Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- sudo kubeadm join kubernetes-cluster.homelab01.local:8443 --token 9uuqk2.zpjblnqrofvuc89v \
- > --discovery-token-ca-cert-hash sha256:c0fdf72b7d0d98c6830120da3bd267f4de8a723162861516757e25ae107a3193 \
- > --control-plane --certificate-key 9c93dd534871e4867359798d04de29cafeb239eeceeb0ec67c961ff03157d619
- [sudo] password for wojcieh:
- [preflight] Running pre-flight checks
- [preflight] Reading configuration from the cluster...
- [preflight] FYI: You can look at this config file with 'kubectl -n kube-system get cm kubeadm-config -o yaml'
- [preflight] Running pre-flight checks before initializing the new control plane instance
- [preflight] Pulling images required for setting up a Kubernetes cluster
- [preflight] This might take a minute or two, depending on the speed of your internet connection
- [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'
- [download-certs] Downloading the certificates in Secret "kubeadm-certs" in the "kube-system" Namespace
- [certs] Using certificateDir folder "/etc/kubernetes/pki"
- [certs] Generating "etcd/healthcheck-client" certificate and key
- [certs] Generating "apiserver-etcd-client" certificate and key
- [certs] Generating "etcd/server" certificate and key
- [certs] etcd/server serving cert is signed for DNS names [kubernetes-master2 localhost] and IPs [192.168.255.202 127.0.0.1 ::1]
- [certs] Generating "etcd/peer" certificate and key
- [certs] etcd/peer serving cert is signed for DNS names [kubernetes-master2 localhost] and IPs [192.168.255.202 127.0.0.1 ::1]
- [certs] Generating "apiserver" certificate and key
- [certs] apiserver serving cert is signed for DNS names [kubernetes kubernetes-cluster.homelab01.local kubernetes-master2 kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 192.168.255.202]
- [certs] Generating "apiserver-kubelet-client" certificate and key
- [certs] Generating "front-proxy-client" certificate and key
- [certs] Valid certificates and keys now exist in "/etc/kubernetes/pki"
- [certs] Using the existing "sa" key
- [kubeconfig] Generating kubeconfig files
- [kubeconfig] Using kubeconfig folder "/etc/kubernetes"
- [endpoint] WARNING: port specified in controlPlaneEndpoint overrides bindPort in the controlplane address
- [kubeconfig] Writing "admin.conf" kubeconfig file
- [endpoint] WARNING: port specified in controlPlaneEndpoint overrides bindPort in the controlplane address
- [kubeconfig] Writing "controller-manager.conf" kubeconfig file
- [endpoint] WARNING: port specified in controlPlaneEndpoint overrides bindPort in the controlplane address
- [kubeconfig] Writing "scheduler.conf" kubeconfig file
- [control-plane] Using manifest folder "/etc/kubernetes/manifests"
- [control-plane] Creating static Pod manifest for "kube-apiserver"
- [control-plane] Creating static Pod manifest for "kube-controller-manager"
- [control-plane] Creating static Pod manifest for "kube-scheduler"
- [check-etcd] Checking that the etcd cluster is healthy
- [kubelet-start] Writing kubelet configuration to file "/var/lib/kubelet/config.yaml"
- [kubelet-start] Writing kubelet environment file with flags to file "/var/lib/kubelet/kubeadm-flags.env"
- [kubelet-start] Starting the kubelet
- [kubelet-start] Waiting for the kubelet to perform the TLS Bootstrap...
- [etcd] Announced new etcd member joining to the existing etcd cluster
- [etcd] Creating static Pod manifest for "etcd"
- [etcd] Waiting for the new etcd member to join the cluster. This can take up to 40s
- [kubelet-check] Initial timeout of 40s passed.
- Broadcast message from systemd-journald@kubernetes-master2 (Wed 2021-01-13 16:01:27 CET):
- haproxy[870]: backend apiserver has no server available!
- Broadcast message from systemd-journald@kubernetes-master2 (Wed 2021-01-13 16:01:27 CET):
- haproxy[870]: backend apiserver has no server available!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement