Runner).Run > cmd/kubeadm/app/cmd/phases/workflow/runner.go:232 >k8s.io/kubernetes/cmd/kubeadm/app/cmd.newCmdInit.func1 > cmd/kubeadm/app/cmd/init.go:111 >github.com/spf13/cobra.(*Command).execute > vendor/github.com/spf13/cobra/command.go:940 >github.com/spf13/cobra.(*Command).ExecuteC > vendor/github.com/spf13/cobra/command.go:1068 >github.com/spf13/cobra.(*Command).Execute > vendor/github.com/spf13/cobra/command.go:992 >k8s.io/kubernetes/cmd/kubeadm/app.Run > cmd/kubeadm/app/kubeadm.go:50 >main.main > cmd/kubeadm/kubeadm.go:25 >runtime.main > /usr/lib64/go/1.21/src/runtime/proc.go:267 >runtime.goexit > /usr/lib64/go/1.21/src/runtime/asm_amd64.s:1650
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
Actions:
View
Attachments on
bug 1218540
: 871659 |
871770