Created
May 17, 2024 03:17
-
-
Save henrypham67/b353c5a3c940696428e3d4a4345deb81 to your computer and use it in GitHub Desktop.
kubectl log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
> kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml | |
namespace/cert-manager created | |
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created | |
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created | |
serviceaccount/cert-manager-cainjector created | |
serviceaccount/cert-manager created | |
serviceaccount/cert-manager-webhook created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-view created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created | |
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created | |
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created | |
role.rbac.authorization.k8s.io/cert-manager:leaderelection created | |
role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created | |
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created | |
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created | |
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created | |
service/cert-manager created | |
service/cert-manager-webhook created | |
deployment.apps/cert-manager-cainjector created | |
deployment.apps/cert-manager created | |
deployment.apps/cert-manager-webhook created | |
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created | |
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created | |
> kubectl get po -A | |
NAMESPACE NAME READY STATUS RESTARTS AGE | |
cert-manager cert-manager-7ddd8cdb9f-qq4z4 1/1 Running 0 14s | |
cert-manager cert-manager-cainjector-57cd76c845-vrhsd 1/1 Running 0 15s | |
cert-manager cert-manager-webhook-cf8f9f895-6tfrj 1/1 Running 0 14s | |
kube-system coredns-76f75df574-dsfd4 1/1 Running 0 39s | |
kube-system coredns-76f75df574-zrl26 1/1 Running 0 39s | |
kube-system etcd-kind-control-plane 1/1 Running 0 52s | |
kube-system kindnet-tq8gg 1/1 Running 0 39s | |
kube-system kube-apiserver-kind-control-plane 1/1 Running 0 52s | |
kube-system kube-controller-manager-kind-control-plane 1/1 Running 0 54s | |
kube-system kube-proxy-xshqw 1/1 Running 0 39s | |
kube-system kube-scheduler-kind-control-plane 1/1 Running 0 53s | |
local-path-storage local-path-provisioner-7577fdbbfb-fd6hh 1/1 Running 0 39s | |
> helm install capi-operator capi-operator/cluster-api-operator --create-namespace -n capi-operator-system --set infrastructure=aws --set cert-manager.enabled=false --set configSecret.name=${CREDENTIALS_SECRET_NAME} --set configSecret.namespace=${CREDENTIALS_SECRET_NAMESPACE} --wait --timeout 90s | |
Error: INSTALLATION FAILED: client rate limiter Wait returned an error: context deadline exceeded | |
> kubectl describe po -n capi-operator-system capi-operator-cluster-api-operator-54f4b4ff99-7njvc | |
Name: capi-operator-cluster-api-operator-54f4b4ff99-7njvc | |
Namespace: capi-operator-system | |
Priority: 0 | |
Service Account: default | |
Node: kind-control-plane/172.18.0.2 | |
Start Time: Fri, 17 May 2024 09:53:20 +0700 | |
Labels: app=cluster-api-operator | |
app.kubernetes.io/component=controller | |
app.kubernetes.io/instance=capi-operator | |
app.kubernetes.io/name=cluster-api-operator | |
clusterctl.cluster.x-k8s.io/core=capi-operator | |
control-plane=controller-manager | |
pod-template-hash=54f4b4ff99 | |
Annotations: <none> | |
Status: Pending | |
IP: | |
IPs: <none> | |
Controlled By: ReplicaSet/capi-operator-cluster-api-operator-54f4b4ff99 | |
Containers: | |
manager: | |
Container ID: | |
Image: registry.k8s.io/capi-operator/cluster-api-operator:v0.10.0 | |
Image ID: | |
Ports: 9443/TCP, 8080/TCP | |
Host Ports: 0/TCP, 0/TCP | |
Command: | |
/manager | |
Args: | |
--v=2 | |
--health-addr=:8081 | |
--metrics-bind-addr=127.0.0.1:8080 | |
--diagnostics-address=8443 | |
--leader-elect=true | |
State: Waiting | |
Reason: ContainerCreating | |
Ready: False | |
Restart Count: 0 | |
Limits: | |
cpu: 100m | |
memory: 150Mi | |
Requests: | |
cpu: 100m | |
memory: 100Mi | |
Environment: <none> | |
Mounts: | |
/tmp/k8s-webhook-server/serving-certs from cert (ro) | |
/var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-84lx7 (ro) | |
Conditions: | |
Type Status | |
PodReadyToStartContainers False | |
Initialized True | |
Ready False | |
ContainersReady False | |
PodScheduled True | |
Volumes: | |
cert: | |
Type: Secret (a volume populated by a Secret) | |
SecretName: capi-operator-webhook-service-cert | |
Optional: false | |
kube-api-access-84lx7: | |
Type: Projected (a volume that contains injected data from multiple sources) | |
TokenExpirationSeconds: 3607 | |
ConfigMapName: kube-root-ca.crt | |
ConfigMapOptional: <nil> | |
DownwardAPI: true | |
QoS Class: Burstable | |
Node-Selectors: <none> | |
Tolerations: node-role.kubernetes.io/control-plane:NoSchedule | |
node-role.kubernetes.io/master:NoSchedule | |
node.kubernetes.io/not-ready:NoExecute op=Exists for 300s | |
node.kubernetes.io/unreachable:NoExecute op=Exists for 300s | |
Events: | |
Type Reason Age From Message | |
---- ------ ---- ---- ------- | |
Normal Scheduled 4m30s default-scheduler Successfully assigned capi-operator-system/capi-operator-cluster-api-operator-54f4b4ff99-7njvc to kind-control-plane | |
Warning FailedMount 20s (x10 over 4m29s) kubelet MountVolume.SetUp failed for volume "cert" : secret "capi-operator-webhook-service-cert" not found |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment