Advertisement
Guest User

Untitled

a guest
Aug 13th, 2018
256
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.97 KB | None | 0 0
  1. [init] using Kubernetes version: v1.11.2
  2. [preflight] running pre-flight checks
  3. I0813 14:13:37.714036 2923 kernel_validator.go:81] Validating kernel version
  4. I0813 14:13:37.714178 2923 kernel_validator.go:96] Validating kernel config
  5. [WARNING SystemVerification]: docker version is greater than the most recently validated version. Docker version: 17.09.1-ce. Max validated version: 17.03
  6. [preflight/images] Pulling images required for setting up a Kubernetes cluster
  7. [preflight/images] This might take a minute or two, depending on the speed of your internet connection
  8. [preflight/images] You can also perform this action in beforehand using 'kubeadm config images pull'
  9. [kubelet] Writing kubelet environment file with flags to file "/var/lib/kubelet/kubeadm-flags.env"
  10. [kubelet] Writing kubelet configuration to file "/var/lib/kubelet/config.yaml"
  11. [preflight] Activating the kubelet service
  12. [certificates] Generated ca certificate and key.
  13. [certificates] Generated apiserver certificate and key.
  14. [certificates] apiserver serving cert is signed for DNS names [d64 kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 10.160.64.64]
  15. [certificates] Generated apiserver-kubelet-client certificate and key.
  16. [certificates] Generated sa key and public key.
  17. [certificates] Generated front-proxy-ca certificate and key.
  18. [certificates] Generated front-proxy-client certificate and key.
  19. [certificates] Generated etcd/ca certificate and key.
  20. [certificates] Generated etcd/server certificate and key.
  21. [certificates] etcd/server serving cert is signed for DNS names [d64 localhost] and IPs [127.0.0.1 ::1]
  22. [certificates] Generated etcd/peer certificate and key.
  23. [certificates] etcd/peer serving cert is signed for DNS names [d64 localhost] and IPs [10.160.64.64 127.0.0.1 ::1]
  24. [certificates] Generated etcd/healthcheck-client certificate and key.
  25. [certificates] Generated apiserver-etcd-client certificate and key.
  26. [certificates] valid certificates and keys now exist in "/etc/kubernetes/pki"
  27. [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/admin.conf"
  28. [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/kubelet.conf"
  29. [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/controller-manager.conf"
  30. [kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/scheduler.conf"
  31. [controlplane] wrote Static Pod manifest for component kube-apiserver to "/etc/kubernetes/manifests/kube-apiserver.yaml"
  32. [controlplane] wrote Static Pod manifest for component kube-controller-manager to "/etc/kubernetes/manifests/kube-controller-manager.yaml"
  33. [controlplane] wrote Static Pod manifest for component kube-scheduler to "/etc/kubernetes/manifests/kube-scheduler.yaml"
  34. [etcd] Wrote Static Pod manifest for a local etcd instance to "/etc/kubernetes/manifests/etcd.yaml"
  35. [init] waiting for the kubelet to boot up the control plane as Static Pods from directory "/etc/kubernetes/manifests"
  36. [init] this might take a minute or longer if the control plane images have to be pulled
  37. [apiclient] All control plane components are healthy after 54.501937 seconds
  38. [uploadconfig] storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace
  39. [kubelet] Creating a ConfigMap "kubelet-config-1.11" in namespace kube-system with the configuration for the kubelets in the cluster
  40. [markmaster] Marking the node d64 as master by adding the label "node-role.kubernetes.io/master=''"
  41. [markmaster] Marking the node d64 as master by adding the taints [node-role.kubernetes.io/master:NoSchedule]
  42. [patchnode] Uploading the CRI Socket information "/var/run/dockershim.sock" to the Node API object "d64" as an annotation
  43. [bootstraptoken] using token: iwejxv.iuei8tlgacmzfput
  44. [bootstraptoken] configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials
  45. [bootstraptoken] configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token
  46. [bootstraptoken] configured RBAC rules to allow certificate rotation for all node client certificates in the cluster
  47. [bootstraptoken] creating the "cluster-info" ConfigMap in the "kube-public" namespace
  48. [addons] Applied essential addon: CoreDNS
  49. [addons] Applied essential addon: kube-proxy
  50.  
  51. Your Kubernetes master has initialized successfully!
  52.  
  53. To start using your cluster, you need to run the following as a regular user:
  54.  
  55. mkdir -p $HOME/.kube
  56. sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
  57. sudo chown $(id -u):$(id -g) $HOME/.kube/config
  58.  
  59. You should now deploy a pod network to the cluster.
  60. Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at:
  61. https://kubernetes.io/docs/concepts/cluster-administration/addons/
  62.  
  63. You can now join any number of machines by running the following on each node
  64. as root:
  65.  
  66. kubeadm join 10.160.64.64:6443 --token iwejxv.iuei8tlgacmzfput --discovery-token-ca-cert-hash sha256:e9f8901ffebe4ee5959264edefcaa77cf7ee6a0e8260906a68a27f31aeffb785
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement