rancher / rke

Rancher Kubernetes Engine (RKE), an extremely simple, lightning fast Kubernetes distribution that runs entirely within containers.
Apache License 2.0
3.22k stars 583 forks source link

Can't use a local registry with RKE #2331

Closed ccamacho closed 3 years ago

ccamacho commented 3 years ago

RKE version: rke version v1.2.2

Docker version: (docker version,docker info preferred) Server Version: 19.03.8

Operating system and kernel: (cat /etc/os-release, uname -r preferred) Ubuntu 20.04 5.4.0-53-generic

Type/provider of hosts: (VirtualBox/Bare-metal/AWS/GCE/DO) Libvirt

cluster.yml file:

nodes:
  - address: rke-master-01.clustername1.kubeinit.local
    hostname_override: rke-master-01
    user: root
    port: "22"
    role:
      - controlplane
      - etcd
    docker_socket: /var/run/docker.sock
    ssh_key: ""
    ssh_key_path: ~/.ssh/id_rsa
    ssh_cert: ""
    ssh_cert_path: ""
    labels: {}
    taints: []
  - address: rke-master-02.clustername1.kubeinit.local
    hostname_override: rke-master-02
    user: root
    port: "22"
    role:
      - controlplane
      - etcd
    docker_socket: /var/run/docker.sock
    ssh_key: ""
    ssh_key_path: ~/.ssh/id_rsa
    ssh_cert: ""
    ssh_cert_path: ""
    labels: {}
    taints: []
  - address: rke-master-03.clustername1.kubeinit.local
    hostname_override: rke-master-03
    user: root
    port: "22"
    role:
      - controlplane
      - etcd
    docker_socket: /var/run/docker.sock
    ssh_key: ""
    ssh_key_path: ~/.ssh/id_rsa
    ssh_cert: ""
    ssh_cert_path: ""
    labels: {}
    taints: []
  - address: rke-worker-01.clustername1.kubeinit.local
    hostname_override: rke-worker-01
    user: root
    port: "22"
    role:
      - worker
    docker_socket: /var/run/docker.sock
    ssh_key: ""
    ssh_key_path: ~/.ssh/id_rsa
    ssh_cert: ""
    ssh_cert_path: ""
    labels: {}
    taints: []
services:
  etcd:
    image: ""
    extra_args: {}
    extra_binds: []
    extra_env: []
    win_extra_args: {}
    win_extra_binds: []
    win_extra_env: []
    external_urls: []
    ca_cert: ""
    cert: ""
    key: ""
    path: ""
    uid: 0
    gid: 0
    snapshot: null
    retention: ""
    creation: ""
    backup_config: null
  kube-api:
    image: ""
    extra_args: {}
    extra_binds: []
    extra_env: []
    win_extra_args: {}
    win_extra_binds: []
    win_extra_env: []
    service_cluster_ip_range: 10.43.0.0/16
    cluster_cidr: 10.42.0.0/16
    service_node_port_range: ""
    pod_security_policy: false
    always_pull_images: false
    secrets_encryption_config: null
    audit_log: null
    admission_configuration: null
    event_rate_limit: null
  kube-controller:
    image: ""
    extra_args: {}
    extra_binds: []
    extra_env: []
    win_extra_args: {}
    win_extra_binds: []
    win_extra_env: []
    service_cluster_ip_range: 10.43.0.0/16
    cluster_cidr: 10.42.0.0/16
  scheduler:
    image: ""
    extra_args: {}
    extra_binds: []
    extra_env: []
    win_extra_args: {}
    win_extra_binds: []
    win_extra_env: []
  kubelet:
    image: ""
    extra_args: {}
    extra_binds: []
    extra_env: []
    win_extra_args: {}
    win_extra_binds: []
    win_extra_env: []
    cluster_domain: cluster.local
    infra_container_image: ""
    cluster_dns_server: 10.43.0.10
    fail_swap_on: false
    generate_serving_certificate: false
  kubeproxy:
    image: ""
    extra_args: {}
    extra_binds: []
    extra_env: []
    win_extra_args: {}
    win_extra_binds: []
    win_extra_env: []
network:
  plugin: canal
  options: {}
  mtu: 0
  node_selector: {}
  update_strategy: null
authentication:
  strategy: x509
  sans: []
  webhook: null
addons: ""
addons_include: []
ssh_key_path: ~/.ssh/id_rsa
ssh_cert_path: ""
ssh_agent_auth: false
authorization:
  mode: rbac
  options: {}
ignore_docker_version: false
kubernetes_version: ""
private_registries:
  - url: rke-service-01:5000
    user: registryusername
    password: registrypassword
    is_default: true
ingress:
  provider: ""
  options: {}
  node_selector: {}
  extra_args: {}
  dns_policy: ""
  extra_envs: []
  extra_volumes: []
  extra_volume_mounts: []
  update_strategy: null
cluster_name: clustername1
cloud_provider:
  name: ""
prefix_path: ""
win_prefix_path: ""
addon_job_timeout: 0
bastion_host:
  address: ""
  port: ""
  user: ""
  ssh_key: ""
  ssh_key_path: ""
  ssh_cert: ""
  ssh_cert_path: ""
monitoring:
  provider: ""
  options: {}
  node_selector: {}
  update_strategy: null
  replicas: null
restore:
  restore: false
  snapshot_name: ""
./rkdns: null

Steps to Reproduce:

Results:

The install fails with a certificate issue.

WARN[0003] [network] Can't pull Docker image [rke-service-01:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01:5000/v2/: x509: certificate signed by unknown authority 

FATA[0003] [Failed to pull image [rke-service-01:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01:5000/v2/: x509: certificate signed by unknown authority] 

I have my own CA .crt file and the certificates for the local registry.

These are the certs, domainCA.crt (for the ca) and domain.crt, domain.csr, and domain.key (created for the local registry)

How can I add them to the rke install command to avoid this issue? or is it possible to workaround it temporarily by allowing unknown authorities?

ccamacho commented 3 years ago

Here it is the registry logs when getting the catalog content:

root@rke-service-01:~# curl -v --silent --user registryusername:registrypassword https://rke-service-01.clustername1.kubeinit.local:5000/v2/_catalog
* Trying 10.0.1.100:5000...
* TCP_NODELAY set
* Connected to rke-service-01.clustername1.kubeinit.local (10.0.1.100) port 5000 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use h2
* Server certificate:
*  subject: C=US; ST=MyState; L=MyCity; O=MyCompany; OU=MyDepartment; CN=rke-service-01.clustername1.kubeinit.local
*  start date: Nov 13 11:57:04 2020 GMT
*  expire date: Nov 11 11:57:04 2030 GMT
*  subjectAltName: host "rke-service-01.clustername1.kubeinit.local" matched cert's "rke-service-01.clustername1.kubeinit.local"
*  issuer: C=US; ST=MyState; L=MyCity; O=MyCompany; OU=MyDepartment; CN=rke-service-01.clustername1.kubeinit.local
*  SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* Server auth using Basic with user 'registryusername'
* Using Stream ID: 1 (easy handle 0x561df46d7db0)
> GET /v2/_catalog HTTP/2
> Host: rke-service-01.clustername1.kubeinit.local:5000
> authorization: Basic cmVnaXN0cnl1c2VybmFtZTpyZWdpc3RyeXBhc3N3b3Jk
> user-agent: curl/7.68.0
> accept: */*
> 
* Connection state changed (MAX_CONCURRENT_STREAMS == 250)!
< HTTP/2 200 
< content-type: application/json; charset=utf-8
< docker-distribution-api-version: registry/2.0
< x-content-type-options: nosniff
< content-length: 435
< date: Fri, 13 Nov 2020 12:26:18 GMT
< 
{"repositories":["calico-cni","calico-ctl","calico-kube-controllers","calico-node","calico-pod2daemon-flexvol","cluster-proportional-autoscaler","coredns-coredns","coreos-etcd","coreos-flannel","flannel-cni","hyperkube","k8s-dns-dnsmasq-nanny","k8s-dns-kube-dns","k8s-dns-node-cache","k8s-dns-sidecar","metrics-server","nginx-ingress-controller","nginx-ingress-controller-defaultbackend","pause","rke-tools","weave-kube","weave-npc"]}
* Connection #0 to host rke-service-01.clustername1.kubeinit.local left intact
ccamacho commented 3 years ago

Here you can see that the registry works as expected:

root@rke-service-01:~# docker login -u registryusername -p registrypassword  rke-service-01.clustername1.kubeinit.local:5000
WARNING! Using --password via the CLI is insecure. Use --password-stdin.
WARNING! Your password will be stored unencrypted in /root/.docker/config.json.
Configure a credential helper to remove this warning. See
https://docs.docker.com/engine/reference/commandline/login/#credentials-store
Login Succeeded

root@rke-service-01:~# docker pull rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65
v0.1.65: Pulling from rancher/rke-tools
cbdbe7a5bc2a: Pull complete 
ad26925fbaa3: Pull complete 
7e638fd663f1: Pull complete 
8376eb50f57e: Pull complete 
3f7290122d8b: Pull complete 
c938c53391c5: Pull complete 
04b3195993b1: Pull complete 
00ad92d94124: Pull complete 
c82bbc7c37e6: Pull complete 
3d0ba9212694: Pull complete 
924df336e783: Pull complete 
dec11a202056: Pull complete 
e27ecfdcbde3: Pull complete
aa134f2ded07: Pull complete 
553801d49a4d: Pull complete 
39c590602422: Pull complete 
Digest: sha256:6d97726501d244da0bf81845004dba1074c48be841476521d9a083414d38616e
Status: Downloaded newer image for rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65
rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65

root@rke-service-01:~# docker images
REPOSITORY                                                          TAG                 IMAGE ID            CREATED             SIZE
rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools   v0.1.65             1df47b3cc6ea        7 weeks ago         133MB
superseb commented 3 years ago

Can you share the daemon config file /etc/docker/daemon.json and the output of ls -la /etc/docker/certs.d

ccamacho commented 3 years ago

Hi @superseb thanks for the follow up, if you mean the files for the docker registry, they do not exist, this is the way I'm configuring it as a reference https://github.com/Kubeinit/kubeinit/blob/master/kubeinit/roles/kubeinit_registry/tasks/10_configure.yml#L205

And other files to see if they are useful.

config.yml

root@rke-service-01:~# podman exec -it 2583445df385 /bin/sh
/ # cat /etc/docker/registry/config.yml 
version: 0.1
log:
  fields:
    service: registry
storage:
  cache:
    blobdescriptor: inmemory
  filesystem:
    rootdirectory: /var/lib/registry
http:
  addr: :5000
  headers:
    X-Content-Type-Options: [nosniff]
health:
  storagedriver:
    enabled: true
    interval: 10s
    threshold: 3

List the certs folder

root@rke-service-01:~# ls -la /var/kubeinit/local_registry/certs/
total 28
drwxr-xr-x 2 root root 4096 Nov 18 20:11 .
drwxr-xr-x 5 root root 4096 Nov 18 20:10 ..
-rw-r--r-- 1 root root 2252 Nov 18 20:11 domainCA.crt
-rw-r--r-- 1 root root 2252 Nov 18 20:11 domainCA.pem
-rw-r--r-- 1 root root 2297 Nov 18 20:11 domain.crt
-rw-r--r-- 1 root root 1996 Nov 18 20:11 domain.csr
-rw------- 1 root root 3243 Nov 18 20:11 domain.key

This is the whole output of executing the rke up command:

root@rke-service-01:~# ~/rke up
INFO[0000] Running RKE version: v1.2.2                  
INFO[0000] Initiating Kubernetes cluster                
INFO[0000] [dialer] Setup tunnel for host [rke-worker-01.clustername1.kubeinit.local] 
INFO[0000] [dialer] Setup tunnel for host [rke-master-02.clustername1.kubeinit.local] 
INFO[0000] [dialer] Setup tunnel for host [rke-master-01.clustername1.kubeinit.local] 
INFO[0000] [dialer] Setup tunnel for host [rke-master-03.clustername1.kubeinit.local] 
INFO[0000] Checking if container [cluster-state-deployer] is running on host [rke-master-01.clustername1.kubeinit.local], try #1 
INFO[0000] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #1 
WARN[0000] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0000] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #2 
WARN[0000] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0000] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #3 
WARN[0000] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0000] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #1 
WARN[0000] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0000] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #2 
WARN[0000] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0000] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #3 
WARN[0000] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #1 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #2 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #3 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0003] [state] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Checking if container [cluster-state-deployer] is running on host [rke-master-02.clustername1.kubeinit.local], try #1 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #1 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #2 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #3 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #1 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #2 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0003] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #3 
WARN[0003] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #1 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #2 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #3 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0006] [state] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Checking if container [cluster-state-deployer] is running on host [rke-master-03.clustername1.kubeinit.local], try #1 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #1 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #2 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #3 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #1 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #2 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0006] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #3 
WARN[0006] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0009] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #1 
WARN[0009] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0009] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #2 
WARN[0009] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0009] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #3 
WARN[0009] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0009] [state] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0009] Checking if container [cluster-state-deployer] is running on host [rke-worker-01.clustername1.kubeinit.local], try #1 
INFO[0009] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #1 
WARN[0010] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0010] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #2 
WARN[0010] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0010] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #3 
WARN[0010] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0010] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #1 
WARN[0010] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0010] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #2 
WARN[0010] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0010] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #3 
WARN[0010] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0013] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #1 
WARN[0013] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0013] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #2 
WARN[0013] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0013] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local], try #3 
WARN[0013] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0013] [state] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-worker-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0013] [certificates] Generating CA kubernetes certificates 
INFO[0013] [certificates] Generating Kubernetes API server aggregation layer requestheader client CA certificates 
INFO[0013] [certificates] GenerateServingCertificate is disabled, checking if there are unused kubelet certificates 
INFO[0013] [certificates] Generating Kubernetes API server certificates 
INFO[0013] [certificates] Generating Service account token key 
INFO[0013] [certificates] Generating Kube Controller certificates 
INFO[0013] [certificates] Generating Kube Scheduler certificates 
INFO[0013] [certificates] Generating Kube Proxy certificates 
INFO[0014] [certificates] Generating Node certificate   
INFO[0014] [certificates] Generating admin certificates and kubeconfig 
INFO[0014] [certificates] Generating Kubernetes API server proxy client certificates 
INFO[0014] [certificates] Generating kube-etcd-rke-master-01-clustername1-kubeinit-local certificate and key 
INFO[0014] [certificates] Generating kube-etcd-rke-master-02-clustername1-kubeinit-local certificate and key 
INFO[0014] [certificates] Generating kube-etcd-rke-master-03-clustername1-kubeinit-local certificate and key 
INFO[0014] Successfully Deployed state file at [./cluster.rkestate] 
INFO[0014] Building Kubernetes cluster                  
INFO[0014] [dialer] Setup tunnel for host [rke-worker-01.clustername1.kubeinit.local] 
INFO[0014] [dialer] Setup tunnel for host [rke-master-02.clustername1.kubeinit.local] 
INFO[0014] [dialer] Setup tunnel for host [rke-master-03.clustername1.kubeinit.local] 
INFO[0014] [dialer] Setup tunnel for host [rke-master-01.clustername1.kubeinit.local] 
INFO[0015] [network] Deploying port listener containers 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #1 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #1 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #1 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #2 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #2 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #2 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #3 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #3 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #3 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #1 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #1 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #1 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #2 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #2 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #2 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #3 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #3 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0015] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #3 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0015] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #1 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #1 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #1 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #2 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #2 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #2 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local], try #3 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local], try #3 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
INFO[0018] Pulling image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local], try #3 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0018] [network] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0018] [network] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-03.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0018] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
WARN[0018] [network] Can't pull Docker image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-01.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority 
FATA[0018] [Failed to pull image [rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65] on host [rke-master-02.clustername1.kubeinit.local]: Error response from daemon: Get https://rke-service-01.clustername1.kubeinit.local:5000/v2/: x509: certificate signed by unknown authority] 

And the content of the cluster.rkestate:

root@rke-service-01:~# cat cluster.rkestate
{
  "desiredState": {
    "rkeConfig": {
      "nodes": [
        {
          "address": "rke-master-01.clustername1.kubeinit.local",
          "port": "22",
          "internalAddress": "rke-master-01.clustername1.kubeinit.local",
          "role": [
            "controlplane",
            "etcd"
          ],
          "hostnameOverride": "rke-master-01",
          "user": "root",
          "dockerSocket": "/var/run/docker.sock",
          "sshKeyPath": "~/.ssh/id_rsa"
        },
        {
          "address": "rke-master-02.clustername1.kubeinit.local",
          "port": "22",
          "internalAddress": "rke-master-02.clustername1.kubeinit.local",
          "role": [
            "controlplane",
            "etcd"
          ],
          "hostnameOverride": "rke-master-02",
          "user": "root",
          "dockerSocket": "/var/run/docker.sock",
          "sshKeyPath": "~/.ssh/id_rsa"
        },
        {
          "address": "rke-master-03.clustername1.kubeinit.local",
          "port": "22",
          "internalAddress": "rke-master-03.clustername1.kubeinit.local",
          "role": [
            "controlplane",
            "etcd"
          ],
          "hostnameOverride": "rke-master-03",
          "user": "root",
          "dockerSocket": "/var/run/docker.sock",
          "sshKeyPath": "~/.ssh/id_rsa"
        },
        {
          "address": "rke-worker-01.clustername1.kubeinit.local",
          "port": "22",
          "internalAddress": "rke-worker-01.clustername1.kubeinit.local",
          "role": [
            "worker"
          ],
          "hostnameOverride": "rke-worker-01",
          "user": "root",
          "dockerSocket": "/var/run/docker.sock",
          "sshKeyPath": "~/.ssh/id_rsa"
        }
      ],
      "services": {
        "etcd": {
          "image": "rke-service-01.clustername1.kubeinit.local:5000/rancher/coreos-etcd:v3.4.13-rancher1",
          "extraArgs": {
            "election-timeout": "5000",
            "heartbeat-interval": "500"
          },
          "snapshot": true,
          "retention": "72h",
          "creation": "12h"
        },
        "kubeApi": {
          "image": "rke-service-01.clustername1.kubeinit.local:5000/rancher/hyperkube:v1.19.3-rancher1",
          "serviceClusterIpRange": "10.43.0.0/16",
          "serviceNodePortRange": "30000-32767",
          "auditLog": {
            "enabled": true,
            "configuration": {
              "maxAge": 30,
              "maxBackup": 10,
              "maxSize": 100,
              "path": "/var/log/kube-audit/audit-log.json",
              "format": "json",
              "policy": {
                "kind": "Policy",
                "apiVersion": "audit.k8s.io/v1",
                "metadata": {
                  "creationTimestamp": null
                },
                "rules": [
                  {
                    "level": "Metadata"
                  }
                ]
              }
            }
          }
        },
        "kubeController": {
          "image": "rke-service-01.clustername1.kubeinit.local:5000/rancher/hyperkube:v1.19.3-rancher1",
          "clusterCidr": "10.42.0.0/16",
          "serviceClusterIpRange": "10.43.0.0/16"
        },
        "scheduler": {
          "image": "rke-service-01.clustername1.kubeinit.local:5000/rancher/hyperkube:v1.19.3-rancher1"
        },
        "kubelet": {
          "image": "rke-service-01.clustername1.kubeinit.local:5000/rancher/hyperkube:v1.19.3-rancher1",
          "clusterDomain": "cluster.local",
          "infraContainerImage": "rke-service-01.clustername1.kubeinit.local:5000/rancher/pause:3.2",
          "clusterDnsServer": "10.43.0.10"
        },
        "kubeproxy": {
          "image": "rke-service-01.clustername1.kubeinit.local:5000/rancher/hyperkube:v1.19.3-rancher1"
        }
      },
      "network": {
        "plugin": "canal",
        "options": {
          "canal_flannel_backend_port": "8472",
          "canal_flannel_backend_type": "vxlan",
          "canal_flannel_backend_vni": "1",
          "canal_flex_volume_plugin_dir": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds"
        },
        "updateStrategy": {
          "strategy": "RollingUpdate",
          "rollingUpdate": {
            "maxUnavailable": 1
          }
        }
      },
      "authentication": {
        "strategy": "x509"
      },
      "systemImages": {
        "etcd": "rke-service-01.clustername1.kubeinit.local:5000/rancher/coreos-etcd:v3.4.13-rancher1",
        "alpine": "rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65",
        "nginxProxy": "rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65",
        "certDownloader": "rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65",
        "kubernetesServicesSidecar": "rke-service-01.clustername1.kubeinit.local:5000/rancher/rke-tools:v0.1.65",
        "kubedns": "rke-service-01.clustername1.kubeinit.local:5000/rancher/k8s-dns-kube-dns:1.15.10",
        "dnsmasq": "rke-service-01.clustername1.kubeinit.local:5000/rancher/k8s-dns-dnsmasq-nanny:1.15.10",
        "kubednsSidecar": "rke-service-01.clustername1.kubeinit.local:5000/rancher/k8s-dns-sidecar:1.15.10",
        "kubednsAutoscaler": "rke-service-01.clustername1.kubeinit.local:5000/rancher/cluster-proportional-autoscaler:1.8.1",
        "coredns": "rke-service-01.clustername1.kubeinit.local:5000/rancher/coredns-coredns:1.7.0",
        "corednsAutoscaler": "rke-service-01.clustername1.kubeinit.local:5000/rancher/cluster-proportional-autoscaler:1.8.1",
        "nodelocal": "rke-service-01.clustername1.kubeinit.local:5000/rancher/k8s-dns-node-cache:1.15.13",
        "kubernetes": "rke-service-01.clustername1.kubeinit.local:5000/rancher/hyperkube:v1.19.3-rancher1",
        "flannel": "rke-service-01.clustername1.kubeinit.local:5000/rancher/coreos-flannel:v0.13.0-rancher1",
        "flannelCni": "rke-service-01.clustername1.kubeinit.local:5000/rancher/flannel-cni:v0.3.0-rancher6",
        "calicoNode": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-node:v3.16.1",
        "calicoCni": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-cni:v3.16.1",
        "calicoControllers": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-kube-controllers:v3.16.1",
        "calicoCtl": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-ctl:v3.16.1",
        "calicoFlexVol": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-pod2daemon-flexvol:v3.16.1",
        "canalNode": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-node:v3.16.1",
        "canalCni": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-cni:v3.16.1",
        "canalControllers": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-kube-controllers:v3.16.1",
        "canalFlannel": "rke-service-01.clustername1.kubeinit.local:5000/rancher/coreos-flannel:v0.13.0-rancher1",
        "canalFlexVol": "rke-service-01.clustername1.kubeinit.local:5000/rancher/calico-pod2daemon-flexvol:v3.16.1",
        "weaveNode": "rke-service-01.clustername1.kubeinit.local:5000/weaveworks/weave-kube:2.7.0",
        "weaveCni": "rke-service-01.clustername1.kubeinit.local:5000/weaveworks/weave-npc:2.7.0",
        "podInfraContainer": "rke-service-01.clustername1.kubeinit.local:5000/rancher/pause:3.2",
        "ingress": "rke-service-01.clustername1.kubeinit.local:5000/rancher/nginx-ingress-controller:nginx-0.35.0-rancher1",
        "ingressBackend": "rke-service-01.clustername1.kubeinit.local:5000/rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1",
        "metricsServer": "rke-service-01.clustername1.kubeinit.local:5000/rancher/metrics-server:v0.3.6",
        "windowsPodInfraContainer": "rke-service-01.clustername1.kubeinit.local:5000/rancher/kubelet-pause:v0.1.4"
      },
      "sshKeyPath": "~/.ssh/id_rsa",
      "sshAgentAuth": false,
      "authorization": {
        "mode": "rbac"
      },
      "ignoreDockerVersion": false,
      "kubernetesVersion": "v1.19.3-rancher1-1",
      "privateRegistries": [
        {
          "url": "rke-service-01.clustername1.kubeinit.local:5000",
          "user": "registryusername",
          "password": "registrypassword",
          "isDefault": true
        }
      ],
      "ingress": {
        "provider": "nginx",
        "updateStrategy": {
          "strategy": "RollingUpdate",
          "rollingUpdate": {
            "maxUnavailable": 1
          }
        },
        "httpPort": 80,
        "httpsPort": 443,
        "networkMode": "hostNetwork"
      },
      "clusterName": "clustername1",
      "cloudProvider": {},
      "prefixPath": "/",
      "addonJobTimeout": 45,
      "bastionHost": {},
      "monitoring": {
        "provider": "metrics-server",
        "updateStrategy": {
          "strategy": "RollingUpdate",
          "rollingUpdate": {
            "maxUnavailable": "25%",
            "maxSurge": "25%"
          }
        },
        "replicas": 1
      },
      "restore": {},
      "dns": {
        "provider": "coredns",
        "nodelocal": null,
        "updateStrategy": {
          "strategy": "RollingUpdate",
          "rollingUpdate": {
            "maxUnavailable": 1,
            "maxSurge": 0
          }
        },
        "linearAutoscalerParams": {
          "coresPerReplica": 128,
          "nodesPerReplica": 4,
          "min": 1,
          "preventSinglePointFailure": true
        }
      },
      "upgradeStrategy": {
        "maxUnavailableWorker": "10%",
        "maxUnavailableControlplane": "1"
      }
    },
    "certificatesBundle": {
      "kube-admin": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\n7GECPBSd5kn5yJRd4L9rF6GwkaOyl/HJCBBeqe8=\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\n099qlgIKX5f6BPVWTgx43oiczfCsvJevAiU1UaEOEE2/mQ79lEwX\n-----END RSA PRIVATE KEY-----\n",
        "config": "apiVersion: v1\nkind: Config\nclusters:\n- cluster:\n    api-version: v1\n    certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN3akNDQWFxZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFTTVJBd0RnWURWUVFERXdkcmRXSmwKTFdOaE1CNFhEVEl3TVRFeE9ESXdOVGd3TUZvWERUTXdNVEV4TmpJd05UZ3dNRm93RWpFUU1BNEdBMVVFQXhNSAphM1ZpWlMxallUQ0NBU0l3RFFZSktvWklodmNOQVFFQkJRQURnZ0VQQURDQ0FRb0NnZ0VCQU9GQi9hRDJxcjRaCnpzQnhJeDNaUXB5aGFTaEZtWm03aDZTQ3VHK1IwTjJnMU1KeGIrZitCSHJpb1dHV0Zwb3NGQVRuSDg1aVVNVHIKc1ZtSUhocjZNRFErZlpaR2w5MHI3YnhKZ0R4VWJLSE5FcVBxZmVhRmt5TWpiaDR0enV1ekpjNlpTKzc0MldFTwpVUDZYcFJTb3lLejdLYkhTckZpdlFCZitnMkY5WElpRjRMSjZNVFlBRjNPNlQyNG13Rk5TQWU4RDZnbExhdXZkCmNTR3ppeTN3cVpSaU5Gcm9hbXBOVDhTNjVhNmdlY012djd6ZmZzZFVUQzVRRWkxVndXeG9udXJGdUpzMHQzMXcKcXRXelZJczlsQVBJOUFXWjVrV1VreTFxS2h4S0F2WFBoMnlIZWFlODZzalNsbUY0Q0svQVZacWFRMTV4L1M0Mwo3TzRTdjYzQWhBa0NBd0VBQWFNak1DRXdEZ1lEVlIwUEFRSC9CQVFEQWdLa01BOEdBMVVkRXdFQi93UUZNQU1CCkFmOHdEUVlKS29aSWh2Y05BUUVMQlFBRGdnRUJBR2YwNGd3NFoxMlQzTk9XcSt0ZFppQzlOUnNycnhYRlJtNUUKWnpISG0xWEFwOFNxYTFGeFQ4aFlmaGI4YzhOUC9HM2ZhRHo0U1g1eHN0QTdINEVtYzM0d0Z0NW9ZR0VwNFVFTAovdGFZZjloYjJhT2JYbW92dVNIVEtma0w2ajBJSlpCOFRnZVROOEZFSXU4SEdaUGJKc1dFR3F6OUcwME5mNVRmCllyRXpiOCtPME55ZlhQa2dWd216ZW9IMWRuNHA2NmRVTGZHWmRnZ2Z5YklzOFBkbHFjaGIrWGJiUWdpSjlJbzAKbUpxUWVMTGJmQmgzYUU0czlVVjZ4QW9IOTlROGt2S2JyVHJXaWNQVlQzUWQvNm9zMHdZcjB3NXB0UGp0MmJOWgpyLzgzQkNFUitLOHg3Mkgra0t5K3ExaEFNYWZDbEdCaWNaV1ZrdnVQcTl0ZWFia1JyQWM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K\n    server: \"https://rke-master-01.clustername1.kubeinit.local:6443\"\n  name: \"clustername1\"\ncontexts:\n- context:\n    cluster: \"clustername1\"\n    user: \"kube-admin-clustername1\"\n  name: \"clustername1\"\ncurrent-context: \"clustername1\"\nusers:\n- name: \"kube-admin-clustername1\"\n  user:\n    client-certificate-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM2VENDQWRHZ0F3SUJBZ0lJSzVOQlhLQmxieXd3RFFZSktvWklodmNOQVFFTEJRQXdFakVRTUE0R0ExVUUKQXhNSGEzVmlaUzFqWVRBZUZ3MHlNREV4TVRneU1EVTRNREJhRncwek1ERXhNVFl5TURVNE1EQmFNQzR4RnpBVgpCZ05WQkFvVERuTjVjM1JsYlRwdFlYTjBaWEp6TVJNd0VRWURWUVFERXdwcmRXSmxMV0ZrYldsdU1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZvNlpySnAwVzdwck42WHdxQ1kzL2M1SlYvWjkKd3I2ZXB4bjR0YXN4QkgzVlN6bGlSRWRjaWN4Qk11bXpZdmxENlpzVkhKbDZ1SjFWZ2MvUlJGclBlRE1NbHh3RAozYmVxazFQL3RUQ21WNlVZaldOZEsxbzBwcFJaWkhzUEZ6cDNxeXA3WE13M1Fqd3FtN1A0YktXOFVYNTNkd0w4ClZEeHhaTGpSWHdDK3p5eWxrNDhPdmtwdWh5dExWaDJaRUtCVGl4RXJ0RkRnWllnMUcyUVlMS2tLRCs3YkJ4aW8Kd0pEN05MSmJLWWowSHNiVSttZjNmWktWSE1jeWx5TFpseUlzOVJPenFkeDN6bUtoNmttM0VWcDlzZUwyYi93aApmVXZVUTJXTVJDRm9DbjZuLy90cHVMeGpEMlpoZWdpRUFZa2V0K3JPWHdCL1o3ZFlwTGJBdWs5dzlRSURBUUFCCm95Y3dKVEFPQmdOVkhROEJBZjhFQkFNQ0JhQXdFd1lEVlIwbEJBd3dDZ1lJS3dZQkJRVUhBd0l3RFFZSktvWkkKaHZjTkFRRUxCUUFEZ2dFQkFGWm1Kbk1xaUlUSVEydlFUdk03bDNnNERtWE9SZ0pJbkNRUEFZenhrQUUwZ01uNQpTeEwxVnFVZEpLZzFHaVpyTk5uZDJQN1ozTktwc3FTaHlmTThpWXZvRUFTUDZ5QnNRRnJYUTNiOGdROU84NG9GCmtnNTB3d01tRXVCQm1ucXlIdmdoWVBXMi93MVZkcDJVSDlRaEh6MFk1dFYvd2lEamp4L0FBdVBaTUtSVFo1NDcKMnk2U0pCM3VWbnMydm9DOEtsSVRBVzZNVkx2Q1dSZEZidTRzbWNUaVU4OEZ3VXg3QWI0NUxhRjUrTVVQaXpaawpmZDJKQWVldGE4SzV0WVJGM1c3M2xvakV3bFdMUFMwRjVweG0xSC91UkdtZllpNG1FQUsweDZaS0NPbnI2ZzAwCjdHRUNQQlNkNWtuNXlKUmQ0TDlyRjZHd2thT3lsL0hKQ0JCZXFlOD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=\n    client-key-data: LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFb3dJQkFBS0NBUUVBdm82WnJKcDBXN3ByTjZYd3FDWTMvYzVKVi9aOXdyNmVweG40dGFzeEJIM1ZTemxpClJFZGNpY3hCTXVtell2bEQ2WnNWSEpsNnVKMVZnYy9SUkZyUGVETU1seHdEM2JlcWsxUC90VENtVjZVWWpXTmQKSzFvMHBwUlpaSHNQRnpwM3F5cDdYTXczUWp3cW03UDRiS1c4VVg1M2R3TDhWRHh4WkxqUlh3Qyt6eXlsazQ4Twp2a3B1aHl0TFZoMlpFS0JUaXhFcnRGRGdaWWcxRzJRWUxLa0tEKzdiQnhpb3dKRDdOTEpiS1lqMEhzYlUrbWYzCmZaS1ZITWN5bHlMWmx5SXM5Uk96cWR4M3ptS2g2a20zRVZwOXNlTDJiL3doZlV2VVEyV01SQ0ZvQ242bi8vdHAKdUx4akQyWmhlZ2lFQVlrZXQrck9Yd0IvWjdkWXBMYkF1azl3OVFJREFRQUJBb0lCQUdheEJwUUQ4S3oyTzQyVAp1YXVFWFN4RUhUWndPYm5YYkR4MVBKajZsc0hxNWlWUjJXa2VZL3BHdnVRbkdXcy9GYUF3MlNHK2ZHbzlMN1Z6ClB6MXRDdDJsOVNVQ0RmdFFYWFprRUN1ZStpWEZiUVBWQm9LMGJDZFJUeE5kVmZhWXBhRHlsZVNla1RENnA2T2QKUzBXUjAzaS9oTFg0UCs5TlczYUNPeUxOamdhckF1NTlZY0tjdmlmYitETlhSemRwY3ZuOTdab05VbXFJZ3VLbQpxUVI3bGhSZnlJSUszWGtCVDVVNXprSlJ6M2RtU3cvdGhvdk5jT0plM1ZCenlQK3JHa2dVcTFibTNkTC9QeXgyCk9oakJnenI2dFYwT1kzbVEyUjluOFhtU0RFc0g1Z293OEFoU2tZblVUcXRkRkFwdCtBbTlYNUZtUVZKYlRNSWcKdEZXMnQwRUNnWUVBK2pxMkJUQXoyM2NzQ2VpZnhZR1dlbUhaL0orSVN6N1hLVndOM3BDUjhhYVdVTXRYakgxMQpUbmZJYkVXR3dMbmJ3V3pRQkVINTJ0NHF1eWdsUzF6QTBHUW5wMkRqQldsd2pEYVNlUENkWjhYTk9SWGEzWmRPCmRIUVIzTnRRcUY2cnIrNUVPSGowUjg2SytBUHoyWDZmbVcxOXFVQldLY3RrS0pWWGFNdnpYdTBDZ1lFQXd2T1oKZDMvT0hSVXI2NEtFQnVxRjk3SUh4SVBTb0NRTDR5MUJXaHA0TFQ1b085STR4VjV4aVE2cWY2ZkdEZ3FpTW9STAorN0I0YUxjeXFBRERTL1BQRXZ4b3pES1RSSXF3RE9QWmhoR1Q1bkVCemRKOEVkZFJDNDFqTU1FQTFmV2tCVHRRCmdtL1pVTE5MMy8xczJ0R0hVTWtFWlU1bm9RLzJQWVJzaUVLMWtTa0NnWUI0UkgyMTBxd3FBSVpISU9xaDJCNEcKSmovS2ZyYllTNVRJaVRrVlR2RUdiMlh4NFRuc0NXUzNXVFVZYlBaT2JVWWxHbktFaVYxWWg4Mkw5TWl3QngyWgpTM29QcGE2WHJFenU1MC9SRnZ6Z29wNTNvSHg0WXIvUGt2WCs2OTVCZm5jUWNQbVRGdmQ2QjlpZFNmRUxDU1FXCmJ4eWxtNG1PUHZhZDF1R1RPZXQ0SlFLQmdFKzAzMXN2WXVzYkcrRG5kT21LKzRraFBmSEgzOWJmeGdoMUdWSW8KbmxnSk92NnlYY204YW5rYUNQVzJkOUNING5iN0JrSDZqZEJxam9pSC8xRlBkcXVSalp0blZqVGc2MGZwNUtiZgpDdlJkNGRud0pBLzdVOFNBWXp5c3ZKVytIL2lQbnNRbHpOa2s1WEhJSUxoNmtIT2tMR3JyR28yTWhDWDB2WmNjCmh6VzVBb0dCQU5jdElkMGRsNVRtYWQyRlVSVE5PbC9JR2pBbGVkT0R1RzNRZWNyT28vd25aT3dNVWVzUW1IWmQKLzZQRHhhWnRVdzJoY1FjdWlLOHhKdDh6eXlkUHN3Z2lJYmovb01hTEE0T2RLYi9adnRNSWsrN3h6OGE1bkdOMAowOTlxbGdJS1g1ZjZCUFZXVGd4NDNvaWN6ZkNzdkpldkFpVTFVYUVPRUUyL21RNzlsRXdYCi0tLS0tRU5EIFJTQSBQUklWQVRFIEtFWS0tLS0tCg==",
        "name": "kube-admin",
        "commonName": "kube-admin",
        "ouName": "system:masters",
        "envName": "KUBE_ADMIN",
        "path": "/etc/kubernetes/ssl/kube-admin.pem",
        "keyEnvName": "KUBE_ADMIN_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-admin-key.pem",
        "configEnvName": "KUBECFG_KUBE_ADMIN",
        "configPath": "./kube_config_cluster.yml"
      },
      "kube-apiserver": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\npH/+bOTmPSEwjsHvcj845fPyUPEI9K8ASx/oo2HIotzSfhpmhfhnC+8b\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\nMyU2edx0THcF59S1GwZlCpmK/Td7SEtq7KBw/EW8R4Blh6bQJThW8zA=\n-----END RSA PRIVATE KEY-----\n",
        "config": "",
        "name": "kube-apiserver",
        "commonName": "system:kube-apiserver",
        "ouName": "",
        "envName": "KUBE_APISERVER",
        "path": "/etc/kubernetes/ssl/kube-apiserver.pem",
        "keyEnvName": "KUBE_APISERVER_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-apiserver-key.pem",
        "configEnvName": "",
        "configPath": ""
      },
      "kube-apiserver-proxy-client": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\nNRnh52WgBg==\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\nh7RGQlcRsDc854BK29vyJo7OEeOJR78jqfAOKqbhCSRynaTMWzc=\n-----END RSA PRIVATE KEY-----\n",
        "config": "apiVersion: v1\nkind: Config\nclusters:\n- cluster:\n    api-version: v1\n    certificate-authority: /etc/kubernetes/ssl/kube-ca.pem\n    server: \"https://127.0.0.1:6443\"\n  name: \"local\"\ncontexts:\n- context:\n    cluster: \"local\"\n    user: \"kube-apiserver-proxy-client-local\"\n  name: \"local\"\ncurrent-context: \"local\"\nusers:\n- name: \"kube-apiserver-proxy-client-local\"\n  user:\n    client-certificate: /etc/kubernetes/ssl/kube-apiserver-proxy-client.pem\n    client-key: /etc/kubernetes/ssl/kube-apiserver-proxy-client-key.pem",
        "name": "kube-apiserver-proxy-client",
        "commonName": "system:kube-apiserver-proxy-client",
        "ouName": "",
        "envName": "KUBE_APISERVER_PROXY_CLIENT",
        "path": "/etc/kubernetes/ssl/kube-apiserver-proxy-client.pem",
        "keyEnvName": "KUBE_APISERVER_PROXY_CLIENT_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-apiserver-proxy-client-key.pem",
        "configEnvName": "KUBECFG_KUBE_APISERVER_PROXY_CLIENT",
        "configPath": "/etc/kubernetes/ssl/kubecfg-kube-apiserver-proxy-client.yaml"
      },
      "kube-apiserver-requestheader-ca": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\na/M52uFji3A5lHFdjs6/QAQqijV+H6WsLu/7u4h7E5lS/EcXwGU=\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\nQrmDUQIS/TrL3pTtRuP5X5uSlBWZ5thmuPhWZ6jctrxGMry5cCPm\n-----END RSA PRIVATE KEY-----\n",
        "config": "apiVersion: v1\nkind: Config\nclusters:\n- cluster:\n    api-version: v1\n    certificate-authority: /etc/kubernetes/ssl/kube-ca.pem\n    server: \"https://127.0.0.1:6443\"\n  name: \"local\"\ncontexts:\n- context:\n    cluster: \"local\"\n    user: \"kube-apiserver-requestheader-ca-local\"\n  name: \"local\"\ncurrent-context: \"local\"\nusers:\n- name: \"kube-apiserver-requestheader-ca-local\"\n  user:\n    client-certificate: /etc/kubernetes/ssl/kube-apiserver-requestheader-ca.pem\n    client-key: /etc/kubernetes/ssl/kube-apiserver-requestheader-ca-key.pem",
        "name": "kube-apiserver-requestheader-ca",
        "commonName": "system:kube-apiserver-requestheader-ca",
        "ouName": "",
        "envName": "KUBE_APISERVER_REQUESTHEADER_CA",
        "path": "/etc/kubernetes/ssl/kube-apiserver-requestheader-ca.pem",
        "keyEnvName": "KUBE_APISERVER_REQUESTHEADER_CA_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-apiserver-requestheader-ca-key.pem",
        "configEnvName": "KUBECFG_KUBE_APISERVER_REQUESTHEADER_CA",
        "configPath": "/etc/kubernetes/ssl/kubecfg-kube-apiserver-requestheader-ca.yaml"
      },
      "kube-ca": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\nr/83BCER+K8x72H+kKy+q1hAMafClGBicZWVkvuPq9teabkRrAc=\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----\nMIIEpQIBAAKCAQEA4UH9oPaqvhnOwHEjHdlCnKFpKEWZmbuHpIK4b5HQ3aDUwnFv\n5/4EeuKhYZYWmiwUBOcfzmJQxOuxWYgeGvowND59lkaX3SvtvEmAPFRsoc0So+p9\n5oWTIyNuHi3O67MlzplL7vjZYQ5Q/pelFKjIrPspsdKsWK9AF/6DYX1ciIXgsnox\nNgAXc7pPbibAU1IB7wPqCUtq691xIbOLLfCplGI0Wuhqak1PxLrlrqB5wy+/vN9+\nx1RMLlASLVXBbGie6sW4mzS3fXCq1bNUiz2UA8j0BZnmRZSTLWoqHEoC9c+HbId5\np7zqyNKWYXgIr8BVmppDXnH9Ljfs7hK/rcCECQIDAQABAoIBAQCxbU4+jCx/IkrV\nEAhuCWRLhWQUAYZ0Ld8wuHpX/w36lCUhp0JTBKU4uewNtq/E7jUyi25lHNGr2k5O\nTEYST8DKVfKL/Ly/zEssxORKIOGULLii/h//BHWZ9t1UzhYvV2PPMLY73C01Ipav\ngnjYJf4zKn5z/5IbJKcifymzD5BkQzySCoKvwqlu2KsMiex+F/UROJeOlS354KCT\nNarbT6phSi8yzSDxlEltL7rUtJRss/MxcCTe34cK1XVTVr3jBFven0725w/ncLpD\nQizbCzDIRl3kD4DP7cMSkixc6gJ77B5c9kc5GgbCgOtHBYMT2GGfp+G/UV6/Ng4n\naHNw4wflAoGBAOM6hrKiIUqCsuFm5vReZHbwKXoPtf8tbiihiegPX6NTdGyZTIx5\ndWGU5a11P7d6owd31tR/3f0xnXXu3gl6Ijlx2Ya9YQtobm/8gfafyGkzcJld4rCk\nlCYekivjGNgL7q7QuAUeANEhFFMdLlzQpXfb0Xeth4606HAdkMjCbRnfAoGBAP3H\nlLrip98KR+e4vWnknB3fNc1gRUgza3UYQsKhYhtUnn1l1PVy7sH3097hr9ziHXcS\n5Pogo65Od8Nuy4Dj6rS0uFVS6z1H17Izuy7e2yeNpxxXJCeAvnkqsEPa/B3qchSa\n2uKkCs3C+xk/X83Lt5IAvAsjbHEy1L1zYB0WtO8XAoGBAL4kxnyK0WLhdcDKdC8/\nIcCpfXvH09sB8DGN47HN05D/j+gka/sM1B3hFEUPXU8zD2N7c8kEawWp1ALQ7Ppv\nOl5pl8Z5iNCcBfYuDa8LzA/EXM/p0X1Raytu35BcC/kWGxgsTiDyF2rozHI0dAx1\nCFIBHwqPqmTPm8Xd578ne1ZvAoGBAOaFw6FbP9gHk7d2hYBKLFGqL0omd+iU5LiR\n2BrJ0781x13rAV4QD7dcMjXUVhZTwyYloJ9gxK4SExIQc4TaA5owSv0efBbHSrRR\n72ctAm/UaYcB1RKZDOwtjb2ljrxx+TykSc3z6uhrhAG0Iodi1JYoWqfXfqr43GxX\nAGiL9sDzAoGAXjuZ0TWMMHdZnTEYScX0QcH9KNMIxDY0H6s4mLwkx7w3Qs46b1Ck\nCCXaGMnETkVr75qOb2Ooz3bSFsQExH0VVPWONNFRT2aR70Xw2OJs3/n1d1Mwwlf8\nDx65L1E3G/LrXbXDuE/QnHaH7Qre1SuRUJ5N4SBb1RXlJ3EfqTzAczA=\n-----END RSA PRIVATE KEY-----\n",
        "config": "",
        "name": "kube-ca",
        "commonName": "system:kube-ca",
        "ouName": "",
        "envName": "KUBE_CA",
        "path": "/etc/kubernetes/ssl/kube-ca.pem",
        "keyEnvName": "KUBE_CA_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-ca-key.pem",
        "configEnvName": "",
        "configPath": ""
      },
      "kube-controller-manager": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\nB7UyjidFCp2qDzYrJ2sMFbpWP8HmPGkn\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\nR/eYr9lxS8+peufHJk6v7MfWwhzu1hpPogSvP4PxsdOeEf9HzcSW\n-----END RSA PRIVATE KEY-----\n",
        "config": "apiVersion: v1\nkind: Config\nclusters:\n- cluster:\n    api-version: v1\n    certificate-authority: /etc/kubernetes/ssl/kube-ca.pem\n    server: \"https://127.0.0.1:6443\"\n  name: \"local\"\ncontexts:\n- context:\n    cluster: \"local\"\n    user: \"kube-controller-manager-local\"\n  name: \"local\"\ncurrent-context: \"local\"\nusers:\n- name: \"kube-controller-manager-local\"\n  user:\n    client-certificate: /etc/kubernetes/ssl/kube-controller-manager.pem\n    client-key: /etc/kubernetes/ssl/kube-controller-manager-key.pem",
        "name": "kube-controller-manager",
        "commonName": "system:kube-controller-manager",
        "ouName": "",
        "envName": "KUBE_CONTROLLER_MANAGER",
        "path": "/etc/kubernetes/ssl/kube-controller-manager.pem",
        "keyEnvName": "KUBE_CONTROLLER_MANAGER_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-controller-manager-key.pem",
        "configEnvName": "KUBECFG_KUBE_CONTROLLER_MANAGER",
        "configPath": "/etc/kubernetes/ssl/kubecfg-kube-controller-manager.yaml"
      },
      "kube-etcd-rke-master-01-clustername1-kubeinit-local": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\n+6ec/bMHd2K1lG39sTFZBJSaplwdGv8G7JxH0l+KGo+VliMkSQ==\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----\nMIIEowIBAAKCAQEAx0C8mD7fm2WtQj/If1Hm/rlerckYAwll8qh3VbE/l9f3a3fM\nqbepQgSub2zjUAF8C0ghY6R+2j0UtLOqENhiDe53NZPAy/jNF/mpK54nacVyzCng\njPXx7Tb4H6vPbR74StTWjep05qdg5GmHPgs7qDJBkSMyj6dPf7JTa+yYmFFXtUZ2\nyCSGj7XfYOz3dxBhfPr4CL87in+MVMymaJoCYqufW5hy7b3o5UJjz/FX7N4SQiQp\nueNmIvlkZN9Gdr+ddI5VStxfkRONf7FdZ61Tjb+LqbJhj6MhkMklYJV8Er4cwV7z\nQ+jBDDeWUxzjPbGfC6NM8xbT38IHtbnhH9iUTwIDAQABAoIBAGRpkGFdFgzXAaho\nQl8/ZBysSDVmKQ6mttTB51ms+HJKKOrktaQ15Tta5plKk4dnKB77W7A+XpsWuw+R\nlzvkAA4rRbIfYsKoAJt7erB7hDs+gOq4k+wVqbS0xfgX+nFwcQotFm7wX7c5VI/n\nSnuO56KMqRQ+W6WfWGXu9TFnS0M+n0R3BNvq9TyqEXrnhTEPNW4nQL0nlqtSF/Hs\nvj3tDALnkAzV6zM+mZZNItEj+5tkXqflo9p8/mobD/7A3YniXNPQAJHJ1sRCTdhP\nlEntBRE+9whl+m5H7atsnhyT3tfsSnSPBB94QfBB21FZv0rGDIa4Dy7eMsC2jT4Q\n1l1r4TkCgYEA4QQ4EhNCZ7bmM1+6/Ygqh9lOuF+z+j95oKw5mtpi6lQBVVM5eIv6\nd7i3XHNZYXhMuEztH58wv3BYmKa+iRKpOSDtFsQLkoDKrhafkJvqCY5SKTw/02nN\n+Pj3eEOvfwhSu9K1fXe5dcfPVuKt0JrJ6Yu/QXYga8+8COaBlyAaidMCgYEA4rBb\nPJI4n4E8Q/u7CGpvFPrgbknhKNK30yYhnL8Xnd/9lZS1FBdqR+w1wasPlucphfOp\nltG2otRBy8RyO+iWe7fymSXeJvA7lhY0nyMj3pY8K3P1W9Enx4OMHsiAyvYqGEX7\n08UQ7+BNNv0eRtY9KACqToN8cZrkZONvOfml4hUCgYEAhCAIFIT+jwvUbAIgOFLG\nNnKhSJ3Zfm3bKz81q/nj7xhYmBOAQYpgDgCGmmCY8STEV8vDyLee1ipPu4LdintM\npmDxFlcTPHknicV6+Fy0tdu93ryj9a3A5hq6pQGJgRwQCH2XWA7+9WvYEXqU+VKK\nkPof2X5VVzjpfohrO6P8MUUCgYBwGrrj94PdDbJaBHF4Nfp9K5w1rn+VCrAx0Zep\nxq7NOmpTwNjT+MhsjRoAjrIE9IiKX/esSEXDvKhVNu8vRVS2Fj/5EMsOApvVG2Im\nmOAyQaW773qVT5gWiK2Qw6M9vAMRQfrJvZkkp45H9WE1stlHoRyX+1pdbDYq1na4\n+wbYCQKBgADNLj65VxiMp6hSJGYstzYa5IhwCOQez6l2l5Zlc7eDmtu+3IeiAm5J\nv6xpI+aKsnwsGTpQ5hUnQ0rLx2qiuk0VACzHQNnTJgXEbYg3aP9WxsGais/F46mz\njmyEZcquFnoxJBYJZZPA2s1L0VhbHEJ8Cxwz1MlZcdmTw6tOvb1X\n-----END RSA PRIVATE KEY-----\n",
        "config": "",
        "name": "kube-etcd-rke-master-01-clustername1-kubeinit-local",
        "commonName": "system:kube-etcd-rke-master-01-clustername1-kubeinit-local",
        "ouName": "",
        "envName": "KUBE_ETCD_RKE_MASTER_01_CLUSTERNAME1_KUBEINIT_LOCAL",
        "path": "/etc/kubernetes/ssl/kube-etcd-rke-master-01-clustername1-kubeinit-local.pem",
        "keyEnvName": "KUBE_ETCD_RKE_MASTER_01_CLUSTERNAME1_KUBEINIT_LOCAL_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-etcd-rke-master-01-clustername1-kubeinit-local-key.pem",
        "configEnvName": "",
        "configPath": ""
      },
      "kube-etcd-rke-master-02-clustername1-kubeinit-local": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\n/rtAeb1ACoJPtmd1i+4nASn0vkttecCexMWPgPC4MRLXIM4QAw==\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\nxj5NzqAw6da408p+LuhEVd3UcCtFH/EW3+ulw8T1tO8HZ0/LGb1qVlc=\n-----END RSA PRIVATE KEY-----\n",
        "config": "",
        "name": "kube-etcd-rke-master-02-clustername1-kubeinit-local",
        "commonName": "system:kube-etcd-rke-master-02-clustername1-kubeinit-local",
        "ouName": "",
        "envName": "KUBE_ETCD_RKE_MASTER_02_CLUSTERNAME1_KUBEINIT_LOCAL",
        "path": "/etc/kubernetes/ssl/kube-etcd-rke-master-02-clustername1-kubeinit-local.pem",
        "keyEnvName": "KUBE_ETCD_RKE_MASTER_02_CLUSTERNAME1_KUBEINIT_LOCAL_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-etcd-rke-master-02-clustername1-kubeinit-local-key.pem",
        "configEnvName": "",
        "configPath": ""
      },
      "kube-etcd-rke-master-03-clustername1-kubeinit-local": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\nejjAEA5wboSPiksUvnSj4TMy5dGG6I98bzdstZXTfP/hJuAoJw==\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\nsX3XrLSic0wBGRgpZJjUz8DEzf4Jm6HdHr15q29usfJdkuLOBNau\n-----END RSA PRIVATE KEY-----\n",
        "config": "",
        "name": "kube-etcd-rke-master-03-clustername1-kubeinit-local",
        "commonName": "system:kube-etcd-rke-master-03-clustername1-kubeinit-local",
        "ouName": "",
        "envName": "KUBE_ETCD_RKE_MASTER_03_CLUSTERNAME1_KUBEINIT_LOCAL",
        "path": "/etc/kubernetes/ssl/kube-etcd-rke-master-03-clustername1-kubeinit-local.pem",
        "keyEnvName": "KUBE_ETCD_RKE_MASTER_03_CLUSTERNAME1_KUBEINIT_LOCAL_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-etcd-rke-master-03-clustername1-kubeinit-local-key.pem",
        "configEnvName": "",
        "configPath": ""
      },
      "kube-node": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\nnnxeYltjpV7xhdcWhCg243NMhPvUUtza1jox6w==\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\njgixafgO1YBFG+J9KrGHqsqps5LPML4SkGDQecprRHGRLW4IWPw=\n-----END RSA PRIVATE KEY-----\n",
        "config": "apiVersion: v1\nkind: Config\nclusters:\n- cluster:\n    api-version: v1\n    certificate-authority: /etc/kubernetes/ssl/kube-ca.pem\n    server: \"https://127.0.0.1:6443\"\n  name: \"local\"\ncontexts:\n- context:\n    cluster: \"local\"\n    user: \"kube-node-local\"\n  name: \"local\"\ncurrent-context: \"local\"\nusers:\n- name: \"kube-node-local\"\n  user:\n    client-certificate: /etc/kubernetes/ssl/kube-node.pem\n    client-key: /etc/kubernetes/ssl/kube-node-key.pem",
        "name": "kube-node",
        "commonName": "system:node",
        "ouName": "system:nodes",
        "envName": "KUBE_NODE",
        "path": "/etc/kubernetes/ssl/kube-node.pem",
        "keyEnvName": "KUBE_NODE_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-node-key.pem",
        "configEnvName": "KUBECFG_KUBE_NODE",
        "configPath": "/etc/kubernetes/ssl/kubecfg-kube-node.yaml"
      },
      "kube-proxy": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\nOrYOieJjsYM0uSI=\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\njgixafgO1YBFG+J9KrGHqsqps5LPML4SkGDQecprRHGRLW4IWPw=\n-----END RSA PRIVATE KEY-----\n",
        "config": "apiVersion: v1\nkind: Config\nclusters:\n- cluster:\n    api-version: v1\n    certificate-authority: /etc/kubernetes/ssl/kube-ca.pem\n    server: \"https://127.0.0.1:6443\"\n  name: \"local\"\ncontexts:\n- context:\n    cluster: \"local\"\n    user: \"kube-proxy-local\"\n  name: \"local\"\ncurrent-context: \"local\"\nusers:\n- name: \"kube-proxy-local\"\n  user:\n    client-certificate: /etc/kubernetes/ssl/kube-proxy.pem\n    client-key: /etc/kubernetes/ssl/kube-proxy-key.pem",
        "name": "kube-proxy",
        "commonName": "system:kube-proxy",
        "ouName": "",
        "envName": "KUBE_PROXY",
        "path": "/etc/kubernetes/ssl/kube-proxy.pem",
        "keyEnvName": "KUBE_PROXY_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-proxy-key.pem",
        "configEnvName": "KUBECFG_KUBE_PROXY",
        "configPath": "/etc/kubernetes/ssl/kubecfg-kube-proxy.yaml"
      },
      "kube-scheduler": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----\nMIIC2zCCAcOgAwIBAgIITa6VSG8fEVgwDQYJKoZIhvcNAQELBQAwEjEQMA4GA1UE\nAxMHa3ViZS1jYTAeFw0yMDExMTgyMDU4MDBaFw0zMDExMTYyMDU4MDBaMCAxHjAc\nBgNVBAMTFXN5c3RlbTprdWJlLXNjaGVkdWxlcjCCASIwDQYJKoZIhvcNAQEBBQAD\nggEPADCCAQoCggEBALrKCaOA1OUJdAf1pjsDpLBliB4KBHgSUECFn/2oO8HOb8BH\nWoAz4Rme0FOySmrOZbvpRmc9QDhx6DuRx0rCdJTC+FYaCzxpSRudNQxd4+kzBkeM\nBa19ozEtp5ezNCi85oblYh2ku+8ta5VbRYNtDDCa5nya+/q+FxaXtr7WfMuJmKY8\nMSEAkkapwfhv+t2wWX6Pla1AULYP7yMW9TMNpCB7OWJadIq/QVHWitcUCuRkoICn\n+9Dml1MxWphzbHHxlnj8qVG/BLJtI2jJXcEfkqrgcM+/fBDKQMNbc1yKJA/bOw48\n013c/2vHs/MHBUp/rSM3VGmyq4hMD1OHJJGgJJMCAwEAAaMnMCUwDgYDVR0PAQH/\nBAQDAgWgMBMGA1UdJQQMMAoGCCsGAQUFBwMCMA0GCSqGSIb3DQEBCwUAA4IBAQCz\nWh7UWDrCS1//5HVXJymputCivAn7V+av/0vyUlpxebRMdjIG9Tc0FluVBf2WOgxI\n93fHU6bPznKnJArHLVoJqj0MqtC3ZO9YV620Xntcs2Ar1OYbUpQHzrO5TM2Qm5Kk\nX0oK+t4A0/1qBNyWrTOOgYsV9A6ZoRb6aa5YI3sn+ioE5FIS7B4bbMhGnGstIkn7\nNV5S2njnvwHV4Je4zz+3iEgSmOJ3i2irJDnhkWNYberL5XcOgSU/WielKRS1zkZd\nwo1uzyAX6nOyvPxpNoIXtMRrZ3dFGd2uHqWJyQBR4AE/c8c9Rw6wyDCZb1aSlWfV\nCd9nrbVC7yBnTuJgslwz\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\nmamW/R0KLxyOS62gQQRjK30kLmh6KYp6Kp/ke4sDg/WEnAQiDQOk/9lt\n-----END RSA PRIVATE KEY-----\n",
        "config": "apiVersion: v1\nkind: Config\nclusters:\n- cluster:\n    api-version: v1\n    certificate-authority: /etc/kubernetes/ssl/kube-ca.pem\n    server: \"https://127.0.0.1:6443\"\n  name: \"local\"\ncontexts:\n- context:\n    cluster: \"local\"\n    user: \"kube-scheduler-local\"\n  name: \"local\"\ncurrent-context: \"local\"\nusers:\n- name: \"kube-scheduler-local\"\n  user:\n    client-certificate: /etc/kubernetes/ssl/kube-scheduler.pem\n    client-key: /etc/kubernetes/ssl/kube-scheduler-key.pem",
        "name": "kube-scheduler",
        "commonName": "system:kube-scheduler",
        "ouName": "",
        "envName": "KUBE_SCHEDULER",
        "path": "/etc/kubernetes/ssl/kube-scheduler.pem",
        "keyEnvName": "KUBE_SCHEDULER_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-scheduler-key.pem",
        "configEnvName": "KUBECFG_KUBE_SCHEDULER",
        "configPath": "/etc/kubernetes/ssl/kubecfg-kube-scheduler.yaml"
      },
      "kube-service-account-token": {
        "certificatePEM": "-----BEGIN CERTIFICATE-----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\npH/+bOTmPSEwjsHvcj845fPyUPEI9K8ASx/oo2HIotzSfhpmhfhnC+8b\n-----END CERTIFICATE-----\n",
        "keyPEM": "-----BEGIN RSA PRIVATE KEY-----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\nMyU2edx0THcF59S1GwZlCpmK/Td7SEtq7KBw/EW8R4Blh6bQJThW8zA=\n-----END RSA PRIVATE KEY-----\n",
        "config": "",
        "name": "kube-service-account-token",
        "commonName": "kube-service-account-token",
        "ouName": "",
        "envName": "KUBE_SERVICE_ACCOUNT_TOKEN",
        "path": "/etc/kubernetes/ssl/kube-service-account-token.pem",
        "keyEnvName": "KUBE_SERVICE_ACCOUNT_TOKEN_KEY",
        "keyPath": "/etc/kubernetes/ssl/kube-service-account-token-key.pem",
        "configEnvName": "",
        "configPath": ""
      }
    }
  },
  "currentState": {}
ccamacho commented 3 years ago

I assume I'm missing this1, but where I'm running the registry is podman and not docker

I create the container like this: https://github.com/Kubeinit/kubeinit/blob/master/kubeinit/roles/kubeinit_registry/tasks/10_configure.yml#L205

And then start the container as a service like: https://github.com/Kubeinit/kubeinit/blob/master/kubeinit/roles/kubeinit_registry/tasks/10_configure.yml#L253

superseb commented 3 years ago

I'm asking for the outputs from the host that you are trying to add to the cluster, in the logging example that is rke-master-01.clustername1.kubeinit.local. As docker login etc works I assume the CA certificate to validate the registry is added to the host certificate store as we use the Docker socket directly and then rely on either insecure-registries or CA certificates added to /etc/docker/certs.d/$REGISTRY.

ccamacho commented 3 years ago

Thank you @superseb for point it out, I solved it like https://github.com/Kubeinit/kubeinit/blob/master/kubeinit/roles/kubeinit_rke/tasks/10_configure_service_nodes.yml#L79

Just in case other people have the same problem.

Adding insecure-registries on every docker node.