Closed KevinMGranger closed 2 years ago
I'm happy to talk in Google Chat if that's easier. I'd love to help solve this for others if they're experiencing it too.
This is fixed by https://github.com/code-ready/snc/pull/578 The fix was too late for the 2.8.0 release, but should be in the 2.9.0 one.
I just tried it with 2.9.0 directly on macOS and the issue is still present. I'll try to change my writeup, it was just a lot of work collecting that the first time. I wish I had automated it 😅
Interesting that the issue was with the client though. I guess that's a good workaround.
I know it's not strictly relevant to CRC, but if you know what certs I'd need to export from the cluster, I'd be happy to manually import and trust them until there's a fix.
Oh, it also looks like the fix wasn't in the release, or isn't working?
$ uname -a; crc version
Darwin m1a1 21.6.0 Darwin Kernel Version 21.6.0: Wed Aug 10 14:28:23 PDT 2022; root:xnu-8020.141.5~2/RELEASE_ARM64_T6000 arm64
CRC version: 2.9.0+589ab2cd
OpenShift version: 4.11.3
Podman version: 4.2.0
Can you check ~/.crc/bin/oc/oc version
?
Ah! I thought https://github.com/code-ready/snc/pull/578 was talking about downgrading the cluster, not the client.
The dev env setup we have for our project automatically downloads the latest. I knew it was 4.11, and was about to manually downgrade. I'll use the version that came with CRC now. Maybe I'll even add a "I'm using CRC" option to our setup script.
Thank you for helping with this, this has been bothering me for a long time.
This should definitely be in the "Known Issues" section for CRC, since many folks won't read the openshift release notes in addition to them. But it looks like the release notes / docs haven't been updated for a few releases?
Looks like anyone using crc properly won't hit this, so it's already fixed :)
Note:
crc
-related information is on the linux machine, andoc
-related information is on the macOS machine.I also embedded various files and log outputs for convenience. I can move them to a gist if you wish.
I actually wrote this up for the first time on September 12th but never posted it. Now that the M1 is finally supported, I tried running it locally on my mac-- and I'm getting the same error!
General information
oc
from macOS.crc setup
before starting it (Yes/No)? YesCRC version
OC version
CRC status
CRC config
Host Operating System
Linux
macOS
topology details
There are three machines, each with different purposes:
oc
from it. Let's call this onemac
crc
. Let's call this onelinux
.dnsmasq
). Let's call this onedns-linux
.All three machines use the third for DNS configuration.
They are connected over
tailscale
, although that shouldn't matter much.Other relevant config files
kubeconfig on linux
~/.crc/machines/crc/kubeconfig
```yaml apiVersion: v1 clusters: - cluster: certificate-authority-data: -----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIDQDCCAiigAwIBAgIIHQWD/gEOXZIwDQYJKoZIhvcNAQELBQAwPjESMBAGA1UE
CxMJb3BlbnNoaWZ0MSgwJgYDVQQDEx9rdWJlLWFwaXNlcnZlci1sb2NhbGhvc3Qt
c2lnbmVyMB4XDTIyMDgyNDA0MTAyMVoXDTMyMDgyMTA0MTAyMVowPjESMBAGA1UE
CxMJb3BlbnNoaWZ0MSgwJgYDVQQDEx9rdWJlLWFwaXNlcnZlci1sb2NhbGhvc3Qt
c2lnbmVyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApiNsZkzVaLS2
E23fT9xlqQTiPuLgRE401c4UlTOcMr6R8j5Z6rv0n9oa13w4hpQTf2MyYurh8X+9
yb/wb/l/EPD70rKOaPxjmHIYZPey+drZOppNnC1L3PveqYsaSX/cPNmtpTAlfDeI
k3hdN/iIkx8RzcE1MjmlaZ81MCw3PbyevwXGeEuhKoFa95Xeru5RtuZP/KeuQfBP
hGhvOPywt6Igt8yk+OKuwvnU7HGvujczRDd5XOQ1lvzyKm5rH14WF39cCzr1i6ql
0eB++UgrMv0ijuZ48cgYjQ7GGZOeI36azRjQQbjkKmNqDyoXbBvLJg7jEApvv/TI
Fs2Z2s20AQIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB
/zAdBgNVHQ4EFgQU6QdsvXo7CfXNz1/io+Xo4O+3EYwwDQYJKoZIhvcNAQELBQAD
ggEBAEJXjiH23I19E8jfrioWxImfKLZZDQbaTiIRZMvOoymXw26xY/dLNmI+whfk
b3YYjCv1Ieg9KyEh3WNUkk+YCxP0+sRDphsfqCaIb4DoMNtzU9zFdh2f09jqGaCh
BT34OZFAT8RnLMukM63sSiWEUFXk1knquBHJASCdo0o3fF9KuW70MxmVThtRsi0i
p/0//USEd8KUt83f/38PMb9MmwOTPR1eGFN9nnzOy69RRmZInmsq7pOjHfwyUUet
o8W2hhaOjVs1X3ktp8a7gh+Qa6dCOFAgOGMqMtDmp2521mXsMweZobC56+Cc/8hr
91Zm7wr0V2CsVwGHsb459tKVPG0=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 server: https://api.crc.testing:6443 name: crc contexts: - context: cluster: crc user: admin name: admin current-context: admin kind: Config preferences: {} users: - name: admin user: client-certificate-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURpRENDQW5DZ0F3SUJBZ0lJR1VhVllvMUw0b1F3RFFZSktvWklodmNOQVFFTEJRQXdQVEVTTUJBR0ExVUUKQ3hNSmIzQmxibk5vYVdaME1TY3dKUVlEVlFRREV4NWhaRzFwYmkxcmRXSmxZMjl1Wm1sbkxYTnBaMjVsY2kxagpkWE4wYjIwd0hoY05Nakl3T1RFeU1qQXdOVE0xV2hjTk16SXdPVEE1TWpBd05UTTFXakF3TVJjd0ZRWURWUVFMCkV3NXplWE4wWlcwNmJXRnpkR1Z5Y3pFVk1CTUdBMVVFQXhNTWMzbHpkR1Z0T21Ga2JXbHVNSUlCSWpBTkJna3EKaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUF5VG54bHNHci9POExIWk1DUFEvcUd0YW8wMEtrZmRFbgoydC9wa0JsSVhSVEhoL2IxV2ptWTZ5VzZIdGRZTFFaRlNmczdRU0MvY0pqN2c2YTdHc2htbUtjWHh4ZGEwa3lZCkhKVG5vZ3lPRGVLVzVXVWYwYy9CL0pGSjhYZGJuQ3crZXd3NjBzMmxESUxDYTVOZjN3M2JKSm1EM2dQS3l0MlkKQ2g3dHNueWlsV0RrRFZoMjRRY09BcDlzeC9pMHF6M2x5b2tlcktZTXRFeThKaW1EaGxNMjlrWkZ6SDNSMy93NApkRHlLbXBUNUVIajZ1ajUzSEhwNnVZMk0rbUtjT01HU3liMjJwRFB6SXZueFNZZmZiNWcxQ3RzR2I5bXRJc2RJCmFIdVpUZ28rWjFRTUlTUzVRMSswV2NxbjJIZDErRzZ2T04vU3lpZjV1UDV1VzhQeGxxTzhGUUlEQVFBQm80R1kKTUlHVk1BNEdBMVVkRHdFQi93UUVBd0lGb0RBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUlLd1lCQlFVSApBd0l3REFZRFZSMFRBUUgvQkFJd0FEQXBCZ05WSFE0RUlnUWc4bEZrNHhHd1JkYStsdDBzV1FGOEJueHVvcEdmClhEamU2OE5UQTVhazdCZ3dLd1lEVlIwakJDUXdJb0FnQnQzN21xZEE1bkZIMUxrWkFiMG0wanIxQXo5eUVmYTgKQU8yL3ZTMnVSdUl3RFFZSktvWklodmNOQVFFTEJRQURnZ0VCQUJrRjNydHR6Mmg4RElUd2JzL0luQmVsNkN2dApBK2tRSzkwbWJFTkY4OWp4SnM4dksxczZGSlhpVXdKVk9ZbU5meTczY2dTYmp5TnljcmFrVUhXS05mMDNkSW1yCmpXdVZHL0U4R0xkUEhZTDY0KzhwcW1uU2NvTG0rRFFSU3FROTBuQllRZUs4YnJsVGY0SG9KQkpUeXVGZGFjaUkKUzRXK3F5SEZsb3JZWGNBWEFxWVZQOHdOVmtXbXBqK0w5bEtaZGxmaFMyK2wwSzU2NjVNcUU1WUQzUm4xckNxUQpQY2JkNHhLL2J3KzJpRFFsMXdOK1N3dm9oS2JBcE1aOG1NdmpuMy9kTDBzMTQyMVgvc2crT3hoY2xXeWpRMC96CmFxN3orQk14ekh5RnlBQ0o1SVlqYlFJVTJvbEp1bmtEOHRyRDdCRTIvaXY0emdJdnM1UlU5eXRQTlFnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg== client-key-data: REDACTED ```resolv.conf on linux machine (crc host)
linux /etc/resolv.conf
``` # resolv.conf(5) file generated by tailscale # DO NOT EDIT THIS FILE BY HAND -- CHANGES WILL BE OVERWRITTEN nameserver 100.100.100.100 search TAILSCALE_USERNAME_REDACTED.beta.tailscale.net apps-crc.testing api.crc.testing ```macos dns config
mac /etc/resolv.conf
``` # # macOS Notice # # This file is not consulted for DNS hostname resolution, address # resolution, or the DNS query routing mechanism used by most # processes on this system. # # To view the DNS configuration used by this system, use: # scutil --dns # # SEE ALSO # dns-sd(1), scutil(8) # # This file is automatically generated. # search TAILSCALE_USERNAME_REDACTED.beta.tailscale.net apps-crc.testing api.crc.testing ISP_DNS_DOMAIN_REDACTED nameserver 100.100.100.100 ```scutil --dns
```console mac$ scutil --dns DNS configuration resolver #1 search domain[0] : TAILSCALE_USERNAME_REDACTED.beta.tailscale.net search domain[1] : apps-crc.testing search domain[2] : api.crc.testing search domain[3] : ISP_DNS_DOMAIN_REDACTED nameserver[0] : 100.100.100.100 if_index : 23 (utun5) flags : Supplemental, Request A records, Request AAAA records reach : 0x00000003 (Reachable,Transient Connection) order : 102600 resolver #2 nameserver[0] : 192.168.1.1 if_index : 13 (en0) flags : Request A records reach : 0x00020002 (Reachable,Directly Reachable Address) order : 200000 resolver #3 domain : TAILSCALE_USERNAME_REDACTED.beta.tailscale.net. nameserver[0] : 100.100.100.100 if_index : 23 (utun5) flags : Supplemental, Request A records, Request AAAA records reach : 0x00000003 (Reachable,Transient Connection) order : 102601 resolver #4 domain : apps-crc.testing. nameserver[0] : 100.100.100.100 if_index : 23 (utun5) flags : Supplemental, Request A records, Request AAAA records reach : 0x00000003 (Reachable,Transient Connection) order : 102602 resolver #5 domain : api.crc.testing. nameserver[0] : 100.100.100.100 if_index : 23 (utun5) flags : Supplemental, Request A records, Request AAAA records reach : 0x00000003 (Reachable,Transient Connection) order : 102603 resolver #6 domain : local options : mdns timeout : 5 flags : Request A records reach : 0x00000000 (Not Reachable) order : 300000 resolver #7 domain : 254.169.in-addr.arpa options : mdns timeout : 5 flags : Request A records reach : 0x00000000 (Not Reachable) order : 300200 resolver #8 domain : 8.e.f.ip6.arpa options : mdns timeout : 5 flags : Request A records reach : 0x00000000 (Not Reachable) order : 300400 resolver #9 domain : 9.e.f.ip6.arpa options : mdns timeout : 5 flags : Request A records reach : 0x00000000 (Not Reachable) order : 300600 resolver #10 domain : a.e.f.ip6.arpa options : mdns timeout : 5 flags : Request A records reach : 0x00000000 (Not Reachable) order : 300800 resolver #11 domain : b.e.f.ip6.arpa options : mdns timeout : 5 flags : Request A records reach : 0x00000000 (Not Reachable) order : 301000 DNS configuration (for scoped queries) resolver #1 search domain[0] : ISP_DNS_DOMAIN_REDACTED nameserver[0] : 192.168.1.1 if_index : 13 (en0) flags : Scoped, Request A records reach : 0x00020002 (Reachable,Directly Reachable Address) resolver #2 search domain[0] : TAILSCALE_USERNAME_REDACTED.beta.tailscale.net search domain[1] : apps-crc.testing search domain[2] : api.crc.testing nameserver[0] : 100.100.100.100 if_index : 23 (utun5) flags : Scoped, Request A records, Request AAAA records reach : 0x00000003 (Reachable,Transient Connection) ```dnsmasq on linux-dns
/etc/dnsmasq.conf
``` # If you don't want dnsmasq to read /etc/resolv.conf or any other # file, getting its servers from this file instead (see below), then # uncomment this. no-resolv server=192.168.1.1 # If you want dnsmasq to change uid and gid to something other # than the default, edit the following lines. user=dnsmasq group=dnsmasq # If you want dnsmasq to listen for DHCP and DNS requests only on # specified interfaces (and the loopback) give the name of the # interface (eg eth0) here. # Repeat the line for more than one interface. #interface= # Listen only on localhost by default #interface=lo #interface=tailscale0 # Or you can specify which interface _not_ to listen on #except-interface= # Or which to listen on by address (remember to include 127.0.0.1 if # you use this.) listen-address=127.0.0.1 listen-address=192.168.1.63 listen-address=192.168.1.220 listen-address=TAILSCALE_IP_REDACTED # Include all files in /etc/dnsmasq.d except RPM backup files conf-dir=/etc/dnsmasq.d,.rpmnew,.rpmsave,.rpmorig ```/etc/dnsmasq.d/crc.conf
``` # tailscale address=/apps-crc.testing/TAILSCALE_IP_REDACTED address=/api.crc.testing/TAILSCALE_IP_REDACTED ```haproxy on linux
/etc/haproxy/haproxy.cfg
``` global log /dev/log local0 defaults balance roundrobin log global maxconn 100 mode tcp timeout connect 5s timeout client 500s timeout server 500s listen apps bind 0.0.0.0:80 server crcvm 192.168.130.11:80 check listen apps_ssl bind 0.0.0.0:443 server crcvm 192.168.130.11:443 check listen api bind 0.0.0.0:6443 server crcvm 192.168.130.11:6443 check ```Steps to reproduce
Note: these steps are simplified since it started happening locally on macOS too. I can rewrite this issue to reflect that, but it's a lot of work to expose the same issue.
crc setup
crc console --credentials
Expected behavior: I am successfully logged in. Actual behavior: x509 errors.
oc login on linux
oc login on mac
```console mac$ rm ~/.kube/config mac$ oc login -u kubeadmin https://api.crc.testing:6443 -p PASSWORD_REDACTED --loglevel=9 --insecure-skip-tls-verify I0912 16:57:48.582512 23120 round_trippers.go:466] curl -v -XHEAD 'https://api.crc.testing:6443/' I0912 16:57:53.592736 23120 round_trippers.go:495] HTTP Trace: DNS Lookup for api.crc.testing resolved to [{TAILSCALE_IP_REDACTED }] I0912 16:57:53.597938 23120 round_trippers.go:510] HTTP Trace: Dial to tcp:TAILSCALE_IP_REDACTED:6443 succeed I0912 16:57:53.619555 23120 round_trippers.go:553] HEAD https://api.crc.testing:6443/ in 5036 milliseconds I0912 16:57:53.619593 23120 round_trippers.go:570] HTTP Statistics: DNSLookup 5009 ms Dial 5 ms TLSHandshake 20 ms Duration 5036 ms I0912 16:57:53.619603 23120 round_trippers.go:577] Response Headers: error: x509: “kube-apiserver-lb-signer” certificate is not trusted mac$ scp linux:~/.crc/machines/crc/kubeconfig ~/.kube/config # attempt to use certificate information from here kubeconfig mac$ oc login -u kubeadmin https://api.crc.testing:6443 -p PASSWORD_REDACTED --loglevel=9 --insecure-skip-tls-verify I0912 16:59:35.036954 23283 loader.go:372] Config loaded from file: /Users/kevin/.kube/config I0912 16:59:35.037341 23283 round_trippers.go:466] curl -v -XHEAD 'https://api.crc.testing:6443/' I0912 16:59:35.047021 23283 round_trippers.go:495] HTTP Trace: DNS Lookup for api.crc.testing resolved to [{TAILSCALE_IP_REDACTED }] I0912 16:59:35.050609 23283 round_trippers.go:510] HTTP Trace: Dial to tcp:TAILSCALE_IP_REDACTED:6443 succeed I0912 16:59:35.067353 23283 round_trippers.go:553] HEAD https://api.crc.testing:6443/ 403 Forbidden in 29 milliseconds I0912 16:59:35.067380 23283 round_trippers.go:570] HTTP Statistics: DNSLookup 9 ms Dial 3 ms TLSHandshake 7 ms ServerProcessing 8 ms Duration 29 ms I0912 16:59:35.067386 23283 round_trippers.go:577] Response Headers: I0912 16:59:35.067429 23283 round_trippers.go:580] X-Content-Type-Options: nosniff I0912 16:59:35.067437 23283 round_trippers.go:580] X-Kubernetes-Pf-Flowschema-Uid: 8e4390e2-7947-48f1-b7a5-aca69ea99dbc I0912 16:59:35.067442 23283 round_trippers.go:580] X-Kubernetes-Pf-Prioritylevel-Uid: bfdd957e-32ce-4b55-84aa-209ed9a9ef83 I0912 16:59:35.067446 23283 round_trippers.go:580] Content-Length: 186 I0912 16:59:35.067450 23283 round_trippers.go:580] Date: Mon, 12 Sep 2022 20:59:35 GMT I0912 16:59:35.067454 23283 round_trippers.go:580] Audit-Id: 066a7292-eaf6-480d-ba77-5f8f360bdb4a I0912 16:59:35.067458 23283 round_trippers.go:580] Cache-Control: no-cache, private I0912 16:59:35.067462 23283 round_trippers.go:580] Content-Type: application/json I0912 16:59:35.067725 23283 round_trippers.go:466] curl -v -XGET -H "X-Csrf-Token: 1" 'https://api.crc.testing:6443/.well-known/oauth-authorization-server' I0912 16:59:35.070964 23283 round_trippers.go:553] GET https://api.crc.testing:6443/.well-known/oauth-authorization-server 200 OK in 3 milliseconds I0912 16:59:35.070987 23283 round_trippers.go:570] HTTP Statistics: GetConnection 0 ms ServerProcessing 3 ms Duration 3 ms I0912 16:59:35.070992 23283 round_trippers.go:577] Response Headers: I0912 16:59:35.070998 23283 round_trippers.go:580] Content-Type: application/json I0912 16:59:35.071003 23283 round_trippers.go:580] X-Kubernetes-Pf-Flowschema-Uid: 8e4390e2-7947-48f1-b7a5-aca69ea99dbc I0912 16:59:35.071007 23283 round_trippers.go:580] X-Kubernetes-Pf-Prioritylevel-Uid: bfdd957e-32ce-4b55-84aa-209ed9a9ef83 I0912 16:59:35.071011 23283 round_trippers.go:580] Content-Length: 573 I0912 16:59:35.071015 23283 round_trippers.go:580] Date: Mon, 12 Sep 2022 20:59:35 GMT I0912 16:59:35.071019 23283 round_trippers.go:580] Audit-Id: bce7f502-78f2-4747-a3d1-bf137b79daa8 I0912 16:59:35.071023 23283 round_trippers.go:580] Cache-Control: no-cache, private I0912 16:59:35.108001 23283 request_token.go:477] unexpected error during system roots probe: x509: “ingress-operator@1661315083” certificate is not trusted I0912 16:59:35.108355 23283 round_trippers.go:466] curl -v -XGET -H "Accept: application/json, */*" -H "User-Agent: oc/4.11.0 (darwin/amd64) kubernetes/fcf512e" 'https://api.crc.testing:6443/api/v1/namespaces/openshift/configmaps/motd' I0912 16:59:35.112550 23283 round_trippers.go:553] GET https://api.crc.testing:6443/api/v1/namespaces/openshift/configmaps/motd 403 Forbidden in 4 milliseconds I0912 16:59:35.112575 23283 round_trippers.go:570] HTTP Statistics: GetConnection 0 ms ServerProcessing 4 ms Duration 4 ms I0912 16:59:35.112580 23283 round_trippers.go:577] Response Headers: I0912 16:59:35.112587 23283 round_trippers.go:580] X-Content-Type-Options: nosniff I0912 16:59:35.112591 23283 round_trippers.go:580] X-Kubernetes-Pf-Flowschema-Uid: 8e4390e2-7947-48f1-b7a5-aca69ea99dbc I0912 16:59:35.112595 23283 round_trippers.go:580] X-Kubernetes-Pf-Prioritylevel-Uid: bfdd957e-32ce-4b55-84aa-209ed9a9ef83 I0912 16:59:35.112599 23283 round_trippers.go:580] Content-Length: 303 I0912 16:59:35.112603 23283 round_trippers.go:580] Date: Mon, 12 Sep 2022 20:59:35 GMT I0912 16:59:35.112607 23283 round_trippers.go:580] Audit-Id: df94edd2-1cf5-411e-8195-b16505313f30 I0912 16:59:35.112611 23283 round_trippers.go:580] Cache-Control: no-cache, private I0912 16:59:35.112990 23283 round_trippers.go:580] Content-Type: application/json I0912 16:59:35.113146 23283 request.go:1073] Response Body: {"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"configmaps \"motd\" is forbidden: User \"system:anonymous\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"openshift\"","reason":"Forbidden","details":{"name":"motd","kind":"configmaps"},"code":403} error: x509: “ingress-operator@1661315083” certificate is not trusted ```Logs
Before beginning, I ran
crc delete -f; rm -rf ~/.crc/
, and downloaded a fresh version ofcrc
.crc setup
linux$ crc setup --log-level 9
