Created
April 17, 2018 18:49
-
-
Save bgulla/70ab9e100dedaba013240e074bf9324b to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
user@gulla-brandon-9ad8ebdf3:~$ sudo kubeadm init --pod-network-cidr=10.244.0.0/16 | |
[init] Using Kubernetes version: v1.10.1 | |
[init] Using Authorization modes: [Node RBAC] | |
[preflight] Running pre-flight checks. | |
[WARNING FileExisting-crictl]: crictl not found in system path | |
Suggestion: go get github.com/kubernetes-incubator/cri-tools/cmd/crictl | |
[certificates] Generated ca certificate and key. | |
[certificates] Generated apiserver certificate and key. | |
[certificates] apiserver serving cert is signed for DNS names [gulla-brandon-9ad8ebdf3.mylabserver.com kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IP | |
s [10.96.0.1 172.31.115.181] | |
[certificates] Generated apiserver-kubelet-client certificate and key. | |
[certificates] Generated etcd/ca certificate and key. | |
[certificates] Generated etcd/server certificate and key. | |
[certificates] etcd/server serving cert is signed for DNS names [localhost] and IPs [127.0.0.1] | |
[certificates] Generated etcd/peer certificate and key. | |
[certificates] etcd/peer serving cert is signed for DNS names [gulla-brandon-9ad8ebdf3.mylabserver.com] and IPs [172.31.115.181] | |
[certificates] Generated etcd/healthcheck-client certificate and key. | |
[certificates] Generated apiserver-etcd-client certificate and key. | |
[certificates] Generated sa key and public key. | |
[certificates] Generated front-proxy-ca certificate and key. | |
[certificates] Generated front-proxy-client certificate and key. | |
[certificates] Valid certificates and keys now exist in "/etc/kubernetes/pki" | |
[kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/admin.conf" | |
[kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/kubelet.conf" | |
[kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/controller-manager.conf" | |
[kubeconfig] Wrote KubeConfig file to disk: "/etc/kubernetes/scheduler.conf" | |
[controlplane] Wrote Static Pod manifest for component kube-apiserver to "/etc/kubernetes/manifests/kube-apiserver.yaml" | |
[controlplane] Wrote Static Pod manifest for component kube-controller-manager to "/etc/kubernetes/manifests/kube-controller-manager.yaml" | |
[controlplane] Wrote Static Pod manifest for component kube-scheduler to "/etc/kubernetes/manifests/kube-scheduler.yaml" | |
[etcd] Wrote Static Pod manifest for a local etcd instance to "/etc/kubernetes/manifests/etcd.yaml" | |
[init] Waiting for the kubelet to boot up the control plane as Static Pods from directory "/etc/kubernetes/manifests". | |
[init] This might take a minute or longer if the control plane images have to be pulled. | |
Unfortunately, an error has occurred: | |
timed out waiting for the condition | |
This error is likely caused by: | |
- The kubelet is not running | |
- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled) | |
- Either there is no internet connection, or imagePullPolicy is set to "Never", | |
so the kubelet cannot pull or find the following control plane images: | |
- k8s.gcr.io/kube-apiserver-amd64:v1.10.1 | |
- k8s.gcr.io/kube-controller-manager-amd64:v1.10.1 | |
- k8s.gcr.io/kube-scheduler-amd64:v1.10.1 | |
- k8s.gcr.io/etcd-amd64:3.1.12 (only if no external etcd endpoints are configured) | |
If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands: | |
- 'systemctl status kubelet' | |
- 'journalctl -xeu kubelet' | |
couldn't initialize a Kubernetes cluster |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment