etcd | Run Etcd in Kubernetes | Key Value Database library
kandi X-RAY | etcd Summary
kandi X-RAY | etcd Summary
Run Etcd in Kubernetes.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- NewConfig returns a new config instance .
- startProxy starts the transport
- startEtcdOrProxyV2 starts an etcdOrProxy
- startGRPCProxy starts the gRPC proxy
- RunEtcdHelper runs the etcd main loop
- ValidateEtcd validates etcd
- setDefaultsFromDormantDB sets default values for a given Etcd
- upsertDataVolume upserts data volume
- discoverEndpoints returns the SRV clients
- startGateway starts a gateway
etcd Key Features
etcd Examples and Code Snippets
Community Discussions
Trending Discussions on etcd
QUESTION
I installed a Kubernetes cluster of three nodes, the control node looked ok, when I tried to join the other two nodes the status for both of is: Not Ready
On control node:
...ANSWER
Answered 2021-Jun-11 at 20:41After seeing whole log line entry
QUESTION
I can configure apiserver.service-node-port-range
extra-config with a port range like 10000-19000
but when I specify a comma separated list of ports like 17080,13306
minkube wouldn't start it will bootloop with below error
ANSWER
Answered 2021-May-28 at 07:21Posting this as community wiki, please feel free and provide more details and findings about this topic.
The only one place where we can find information about comma separated list of ports and port ranges is minikube documentation:
Increasing the NodePort rangeBy default, minikube only exposes ports 30000-32767. If this does not work for >you, you can adjust the range by using:
minikube start --extra-config=apiserver.service-node-port-range=1-65535
This flag also accepts a comma separated list of ports and port ranges.
On the other hand from the k8s documentation:
--service-node-port-range Default: 30000-32767
I have tested this with k8s v 1.20 and comma separated list of ports also doesn't work for me. Kube-apiserver accept two approaches:
set parses a string of the form "value", "min-max", or "min+offset", inclusive at both ends
QUESTION
I have a PostgreSQL cluster on Patroni (Haproxy+Keepalived+etcd) - one primary node and two standby nodes.
For now, Haproxy is configured in this way:
- port
5000
to connect to the primary node - port
5001
to connect to the standby nodes
How can I configure Haproxy so that the port 5001
is used to connect to the standby nodes as well as the primary node?
This is my haproxy.cfg
below:
ANSWER
Answered 2021-May-19 at 18:38In a patroni documentation I found the /health endpoint patroni rest-api:
returns HTTP status code 200 only when PostgreSQL is up and running.
I tried to use that endpoint in haproxy configuration, and it works like expected, patroni give all 3 nodes when all nodes alive, and don't give nodes that aren't in running state
So, if you want to add all nodes to haproxy balance, create a new backend in haproxy.conf
QUESTION
I'm having an error trying to have docker set iptables false when minikube start fails.
Below are my logs:
...ANSWER
Answered 2021-May-18 at 07:07Error you included states that you are misising bridge-nf-call-iptables
.
bridge-nf-call-iptables
is exported by br_netfilter
.
What you need to do is issue the command
QUESTION
I have 3 node cluster in AWS ec2 (Centos 8 ami).
When I try to access pods scheduled on worker node from master:
...ANSWER
Answered 2021-May-12 at 10:43Flannel does not support NFT, and since you are using CentOS 8, you can't fallback to iptables.
Your best bet in this situation would be to switch to Calico.
You have to update Calico DaemonSet with:
QUESTION
Trying to provision k8s cluster on 3 Debian 10 VMs with kubeadm.
All vms have 2 network interfaces, eth0 as public interface with static ip, eth1 as local interface with static ips in 192.168.0.0/16:
- Master: 192.168.1.1
- Node1: 192.168.2.1
- Node2: 192.168.2.2
All nodes have interconnect between them.
ip a
from master host:
ANSWER
Answered 2021-May-06 at 10:49The reason for your issues is that the TLS connection between the components has to be secured. From the kubelet
point of view this will be safe if the Api-server
certificate will contain in alternative names the IP of the server that we want to connect to. You can notice yourself that you only add to SANs
one IP address.
How can you fix this? There are two ways:
Use the
--discovery-token-unsafe-skip-ca-verification
flag with your kubeadm join command from your node.Add the IP address from the second
NIC
toSANs
api certificate at the cluster initialization phase (kubeadm init)
For more reading you check this directly related PR #93264 which was introduced in kubernetes 1.19.
