FatmanUK / k3s_playground

0 stars 0 forks source link

Not seeing etcd in roles #2

Closed FatmanUK closed 10 months ago

FatmanUK commented 10 months ago

[ansible@k3s-mother-001 ~]$ kubectl get nodes NAME STATUS ROLES AGE VERSION k3s-mother-001 Ready control-plane,master 20h v1.28.4+k3s2 k3s-child-002 NotReady 9h v1.28.4+k3s2 k3s-child-001 NotReady 10h v1.28.4+k3s2

FatmanUK commented 10 months ago

[ansible@k3s-mother-001 ~]$ grep etcd /var/log/k3s | cut -d\ -f 1- | uniq | less time="2023-12-24T13:20:34Z" level=info msg="Failed to test temporary data store connection: etcd datastore is not started" time="2023-12-24T13:20:35Z" level=info msg="Failed to test temporary data store connection: etcd datastore is not started" time="2023-12-24T13:20:36Z" level=info msg="Failed to test temporary data store connection: etcd datastore is not started" ... time="2023-12-24T13:21:49Z" level=info msg="Failed to test temporary data store connection: etcd datastore is not started" time="2023-12-24T13:41:37Z" level=info msg="Managed etcd cluster bootstrap already complete and initialized" time="2023-12-24T13:41:37Z" level=info msg="Starting temporary etcd to reconcile with datastore" {"level":"info","ts":"2023-12-24T13:41:38.06201Z","caller":"embed/etcd.go:127","msg":"configuring peer listeners","listen-peer-urls":["http://127.0.0.1:2400"]} {"level":"info","ts":"2023-12-24T13:41:38.062266Z","caller":"embed/etcd.go:135","msg":"configuring client listeners","listen-client-urls":["http://127.0.0.1:2399"]} {"level":"info","ts":"2023-12-24T13:41:38.062395Z","caller":"embed/etcd.go:309","msg":"starting an etcd server","etcd-version":"3.5.9","git-sha":"Not provided (use ./build instead of go build)","go-version":"go1.20.11","go-os":"linux","go-arch":"amd64","max-cpu-set":1,"max-cpu-available":1,"member-initialized":true,"name":"k3s-mother-001-e205e81c","data-dir":"/var/lib/rancher/k3s/server/db/etcd-tmp","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/rancher/k3s/server/db/etcd-tmp/member","force-new-cluster":true,"heartbeat-interval":"500ms","election-timeout":"5s","initial-election-tick-advance":true,"snapshot-count":10000,"max-wals":0,"max-snapshots":0,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://127.0.0.1:2400"],"listen-peer-urls":["http://127.0.0.1:2400"],"advertise-client-urls":["http://127.0.0.1:2399"],"listen-client-urls":["http://127.0.0.1:2399"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"","initial-cluster-state":"new","initial-cluster-token":"","quota-backend-bytes":2147483648,"max-request-bytes":1572864,"max-concurrent-streams":4294967295,"pre-vote":true,"initial-corrupt-check":true,"corrupt-check-time-interval":"0s","compact-check-time-enabled":false,"compact-check-time-interval":"1m0s","auto-compaction-mode":"","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} {"level":"info","ts":"2023-12-24T13:41:38.062773Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/rancher/k3s/server/db/etcd-tmp/member/snap/db","took":"106.231µs"} {"level":"info","ts":"2023-12-24T13:41:38.063113Z","caller":"etcdserver/server.go:530","msg":"No snapshot found. Recovering WAL from scratch!"} {"level":"info","ts":"2023-12-24T13:41:38.072569Z","caller":"etcdserver/raft.go:603","msg":"forcing restart member","cluster-id":"ec07a2dcfeb06962","local-member-id":"7987f954c65696c0","commit-index":183} {"level":"info","ts":"2023-12-24T13:41:38.072755Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 switched to configuration voters=()"} {"level":"info","ts":"2023-12-24T13:41:38.072856Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 became follower at term 61"} {"level":"info","ts":"2023-12-24T13:41:38.072911Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 7987f954c65696c0 [peers: [], term: 61, commit: 183, applied: 0, lastindex: 183, lastterm: 61]"} {"level":"info","ts":"2023-12-24T13:41:38.085193Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} {"level":"info","ts":"2023-12-24T13:41:38.086734Z","caller":"etcdserver/corrupt.go:95","msg":"starting initial corruption check","local-member-id":"7987f954c65696c0","timeout":"15s"} {"level":"info","ts":"2023-12-24T13:41:38.086827Z","caller":"etcdserver/corrupt.go:165","msg":"initial corruption checking passed; no corruption","local-member-id":"7987f954c65696c0"} {"level":"info","ts":"2023-12-24T13:41:38.086887Z","caller":"etcdserver/server.go:854","msg":"starting etcd server","local-member-id":"7987f954c65696c0","local-server-version":"3.5.9","cluster-version":"to_be_decided"} {"level":"info","ts":"2023-12-24T13:41:38.088274Z","caller":"embed/etcd.go:278","msg":"now serving peer/client/metrics","local-member-id":"7987f954c65696c0","initial-advertise-peer-urls":["http://127.0.0.1:2400"],"listen-peer-urls":["http://127.0.0.1:2400"],"advertise-client-urls":["http://127.0.0.1:2399"],"listen-client-urls":["http://127.0.0.1:2399"],"listen-metrics-urls":[]} {"level":"info","ts":"2023-12-24T13:41:38.088562Z","caller":"etcdserver/server.go:754","msg":"starting initial election tick advance","election-ticks":10} {"level":"info","ts":"2023-12-24T13:41:38.088842Z","caller":"embed/etcd.go:597","msg":"serving peer traffic","address":"127.0.0.1:2400"} {"level":"info","ts":"2023-12-24T13:41:38.088897Z","caller":"embed/etcd.go:569","msg":"cmux::serve","address":"127.0.0.1:2400"} {"level":"info","ts":"2023-12-24T13:41:38.089187Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 switched to configuration voters=(8757242142945351360)"} {"level":"info","ts":"2023-12-24T13:41:47.573301Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 is starting a new election at term 61"} {"level":"info","ts":"2023-12-24T13:41:47.57375Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 became pre-candidate at term 61"} {"level":"info","ts":"2023-12-24T13:41:47.573981Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 received MsgPreVoteResp from 7987f954c65696c0 at term 61"} {"level":"info","ts":"2023-12-24T13:41:47.574138Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 became candidate at term 62"} {"level":"info","ts":"2023-12-24T13:41:47.574275Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 received MsgVoteResp from 7987f954c65696c0 at term 62"} {"level":"info","ts":"2023-12-24T13:41:47.574414Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 became leader at term 62"} {"level":"info","ts":"2023-12-24T13:41:47.574645Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 7987f954c65696c0 elected leader 7987f954c65696c0 at term 62"} {"level":"info","ts":"2023-12-24T13:41:47.585991Z","caller":"etcdserver/server.go:2064","msg":"published local member to cluster through raft","local-member-id":"7987f954c65696c0","local-member-attributes":"{Name:k3s-mother-001-e205e81c ClientURLs:[http://127.0.0.1:2399]}","request-path":"/0/members/7987f954c65696c0/attributes","cluster-id":"ec07a2dcfeb06962","publish-timeout":"15s"} time="2023-12-24T13:41:47Z" level=info msg="Defragmenting etcd database" {"level":"info","ts":"2023-12-24T13:41:47.597569Z","caller":"backend/backend.go:497","msg":"defragmenting","path":"/var/lib/rancher/k3s/server/db/etcd-tmp/member/snap/db","current-db-size-bytes":32768,"current-db-size":"33 kB","current-db-size-in-use-bytes":28672,"current-db-size-in-use":"29 kB"} {"level":"info","ts":"2023-12-24T13:41:47.602487Z","caller":"backend/backend.go:549","msg":"finished defragmenting directory","path":"/var/lib/rancher/k3s/server/db/etcd-tmp/member/snap/db","current-db-size-bytes-diff":0,"current-db-size-bytes":32768,"current-db-size":"33 kB","current-db-size-in-use-bytes-diff":-4096,"current-db-size-in-use-bytes":24576,"current-db-size-in-use":"25 kB","took":"9.439314ms"} time="2023-12-24T13:41:47Z" level=info msg="etcd temporary data store connection OK" time="2023-12-24T13:41:47Z" level=info msg="stopping etcd" {"level":"info","ts":"2023-12-24T13:41:47.614383Z","caller":"embed/etcd.go:376","msg":"closing etcd server","name":"k3s-mother-001-e205e81c","data-dir":"/var/lib/rancher/k3s/server/db/etcd-tmp","advertise-peer-urls":["http://127.0.0.1:2400"],"advertise-client-urls":["http://127.0.0.1:2399"]} time="2023-12-24T13:41:47Z" level=info msg="Starting etcd for existing cluster member" {"level":"info","ts":"2023-12-24T13:41:47.615729Z","caller":"embed/etcd.go:127","msg":"configuring peer listeners","listen-peer-urls":["https://10.11.0.1:2380","https://127.0.0.1:2380"]} {"level":"info","ts":"2023-12-24T13:41:47.615826Z","caller":"embed/etcd.go:495","msg":"starting with peer TLS","tls-info":"cert = /var/lib/rancher/k3s/server/tls/etcd/peer-server-client.crt, key = /var/lib/rancher/k3s/server/tls/etcd/peer-server-client.key, client-cert=, client-key=, trusted-ca = /var/lib/rancher/k3s/server/tls/etcd/peer-ca.crt, client-cert-auth = true, crl-file = ","cipher-suites":[]} {"level":"info","ts":"2023-12-24T13:41:47.616166Z","caller":"embed/etcd.go:135","msg":"configuring client listeners","listen-client-urls":["https://10.11.0.1:2379","https://127.0.0.1:2379"]} {"level":"info","ts":"2023-12-24T13:41:47.616325Z","caller":"embed/etcd.go:309","msg":"starting an etcd server","etcd-version":"3.5.9","git-sha":"Not provided (use ./build instead of go build)","go-version":"go1.20.11","go-os":"linux","go-arch":"amd64","max-cpu-set":1,"max-cpu-available":1,"member-initialized":true,"name":"k3s-mother-001-e205e81c","data-dir":"/var/lib/rancher/k3s/server/db/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/rancher/k3s/server/db/etcd/member","force-new-cluster":false,"heartbeat-interval":"500ms","election-timeout":"5s","initial-election-tick-advance":true,"snapshot-count":10000,"max-wals":5,"max-snapshots":5,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["https://10.11.0.1:2380","https://127.0.0.1:2380"],"advertise-client-urls":["https://10.11.0.1:2379"],"listen-client-urls":["https://10.11.0.1:2379","https://127.0.0.1:2379"],"listen-metrics-urls":["http://127.0.0.1:2381"],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"","initial-cluster-state":"new","initial-cluster-token":"","quota-backend-bytes":2147483648,"max-request-bytes":1572864,"max-concurrent-streams":4294967295,"pre-vote":true,"initial-corrupt-check":true,"corrupt-check-time-interval":"0s","compact-check-time-enabled":false,"compact-check-time-interval":"1m0s","auto-compaction-mode":"","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} {"level":"info","ts":"2023-12-24T13:41:47.616671Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/rancher/k3s/server/db/etcd/member/snap/db","took":"62.889µs"} {"level":"info","ts":"2023-12-24T13:41:47.617126Z","caller":"etcdserver/server.go:530","msg":"No snapshot found. Recovering WAL from scratch!"} {"level":"info","ts":"2023-12-24T13:41:47.62592Z","caller":"etcdserver/raft.go:530","msg":"restarting local member","cluster-id":"ec07a2dcfeb06962","local-member-id":"7987f954c65696c0","commit-index":183} {"level":"info","ts":"2023-12-24T13:41:47.62609Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 switched to configuration voters=()"} {"level":"info","ts":"2023-12-24T13:41:47.626162Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 became follower at term 61"} {"level":"info","ts":"2023-12-24T13:41:47.626225Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 7987f954c65696c0 [peers: [], term: 61, commit: 183, applied: 0, lastindex: 183, lastterm: 61]"} {"level":"info","ts":"2023-12-24T13:41:47.64189Z","caller":"etcdserver/corrupt.go:95","msg":"starting initial corruption check","local-member-id":"7987f954c65696c0","timeout":"15s"} {"level":"info","ts":"2023-12-24T13:41:47.642038Z","caller":"etcdserver/corrupt.go:165","msg":"initial corruption checking passed; no corruption","local-member-id":"7987f954c65696c0"} {"level":"info","ts":"2023-12-24T13:41:47.6421Z","caller":"etcdserver/server.go:854","msg":"starting etcd server","local-member-id":"7987f954c65696c0","local-server-version":"3.5.9","cluster-version":"to_be_decided"} {"level":"info","ts":"2023-12-24T13:41:47.647078Z","caller":"embed/etcd.go:726","msg":"starting with client TLS","tls-info":"cert = /var/lib/rancher/k3s/server/tls/etcd/server-client.crt, key = /var/lib/rancher/k3s/server/tls/etcd/server-client.key, client-cert=, client-key=, trusted-ca = /var/lib/rancher/k3s/server/tls/etcd/server-ca.crt, client-cert-auth = true, crl-file = ","cipher-suites":[]} {"level":"info","ts":"2023-12-24T13:41:47.64777Z","caller":"etcdserver/server.go:754","msg":"starting initial election tick advance","election-ticks":10} {"level":"info","ts":"2023-12-24T13:41:47.647907Z","caller":"fileutil/purge.go:44","msg":"started to purge file","dir":"/var/lib/rancher/k3s/server/db/etcd/member/snap","suffix":"snap.db","max":5,"interval":"30s"} {"level":"info","ts":"2023-12-24T13:41:47.648194Z","caller":"fileutil/purge.go:44","msg":"started to purge file","dir":"/var/lib/rancher/k3s/server/db/etcd/member/snap","suffix":"snap","max":5,"interval":"30s"} {"level":"info","ts":"2023-12-24T13:41:47.648247Z","caller":"fileutil/purge.go:44","msg":"started to purge file","dir":"/var/lib/rancher/k3s/server/db/etcd/member/wal","suffix":"wal","max":5,"interval":"30s"} {"level":"info","ts":"2023-12-24T13:41:47.648443Z","caller":"embed/etcd.go:597","msg":"serving peer traffic","address":"10.11.0.1:2380"} {"level":"info","ts":"2023-12-24T13:41:47.649032Z","caller":"embed/etcd.go:569","msg":"cmux::serve","address":"10.11.0.1:2380"} {"level":"info","ts":"2023-12-24T13:41:47.649099Z","caller":"embed/etcd.go:597","msg":"serving peer traffic","address":"127.0.0.1:2380"} {"level":"info","ts":"2023-12-24T13:41:47.649136Z","caller":"embed/etcd.go:569","msg":"cmux::serve","address":"127.0.0.1:2380"} {"level":"info","ts":"2023-12-24T13:41:47.649276Z","caller":"embed/etcd.go:278","msg":"now serving peer/client/metrics","local-member-id":"7987f954c65696c0","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["https://10.11.0.1:2380","https://127.0.0.1:2380"],"advertise-client-urls":["https://10.11.0.1:2379"],"listen-client-urls":["https://10.11.0.1:2379","https://127.0.0.1:2379"],"listen-metrics-urls":["http://127.0.0.1:2381"]} {"level":"info","ts":"2023-12-24T13:41:47.67186Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 switched to configuration voters=(8757242142945351360)"} {"level":"info","ts":"2023-12-24T13:41:47.673333Z","caller":"embed/etcd.go:855","msg":"serving metrics","address":"http://127.0.0.1:2381"} {"level":"info","ts":"2023-12-24T13:41:47.726655Z","caller":"etcdserver/server.go:1465","msg":"skipped leadership transfer for single voting member cluster","local-member-id":"7987f954c65696c0","current-leader-member-id":"7987f954c65696c0"} {"level":"info","ts":"2023-12-24T13:41:47.738531Z","caller":"embed/etcd.go:579","msg":"stopping serving peer traffic","address":"127.0.0.1:2400"} {"level":"info","ts":"2023-12-24T13:41:47.738712Z","caller":"embed/etcd.go:584","msg":"stopped serving peer traffic","address":"127.0.0.1:2400"} {"level":"info","ts":"2023-12-24T13:41:47.738755Z","caller":"embed/etcd.go:378","msg":"closed etcd server","name":"k3s-mother-001-e205e81c","data-dir":"/var/lib/rancher/k3s/server/db/etcd-tmp","advertise-peer-urls":["http://127.0.0.1:2400"],"advertise-client-urls":["http://127.0.0.1:2399"]} time="2023-12-24T13:41:47Z" level=info msg="Running kube-apiserver --advertise-port=6443 --allow-privileged=true --anonymous-auth=false --api-audiences=https://kubernetes.default.svc.cluster.local,k3s --authorization-mode=Node,RBAC --bind-address=127.0.0.1 --cert-dir=/var/lib/rancher/k3s/server/tls/temporary-certs --client-ca-file=/var/lib/rancher/k3s/server/tls/client-ca.crt --egress-selector-config-file=/var/lib/rancher/k3s/server/etc/egress-selector-config.yaml --enable-admission-plugins=NodeRestriction --enable-aggregator-routing=true --enable-bootstrap-token-auth=true --etcd-cafile=/var/lib/rancher/k3s/server/tls/etcd/server-ca.crt --etcd-certfile=/var/lib/rancher/k3s/server/tls/etcd/client.crt --etcd-keyfile=/var/lib/rancher/k3s/server/tls/etcd/client.key --etcd-servers=https://127.0.0.1:2379 --feature-gates=JobTrackingWithFinalizers=true --kubelet-certificate-authority=/var/lib/rancher/k3s/server/tls/server-ca.crt --kubelet-client-certificate=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt --kubelet-client-key=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --profiling=false --proxy-client-cert-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.crt --proxy-client-key-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.key --requestheader-allowed-names=system:auth-proxy --requestheader-client-ca-file=/var/lib/rancher/k3s/server/tls/request-header-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6444 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/var/lib/rancher/k3s/server/tls/service.key --service-account-signing-key-file=/var/lib/rancher/k3s/server/tls/service.current.key --service-cluster-ip-range=10.43.0.0/16 --service-node-port-range=30000-32767 --storage-backend=etcd3 --tls-cert-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.crt --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 --tls-private-key-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.key" {"level":"info","ts":"2023-12-24T13:41:54.626454Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 is starting a new election at term 61"} {"level":"info","ts":"2023-12-24T13:41:54.626677Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 became pre-candidate at term 61"} {"level":"info","ts":"2023-12-24T13:41:54.626697Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 received MsgPreVoteResp from 7987f954c65696c0 at term 61"} {"level":"info","ts":"2023-12-24T13:41:54.626711Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 became candidate at term 62"} {"level":"info","ts":"2023-12-24T13:41:54.626715Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 received MsgVoteResp from 7987f954c65696c0 at term 62"} {"level":"info","ts":"2023-12-24T13:41:54.626721Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"7987f954c65696c0 became leader at term 62"} {"level":"info","ts":"2023-12-24T13:41:54.626726Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 7987f954c65696c0 elected leader 7987f954c65696c0 at term 62"} {"level":"info","ts":"2023-12-24T13:41:54.633205Z","caller":"etcdserver/server.go:2064","msg":"published local member to cluster through raft","local-member-id":"7987f954c65696c0","local-member-attributes":"{Name:k3s-mother-001-e205e81c ClientURLs:[https://10.11.0.1:2379]}","request-path":"/0/members/7987f954c65696c0/attributes","cluster-id":"ec07a2dcfeb06962","publish-timeout":"15s"} time="2023-12-24T13:41:54Z" level=info msg="Defragmenting etcd database" {"level":"info","ts":"2023-12-24T13:41:54.746301Z","caller":"backend/backend.go:497","msg":"defragmenting","path":"/var/lib/rancher/k3s/server/db/etcd/member/snap/db","current-db-size-bytes":32768,"current-db-size":"33 kB","current-db-size-in-use-bytes":32768,"current-db-size-in-use":"33 kB"} {"level":"info","ts":"2023-12-24T13:41:54.750143Z","caller":"backend/backend.go:549","msg":"finished defragmenting directory","path":"/var/lib/rancher/k3s/server/db/etcd/member/snap/db","current-db-size-bytes-diff":0,"current-db-size-bytes":32768,"current-db-size":"33 kB","current-db-size-in-use-bytes-diff":-8192,"current-db-size-in-use-bytes":24576,"current-db-size-in-use":"25 kB","took":"14.375555ms"} time="2023-12-24T13:41:54Z" level=info msg="etcd data store connection OK" time="2023-12-24T13:42:05Z" level=warning msg="Failed to list nodes with etcd role: runtime core not ready" time="2023-12-24T13:42:11Z" level=info msg="Applying CRD etcdsnapshotfiles.k3s.cattle.io" time="2023-12-24T13:42:12Z" level=info msg="Starting managed etcd node metadata controller" I1224 13:42:12.278958 824 leaderelection.go:250] attempting to acquire leader lease kube-system/k3s-etcd... I1224 13:42:12.307684 824 leaderelection.go:260] successfully acquired lease kube-system/k3s-etcd time="2023-12-24T13:42:12Z" level=info msg="Starting managed etcd apiserver addresses controller" time="2023-12-24T13:42:12Z" level=info msg="Starting managed etcd member removal controller" time="2023-12-24T13:42:12Z" level=info msg="Starting managed etcd snapshot ConfigMap controller" time="2023-12-24T13:42:20Z" level=info msg="Adding etcd member k3s-mother-001-e205e81c status condition" time="2023-12-24T14:31:24Z" level=info msg="Running kube-apiserver --advertise-port=6443 --allow-privileged=true --anonymous-auth=false --api-audiences=https://kubernetes.default.svc.cluster.local,k3s --authorization-mode=Node,RBAC --bind-address=127.0.0.1 --cert-dir=/var/lib/rancher/k3s/server/tls/temporary-certs --client-ca-file=/var/lib/rancher/k3s/server/tls/client-ca.crt --egress-selector-config-file=/var/lib/rancher/k3s/server/etc/egress-selector-config.yaml --enable-admission-plugins=NodeRestriction --enable-aggregator-routing=true --enable-bootstrap-token-auth=true --etcd-servers=unix://kine.sock --feature-gates=JobTrackingWithFinalizers=true --kubelet-certificate-authority=/var/lib/rancher/k3s/server/tls/server-ca.crt --kubelet-client-certificate=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt --kubelet-client-key=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --profiling=false --proxy-client-cert-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.crt --proxy-client-key-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.key --requestheader-allowed-names=system:auth-proxy --requestheader-client-ca-file=/var/lib/rancher/k3s/server/tls/request-header-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6444 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/var/lib/rancher/k3s/server/tls/service.key --service-account-signing-key-file=/var/lib/rancher/k3s/server/tls/service.current.key --service-cluster-ip-range=10.43.0.0/16 --service-node-port-range=30000-32767 --storage-backend=etcd3 --tls-cert-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.crt --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 --tls-private-key-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.key" time="2023-12-24T14:31:26Z" level=info msg="Running kube-apiserver --advertise-port=6443 --allow-privileged=true --anonymous-auth=false --api-audiences=https://kubernetes.default.svc.cluster.local,k3s --authorization-mode=Node,RBAC --bind-address=127.0.0.1 --cert-dir=/var/lib/rancher/k3s/server/tls/temporary-certs --client-ca-file=/var/lib/rancher/k3s/server/tls/client-ca.crt --egress-selector-config-file=/var/lib/rancher/k3s/server/etc/egress-selector-config.yaml --enable-admission-plugins=NodeRestriction --enable-aggregator-routing=true --enable-bootstrap-token-auth=true --etcd-servers=unix://kine.sock --feature-gates=JobTrackingWithFinalizers=true --kubelet-certificate-authority=/var/lib/rancher/k3s/server/tls/server-ca.crt --kubelet-client-certificate=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt --kubelet-client-key=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --profiling=false --proxy-client-cert-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.crt --proxy-client-key-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.key --requestheader-allowed-names=system:auth-proxy --requestheader-client-ca-file=/var/lib/rancher/k3s/server/tls/request-header-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6444 