-
Notifications
You must be signed in to change notification settings - Fork 295
Conversation
Codecov Report
@@ Coverage Diff @@
## master #1459 +/- ##
======================================
Coverage 38.1% 38.1%
======================================
Files 74 74
Lines 4559 4559
======================================
Hits 1737 1737
Misses 2580 2580
Partials 242 242
Continue to review full report at Codecov.
|
Since v1.11.0 kubelet flags related to the And it seems like no one has noticed about that until recently. I'm removing the rkt container runtime support on the way to merge this. So that kube-aws works for k8s 1.11 too. For more info see kubernetes/website#9538. |
kubelet v1.11 does not already support flags necessary to the runtime. Without doing this, I was unable to start kubelets on kube-aws controller nodes
Hmm, so my cluster is now failing while setting up controller nodes, due to that flanneld is trying to access apiserver via the service ip. flanneld in a pod shouldn't try to access apiserver via the k8s api svc ip, because it isn't available without flanneld(chicken-and-egg problem!)
|
This is how flanneld on controller nodes run on my k8s 1.10 cluster:
|
It was somehow trying to contact k8s apiserver via service ip. That's a chicken-and-egg problem!
Then, calico on controller is trying to access k8s api via service ip. I believe calico-node on controller nodes, as they have
|
canal on controller nodes were somehow trying to contact k8s apiserver via service ip. they are on host network, and thus I think they shouldnt rely on service ip.
@davidmccormick Hey! Would you mind reviewing my changes regarding self-hosted canal(calico/flannel)? |
Wishing this is the last error I fix 😃
|
Reading aws/amazon-vpc-cni-k8s#142, it now sounds like I can just remove those redundant fields from calico yaml |
Sure, will have a look on Monday morning! I would probably have a little look at the kube-proxy as it is responsible for allowing access to the service ip’s, flannel only handles the pod ip. Access to services should be fine even before flannel is up if kube-proxy is running properly. Have a great weekend! 😀 |
@davidmccormick Thanks!
I was under the impression that, before flanneld forms an overlay (pod) network, kube-proxy has no where to route the k8s api's svc ip. Good to know! |
Just ran
|
After revering the Looking into controller-manager logs by running
Who should create the |
Oh, shouldn't this be run before we create calico and flannel related pods? |
Yes, and no - this is a composite issue. On the failing controller node,
This resulted in install-kube-system exiting before we create the kube-proxy serviceaccount. So, b8e6187 seems to be necessary, but a9b1ba9 and fe72a0f could be reverted. |
Yay! It works now. |
@davidmccormick I'm merging this anyway. I'd greatly appreciate it if you could review it next week. Also, thanks a lot for the awesome guidance towards the fix! |
* Bump Kubernetes version to v1.11.3 * fix: remove rkt container runtime support kubelet v1.11 does not already support flags necessary to the runtime. Without doing this, I was unable to start kubelets on kube-aws controller nodes * fix calico-related CRDs installation * serviceaccounts should be created before anything else ref kubernetes-retired#1459 (comment)
No description provided.