Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save henrypham67/b353c5a3c940696428e3d4a4345deb81 to your computer and use it in GitHub Desktop.
Save henrypham67/b353c5a3c940696428e3d4a4345deb81 to your computer and use it in GitHub Desktop.
kubectl log
> kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml
namespace/cert-manager created
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created
serviceaccount/cert-manager-cainjector created
serviceaccount/cert-manager created
serviceaccount/cert-manager-webhook created
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created
clusterrole.rbac.authorization.k8s.io/cert-manager-view created
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created
role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
role.rbac.authorization.k8s.io/cert-manager:leaderelection created
role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created
rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created
service/cert-manager created
service/cert-manager-webhook created
deployment.apps/cert-manager-cainjector created
deployment.apps/cert-manager created
deployment.apps/cert-manager-webhook created
mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
> kubectl get po -A
NAMESPACE NAME READY STATUS RESTARTS AGE
cert-manager cert-manager-7ddd8cdb9f-qq4z4 1/1 Running 0 14s
cert-manager cert-manager-cainjector-57cd76c845-vrhsd 1/1 Running 0 15s
cert-manager cert-manager-webhook-cf8f9f895-6tfrj 1/1 Running 0 14s
kube-system coredns-76f75df574-dsfd4 1/1 Running 0 39s
kube-system coredns-76f75df574-zrl26 1/1 Running 0 39s
kube-system etcd-kind-control-plane 1/1 Running 0 52s
kube-system kindnet-tq8gg 1/1 Running 0 39s
kube-system kube-apiserver-kind-control-plane 1/1 Running 0 52s
kube-system kube-controller-manager-kind-control-plane 1/1 Running 0 54s
kube-system kube-proxy-xshqw 1/1 Running 0 39s
kube-system kube-scheduler-kind-control-plane 1/1 Running 0 53s
local-path-storage local-path-provisioner-7577fdbbfb-fd6hh 1/1 Running 0 39s
> helm install capi-operator capi-operator/cluster-api-operator --create-namespace -n capi-operator-system --set infrastructure=aws --set cert-manager.enabled=false --set configSecret.name=${CREDENTIALS_SECRET_NAME} --set configSecret.namespace=${CREDENTIALS_SECRET_NAMESPACE} --wait --timeout 90s
Error: INSTALLATION FAILED: client rate limiter Wait returned an error: context deadline exceeded
> kubectl describe po -n capi-operator-system capi-operator-cluster-api-operator-54f4b4ff99-7njvc
Name: capi-operator-cluster-api-operator-54f4b4ff99-7njvc
Namespace: capi-operator-system
Priority: 0
Service Account: default
Node: kind-control-plane/172.18.0.2
Start Time: Fri, 17 May 2024 09:53:20 +0700
Labels: app=cluster-api-operator
app.kubernetes.io/component=controller
app.kubernetes.io/instance=capi-operator
app.kubernetes.io/name=cluster-api-operator
clusterctl.cluster.x-k8s.io/core=capi-operator
control-plane=controller-manager
pod-template-hash=54f4b4ff99
Annotations: <none>
Status: Pending
IP:
IPs: <none>
Controlled By: ReplicaSet/capi-operator-cluster-api-operator-54f4b4ff99
Containers:
manager:
Container ID:
Image: registry.k8s.io/capi-operator/cluster-api-operator:v0.10.0
Image ID:
Ports: 9443/TCP, 8080/TCP
Host Ports: 0/TCP, 0/TCP
Command:
/manager
Args:
--v=2
--health-addr=:8081
--metrics-bind-addr=127.0.0.1:8080
--diagnostics-address=8443
--leader-elect=true
State: Waiting
Reason: ContainerCreating
Ready: False
Restart Count: 0
Limits:
cpu: 100m
memory: 150Mi
Requests:
cpu: 100m
memory: 100Mi
Environment: <none>
Mounts:
/tmp/k8s-webhook-server/serving-certs from cert (ro)
/var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-84lx7 (ro)
Conditions:
Type Status
PodReadyToStartContainers False
Initialized True
Ready False
ContainersReady False
PodScheduled True
Volumes:
cert:
Type: Secret (a volume populated by a Secret)
SecretName: capi-operator-webhook-service-cert
Optional: false
kube-api-access-84lx7:
Type: Projected (a volume that contains injected data from multiple sources)
TokenExpirationSeconds: 3607
ConfigMapName: kube-root-ca.crt
ConfigMapOptional: <nil>
DownwardAPI: true
QoS Class: Burstable
Node-Selectors: <none>
Tolerations: node-role.kubernetes.io/control-plane:NoSchedule
node-role.kubernetes.io/master:NoSchedule
node.kubernetes.io/not-ready:NoExecute op=Exists for 300s
node.kubernetes.io/unreachable:NoExecute op=Exists for 300s
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal Scheduled 4m30s default-scheduler Successfully assigned capi-operator-system/capi-operator-cluster-api-operator-54f4b4ff99-7njvc to kind-control-plane
Warning FailedMount 20s (x10 over 4m29s) kubelet MountVolume.SetUp failed for volume "cert" : secret "capi-operator-webhook-service-cert" not found
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment