derailed / k9s

🐶 Kubernetes CLI To Manage Your Clusters In Style!
https://k9scli.io
Apache License 2.0
26.9k stars 1.69k forks source link

Only one node listed in k3s cluster, unlike kubectl #1746

Closed xavgra2 closed 1 year ago

xavgra2 commented 2 years ago

I have a K3S cluster. With kubectl I get all the nodes, but with k9s, only one node is showed. Using the same kubeconfig file. I would expect to see all the cluster nodes in the screen.

xavgra2@mgmt:~$ kubectl get nodes NAME STATUS ROLES AGE VERSION k1 Ready <none> 17d v1.24.4+k3s1 k2 Ready <none> 17d v1.24.4+k3s1 k0 Ready control-plane,master 17d v1.24.4+k3s1

But in k9s NAME↑ STATUS ROLE VERSION PODS CPU MEM %CPU %MEM CPU/A MEM/A AGE ││ k1 Ready <none> v1.24.4+k3s1 0 37 673 3 70 1000 952 17d

Versions :

derailed commented 2 years ago

@xavgra2 Hum strange indeed. Can you dump the k9s logs and see if something crapped out? Tx!

xavgra2 commented 2 years ago

Here is the result of log dump in "trace" level. Hope it can give you more information.

1:05AM INF 🐶 K9s starting up... 1:05AM DBG Active Context "default" 1:05AM INF ✅ Kubernetes connectivity 1:05AM WRN No context specific skin file found -- /home/xavgra2/.config/k9s/default_skin.yml 1:05AM WRN No skin file found -- /home/xavgra2/.config/k9s/skin.yml. Loading stock skins. 1:05AM DBG Factory START with ns "all" 1:05AM TRC [CAN] v1/nodes([list]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:19 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:list,Group:,Version:v1,Resource:nodes,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<<nil>>> 1:05AM TRC [CAN] v1/nodes([list watch]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:19 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:list,Group:,Version:v1,Resource:nodes,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<<nil>>> 1:05AM TRC [CAN] v1/nodes([list watch]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:19 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:watch,Group:,Version:v1,Resource:nodes,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<<nil>>> 1:05AM TRC [CAN] metrics.k8s.io/v1beta1/nodes([list]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:19 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:group":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:list,Group:metrics.k8s.io,Version:v1beta1,Resource:nodes,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<<nil>>> 1:05AM DBG Fetching latest k9s rev... 1:05AM DBG K9s latest rev: "v0.26.3" 1:05AM TRC [CAN] apiextensions.k8s.io/v1/customresourcedefinitions([list watch]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:20 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:group":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:list,Group:apiextensions.k8s.io,Version:v1,Resource:customresourcedefinitions,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<<nil>>> 1:05AM TRC [CAN] apiextensions.k8s.io/v1/customresourcedefinitions([list watch]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:20 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:group":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:watch,Group:apiextensions.k8s.io,Version:v1,Resource:customresourcedefinitions,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<<nil>>> 1:05AM DBG CustomView watching/home/xavgra2/.config/k9s/views.yml 1:05AM WRN Custom view load failed /home/xavgra2/.config/k9s/views.yml error="open /home/xavgra2/.config/k9s/views.yml: no such file or directory" 1:05AM WRN CustomView watcher failed error="no such file or directory" 1:05AM TRC [CAN] v1/pods([list watch]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:20 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:list,Group:,Version:v1,Resource:pods,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<>> 1:05AM TRC [CAN] v1/pods([list watch]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:20 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:watch,Group:,Version:v1,Resource:pods,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<>> 1:05AM TRC [CAN] metrics.k8s.io/v1beta1/pods([list]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:20 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:group":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:,Verb:list,Group:metrics.k8s.io,Version:v1beta1,Resource:pods,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<>> 1:05AM TRC [CAN] v1/pods([get]) &SelfSubjectAccessReview{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] [{k9s Update authorization.k8s.io/v1 2022-09-16 01:05:22 +0200 CEST FieldsV1 {"f:spec":{"f:resourceAttributes":{".":{},"f:namespace":{},"f:resource":{},"f:verb":{},"f:version":{}}}} }]},Spec:SelfSubjectAccessReviewSpec{ResourceAttributes:&ResourceAttributes{Namespace:guacamole,Verb:get,Group:,Version:v1,Resource:pods,Subresource:,Name:,},NonResourceAttributes:nil,},Status:SubjectAccessReviewStatus{Allowed:true,Reason:,EvaluationError:,Denied:false,},} <<>> 1:05AM DBG TABLE-UPDATER canceled -- "v1/pods"

xavgra2 commented 1 year ago

I think I missunderstood the usage of the "node" option. I though it was the listing of all nodes, but it seems to be the node assign to the currend pod. So works as designed.