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/var/lib/rancher/k3s/server/tls/service.key --service-account-signing-key-file=/var/lib/rancher/k3s/server/tls/service.current.key --service-cluster-ip-range=10.43.0.0/16 --service-node-port-range=30000-32767 --storage-backend=etcd3 --tls-cert-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.crt --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 --tls-private-key-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.key" Trace[2122637767]: ["List(recursive=true) etcd3" audit-id:d637534e-23f9-4052-bb08-6f1d91b83a81,key:/apiextensions.k8s.io/customresourcedefinitions,resourceVersion:,resourceVersionMatch:,limit:0,continue: 703ms (14:31:30.245)] Trace[7847086]: ["List(recursive=true) etcd3" audit-id:24fcf328-8acd-48fe-934d-8a311b875513,key:/apiextensions.k8s.io/customresourcedefinitions,resourceVersion:,resourceVersionMatch:,limit:0,continue: 615ms (14:31:31.128)] time="2023-12-24T14:31:32Z" level=info msg="Applying CRD etcdsnapshotfiles.k3s.cattle.io" time="2023-12-24T14:33:14Z" level=info msg="Running kube-apiserver --advertise-port=6443 --allow-privileged=true --anonymous-auth=false --api-audiences=https://kubernetes.default.svc.cluster.local,k3s --authorization-mode=Node,RBAC --bind-address=127.0.0.1 --cert-dir=/var/lib/rancher/k3s/server/tls/temporary-certs --client-ca-file=/var/lib/rancher/k3s/server/tls/client-ca.crt --egress-selector-config-file=/var/lib/rancher/k3s/server/etc/egress-selector-config.yaml --enable-admission-plugins=NodeRestriction --enable-aggregator-routing=true --enable-bootstrap-token-auth=true --etcd-servers=unix://kine.sock --feature-gates=JobTrackingWithFinalizers=true --kubelet-certificate-authority=/var/lib/rancher/k3s/server/tls/server-ca.crt --kubelet-client-certificate=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt --kubelet-client-key=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --profiling=false --proxy-client-cert-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.crt --proxy-client-key-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.key --requestheader-allowed-names=system:auth-proxy --requestheader-client-ca-file=/var/lib/rancher/k3s/server/tls/request-header-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6444 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/var/lib/rancher/k3s/server/tls/service.key --service-account-signing-key-file=/var/lib/rancher/k3s/server/tls/service.current.key --service-cluster-ip-range=10.43.0.0/16 --service-node-port-range=30000-32767 --storage-backend=etcd3 --tls-cert-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.crt --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 --tls-private-key-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.key" Trace[1837568295]: ["List(recursive=true) etcd3" audit-id:8e6c41e3-25ae-4fca-82f5-732631679a91,key:/apiextensions.k8s.io/customresourcedefinitions,resourceVersion:,resourceVersionMatch:,limit:0,continue: 562ms (14:33:19.140)] time="2023-12-24T14:33:21Z" level=info msg="Applying CRD etcdsnapshotfiles.k3s.cattle.io" time="2023-12-24T22:56:34Z" level=info msg="Running kube-apiserver --advertise-port=6443 --allow-privileged=true --anonymous-auth=false --api-audiences=https://kubernetes.default.svc.cluster.local,k3s --authorization-mode=Node,RBAC --bind-address=127.0.0.1 --cert-dir=/var/lib/rancher/k3s/server/tls/temporary-certs --client-ca-file=/var/lib/rancher/k3s/server/tls/client-ca.crt --egress-selector-config-file=/var/lib/rancher/k3s/server/etc/egress-selector-config.yaml --enable-admission-plugins=NodeRestriction --enable-aggregator-routing=true --enable-bootstrap-token-auth=true --etcd-servers=unix://kine.sock --feature-gates=JobTrackingWithFinalizers=true --kubelet-certificate-authority=/var/lib/rancher/k3s/server/tls/server-ca.crt --kubelet-client-certificate=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt --kubelet-client-key=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --profiling=false --proxy-client-cert-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.crt --proxy-client-key-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.key --requestheader-allowed-names=system:auth-proxy --requestheader-client-ca-file=/var/lib/rancher/k3s/server/tls/request-header-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6444 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/var/lib/rancher/k3s/server/tls/service.key --service-account-signing-key-file=/var/lib/rancher/k3s/server/tls/service.current.key --service-cluster-ip-range=10.43.0.0/16 --service-node-port-range=30000-32767 --storage-backend=etcd3 --tls-cert-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.crt --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 --tls-private-key-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.key" Trace[792016608]: ["List(recursive=true) etcd3" audit-id:c8b10267-471b-4e08-8be1-0f4867cd0850,key:/apiextensions.k8s.io/customresourcedefinitions,resourceVersion:,resourceVersionMatch:,limit:0,continue: 507ms (22:56:38.972)] Trace[1608392624]: ["Create etcd3" audit-id:db89a04c-5375-4e69-9ca4-ea354fc5537f,key:/events/default/k3s-mother-001.17a3e6920d194bee,type:*core.Event,resource:events 666ms (22:56:39.187) time="2023-12-24T22:56:40Z" level=info msg="Applying CRD etcdsnapshotfiles.k3s.cattle.io" time="2023-12-25T09:13:45Z" level=info msg="Running kube-apiserver --advertise-port=6443 --allow-privileged=true --anonymous-auth=false --api-audiences=https://kubernetes.default.svc.cluster.local,k3s --authorization-mode=Node,RBAC --bind-address=127.0.0.1 --cert-dir=/var/lib/rancher/k3s/server/tls/temporary-certs --client-ca-file=/var/lib/rancher/k3s/server/tls/client-ca.crt --egress-selector-config-file=/var/lib/rancher/k3s/server/etc/egress-selector-config.yaml --enable-admission-plugins=NodeRestriction --enable-aggregator-routing=true --enable-bootstrap-token-auth=true --etcd-servers=unix://kine.sock --feature-gates=JobTrackingWithFinalizers=true --kubelet-certificate-authority=/var/lib/rancher/k3s/server/tls/server-ca.crt --kubelet-client-certificate=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt --kubelet-client-key=/var/lib/rancher/k3s/server/tls/client-kube-apiserver.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --profiling=false --proxy-client-cert-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.crt --proxy-client-key-file=/var/lib/rancher/k3s/server/tls/client-auth-proxy.key --requestheader-allowed-names=system:auth-proxy --requestheader-client-ca-file=/var/lib/rancher/k3s/server/tls/request-header-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=6444 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/var/lib/rancher/k3s/server/tls/service.key --service-account-signing-key-file=/var/lib/rancher/k3s/server/tls/service.current.key --service-cluster-ip-range=10.43.0.0/16 --service-node-port-range=30000-32767 --storage-backend=etcd3 --tls-cert-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.crt --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 --tls-private-key-file=/var/lib/rancher/k3s/server/tls/serving-kube-apiserver.key" Trace[1338827437]: ["List(recursive=true) etcd3" audit-id:bbd6cf6f-36d7-475f-8b0c-b715dc7906ff,key:/apiextensions.k8s.io/customresourcedefinitions,resourceVersion:,resourceVersionMatch:,limit:0,continue: 568ms (09:13:49.888)] time="2023-12-25T09:13:51Z" level=info msg="Applying CRD etcdsnapshotfiles.k3s.cattle.io"

FatmanUK commented 10 months ago

Maybe need three master nodes minimum for etcd to start at all?

https://docs.k3s.io/datastore/ha-embedded

Currently only one master node. Try adding two. Keep cluster odd-sized.

FatmanUK commented 10 months ago

Reconfigured the service to include "--cluster-init".