Closed LoRKaa closed 8 months ago
This issue is currently awaiting triage.
SIG Docs takes a lead on issue triage for this website, but any Kubernetes member can accept issues by applying the triage/accepted
label.
The triage/accepted
label can be added by org members by writing /triage accepted
in a comment.
/language en /sig cluster-lifecycle
The documentation on setting up a highly available Kubernetes cluster with kubeadm and an external etcd should provide clear warnings or guidance on this potential issue
i don't recall prior requests for such documentation extension. are you willing to contribute this in a new section - Adding new control plane nodes?
perhaps here: https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/setup-ha-etcd-with-kubeadm/
Thank you for the suggestion! I'm delighted to contribute and help improve the documentation. However, it's my first time contributing to the Kubernetes documentation, so I might need some guidance or references on how to proceed. I'm eager to learn and make a meaningful contribution!
the website has a guide here: https://kubernetes.io/docs/contribute/
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
What happened:
When attempting to add a new control-plane node to a Kubernetes cluster with an external etcd, using the default kubeadm command resulted in the external etcd cluster's certificate being overwritten or corrupted.
What you expected to happen:
The documentation on setting up a highly available Kubernetes cluster with kubeadm and an external etcd should provide clear warnings or guidance on this potential issue. I followed the instructions from the following links:
Setting up a HA etcd cluster with kubeadm Setting up HA Kubernetes with kubeadm
Steps to reproduce:
Set up a Kubernetes cluster with an external etcd following the official documentation linked above. Attempt to add a new control-plane node using the default kubeadm command as suggested in the documentation.
Solution that worked:
I had to create a custom kubeadm configuration file:
And then used the following command to join the node: