Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

kubeadm init/join pre-flight checks stopping a 1.24 cluster installation with containerd #33628

Closed
antaloala opened this issue May 12, 2022 · 5 comments
Labels
needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. sig/node Categorizes an issue or PR as relevant to SIG Node.

Comments

@antaloala
Copy link
Contributor

antaloala commented May 12, 2022

I just fresh installed a k8s 1.24 cluster with containerd as runtime engine, using latest kubeadm tooling and following step by step the installation procedure described in latest (1.24) k8s documentation; I experienced the problem reported in kubeadm issue #1062 when raising kubeadm init and kubeadm join commands.
I solved the problem invoking (in master and worker nodes) the commands described at the beginning of that issue:

modprobe br_netfilter
echo '1' > /proc/sys/net/ipv4/ip_forward

After this, kubeadm init/join commands do their work perfectly ;-)

As we wait for this to be solved in kubeadm (automatically raising these commands when using a runtime engine different than docker) I think it would be good to document this in kubeadm-based installation pages.
(maybe also applicable for CRI-O ?)

P.S: It was an installation on Ubuntu-based Virtualbox VMs on a Windows10 host OS where Hyper-V has been fully disabled, so experienced issue is not related to any Hyper-V collision (not in my case).

@k8s-ci-robot
Copy link
Contributor

@antaloala: This issue is currently awaiting triage.

SIG Docs takes a lead on issue triage for this website, but any Kubernetes member can accept issues by applying the triage/accepted label.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. label May 12, 2022
@neolit123
Copy link
Member

These are not only for docker. Please see https://kubernetes.io/docs/setup/production-environment/container-runtimes/#install-and-configure-prerequisites

This section was added recently due to user confusion.

/close

@k8s-ci-robot
Copy link
Contributor

@neolit123: Closing this issue.

In response to this:

These are not only for docker. Please see https://kubernetes.io/docs/setup/production-environment/container-runtimes/#install-and-configure-prerequisites

This section was added recently due to user confusion.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@neolit123
Copy link
Member

/sig node cluster-lifecycle

@k8s-ci-robot k8s-ci-robot added sig/node Categorizes an issue or PR as relevant to SIG Node. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. labels May 12, 2022
@antaloala
Copy link
Contributor Author

Ops .. it looks I did not follow all the required steps as previously said:-(
Thanks a lot @neolit123 .. and sorry for not realizing on this before raising this issue :-(

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. sig/node Categorizes an issue or PR as relevant to SIG Node.
Projects
None yet
Development

No branches or pull requests

3 participants