``` Successfully configured consent-telemetry to yes Successfully configured pull-secret-file to /home/kevin/crc_pull_secret Changes to configuration property 'memory' are only applied when the CRC instance is started. If you already have a running CRC instance, then for this configuration change to take effect, stop the CRC instance with 'crc stop' and restart it with 'crc start'. Changes to configuration property 'disk-size' are only applied when the CRC instance is started. If you already have a running CRC instance, then for this configuration change to take effect, stop the CRC instance with 'crc stop' and restart it with 'crc start'. [36mINFO[0m Using bundle path /home/kevin/.crc/cache/crc_libvirt_4.11.1_amd64.crcbundle [36mINFO[0m Checking if running as non-root [36mINFO[0m Checking if running inside WSL2 [36mINFO[0m Checking if crc-admin-helper executable is cached [36mINFO[0m Caching crc-admin-helper executable [36mINFO[0m Using root access: Changing ownership of /home/kevin/.crc/bin/crc-admin-helper-linux [sudo] password for kevin: [36mINFO[0m Using root access: Setting suid for /home/kevin/.crc/bin/crc-admin-helper-linux [36mINFO[0m Checking for obsolete admin-helper executable [36mINFO[0m Checking if running on a supported CPU architecture [36mINFO[0m Checking minimum RAM requirements [36mINFO[0m Checking if crc executable symlink exists [36mINFO[0m Creating symlink for crc executable [36mINFO[0m Checking if Virtualization is enabled [36mINFO[0m Checking if KVM is enabled [36mINFO[0m Checking if libvirt is installed [36mINFO[0m Checking if user is part of libvirt group [36mINFO[0m Checking if active user/process is currently part of the libvirt group [36mINFO[0m Checking if libvirt daemon is running [36mINFO[0m Checking if a supported libvirt version is installed [36mINFO[0m Checking if crc-driver-libvirt is installed [36mINFO[0m Installing crc-driver-libvirt [36mINFO[0m Checking crc daemon systemd service [36mINFO[0m Checking crc daemon systemd socket units [36mINFO[0m Checking if systemd-networkd is running [36mINFO[0m Checking if NetworkManager is installed [36mINFO[0m Checking if NetworkManager service is running [36mINFO[0m Checking if dnsmasq configurations file exist for NetworkManager [36mINFO[0m Checking if the systemd-resolved service is running [36mINFO[0m Checking if /etc/NetworkManager/dispatcher.d/99-crc.sh exists [36mINFO[0m Checking if libvirt 'crc' network is available [36mINFO[0m Checking if libvirt 'crc' network is active [36mINFO[0m Checking if CRC bundle is extracted in '$HOME/.crc' [36mINFO[0m Checking if /home/kevin/.crc/cache/crc_libvirt_4.11.1_amd64.crcbundle exists [36mINFO[0m Getting bundle for the CRC executable [36mINFO[0m Downloading crc_libvirt_4.11.1_amd64.crcbundle (progress bar redacted) [36mINFO[0m Uncompressing /home/kevin/.crc/cache/crc_libvirt_4.11.1_amd64.crcbundle (progress bar redacted) Your system is correctly setup for using CRC. Use 'crc start' to start the instance ```crc start
linux$ crc start --log-level=9
``` level=info msg="Checking if running as non-root" level=info msg="Checking if running inside WSL2" level=info msg="Checking if crc-admin-helper executable is cached" level=info msg="Checking for obsolete admin-helper executable" level=info msg="Checking if running on a supported CPU architecture" level=info msg="Checking minimum RAM requirements" level=info msg="Checking if crc executable symlink exists" level=info msg="Checking if Virtualization is enabled" level=info msg="Checking if KVM is enabled" level=info msg="Checking if libvirt is installed" level=info msg="Checking if user is part of libvirt group" level=info msg="Checking if active user/process is currently part of the libvirt group" level=info msg="Checking if libvirt daemon is running" level=info msg="Checking if a supported libvirt version is installed" level=info msg="Checking if crc-driver-libvirt is installed" level=info msg="Checking crc daemon systemd socket units" level=info msg="Checking if systemd-networkd is running" level=info msg="Checking if NetworkManager is installed" level=info msg="Checking if NetworkManager service is running" level=info msg="Checking if dnsmasq configurations file exist for NetworkManager" level=info msg="Checking if the systemd-resolved service is running" level=info msg="Checking if /etc/NetworkManager/dispatcher.d/99-crc.sh exists" level=info msg="Checking if libvirt 'crc' network is available" level=info msg="Checking if libvirt 'crc' network is active" level=info msg="Loading bundle: crc_libvirt_4.11.1_amd64..." level=info msg="Creating CRC VM for openshift 4.11.1..." level=info msg="Generating new SSH key pair..." level=info msg="Generating new password for the kubeadmin user" level=info msg="Starting CRC VM for openshift 4.11.1..." level=info msg="CRC instance is running with IP 192.168.130.11" level=info msg="CRC VM is running" level=info msg="Updating authorized keys..." level=info msg="Resizing /dev/vda4 filesystem" level=info msg="Configuring shared directories" level=info msg="Check internal and public DNS query..." level=info msg="Check DNS query from host..." level=info msg="Verifying validity of the kubelet certificates..." level=info msg="Starting kubelet service" level=info msg="Waiting for kube-apiserver availability... [takes around 2min]" level=info msg="Adding user's pull secret to the cluster..." level=info msg="Updating SSH key to machine config resource..." level=info msg="Waiting for user's pull secret part of instance disk..." level=info msg="Changing the password for the kubeadmin user" level=info msg="Updating cluster ID..." level=info msg="Updating root CA cert to admin-kubeconfig-client-ca configmap..." level=info msg="Starting openshift instance... [waiting for the cluster to stabilize]" level=info msg="3 operators are progressing: image-registry, network, openshift-controller-manager" level=info msg="2 operators are progressing: image-registry, openshift-controller-manager" level=info msg="All operators are available. Ensuring stability..." level=info msg="2 operators are progressing: kube-apiserver, openshift-controller-manager" level=info msg="Operator kube-apiserver is progressing" level=info msg="Operator kube-apiserver is progressing" level=info msg="Operator authentication is not yet available" level=info msg="Operator authentication is not yet available" level=info msg="Operator authentication is not yet available" level=info msg="Operator authentication is not yet available" level=error msg="Cluster is not ready: cluster operators are still not stable after 10m1.49983431s" level=info msg="Adding crc-admin and crc-developer contexts to kubeconfig..." Started the OpenShift cluster. The server is accessible via web console at: https://console-openshift-console.apps-crc.testing Log in as administrator: Username: kubeadmin Password: REDACTED Log in as user: Username: developer Password: developer Use the 'oc' command line interface: $ eval (crc oc-env) $ oc login -u developer https://api.crc.testing:6443 ```