QUESTION
I am all new to Kubernetes and currently setting up a Kubernetes Cluster inside of Azure VMs. I want to deploy Windows containers, but in order to achieve this I need to add Windows worker nodes. I already deployed a Kubeadm cluster with 3 master nodes and one Linux worker node and those nodes work perfectly.
Once I add the Windows node all things go downward. Firstly I use Flannel as my CNI plugin and prepare the deamonset and control plane according to the Kubernetes documentation: https://kubernetes.io/docs/tasks/administer-cluster/kubeadm/adding-windows-nodes/
Then after the installation of the Flannel deamonset, I installed the proxy and Docker EE accordingly.
Used Software Master NodesOS: Ubuntu 18.04 LTS
Container Runtime: Docker 20.10.5
Kubernetes version: 1.21.0
Flannel-image version: 0.14.0
Kube-proxy version: 1.21.0
OS: Windows Server 2019 Datacenter Core
Container Runtime: Docker 20.10.4
Kubernetes version: 1.21.0
Flannel-image version: 0.13.0-nanoserver
Kube-proxy version: 1.21.0-nanoserver
I wanted to see a full cluster ready to use and with all the needed in the Running
state.
After the installation I checked if the installation was successful:
...ANSWER
Answered 2021-May-07 at 12:21Are you still having this error? I managed to fix this by downgrading windows kube-proxy to at least 1.20.0. There must be some missing config or bug for 1.21.0.
QUESTION
I have minikube installed on Windows10, and I'm trying to work with Ingress Controller
I'm doing:
...$ minikube addons enable ingress
ANSWER
Answered 2021-May-07 at 12:07As already discussed in the comments the Ingress Controller will be created in the ingress-nginx
namespace instead of the kube-system
namespace. Other than that the rest of the tutorial should work as expected.
QUESTION
I'm following this and am about to ask our IT team to open the hardware firewall port for me:
Control-plane node(s)
Protocol Direction Port Range Purpose Used By TCP Inbound 6443* Kubernetes API server All TCP Inbound 2379-2380 etcd server client API kube-apiserver, etcd TCP Inbound 10250 kubelet API Self, Control plane TCP Inbound 10251 kube-scheduler Self TCP Inbound 10252 kube-controller-manager SelfWorker node(s)
Protocol Direction Port Range Purpose Used By TCP Inbound 10250 kubelet API Self, Control plane TCP Inbound 30000-32767 NodePort Services† AllBefore I ask IT to open the hardware port for me, I checked my local environment which doesn't have a hardware firewall, and I see this:
...ANSWER
Answered 2021-May-05 at 08:40The answer is: it depends.
- You may have specified a different port for serving HTTP with
--port
flag - You may have disabled serving HTTP altogether with
--port 0
- You are using latest version of K8s
Last one is most probable as Creating a cluster with kubeadm states it is written for version 1.21
Ports 10251
and 10252
have been replaced in veresion 1.17 (see more here)
Kubeadm: enable the usage of the secure kube-scheduler and kube-controller-manager ports for health checks. For kube-scheduler was 10251, becomes 10259. For kube-controller-manager was 10252, becomes 10257.
Moreover, this functionality is depracted in 1.19 (more here)
Kube-apiserver: the componentstatus API is deprecated. This API provided status of etcd, kube-scheduler, and kube-controller-manager components, but only worked when those components were local to the API server, and when kube-scheduler and kube-controller-manager exposed unsecured health endpoints. Instead of this API, etcd health is included in the kube-apiserver health check and kube-scheduler/kube-controller-manager health checks can be made directly against those components' health endpoints.
It seems some parts of documentation are outdated.
QUESTION
I am trying to generate sas token through azure cli as show below
...ANSWER
Answered 2021-Apr-14 at 11:23Essentially you're encountering the restriction imposed by Azure Blob Storage Service. For Storage Service REST API version 2016-05-31 through version 2019-07-07, the maximum size of data that can be sent via Put Blob
request is 256 MB. Please see this link for more details: https://docs.microsoft.com/en-us/rest/api/storageservices/put-blob#remarks.
One possible solution is to make use of Put Block
and Put Block List
operations to split your large file into smaller chunks and then upload those chunks.
Another option is to make use of a Storage SDK to generate SAS token. When creating a SAS token, you can specify the Storage Service REST API version as a parameter. Then you should be able to specify a newer version (e.g. 2019-12-12 and later) which allows you to transfer larger files through Put Blob
request. I was actually surprised to see it not being there in az storage container generate-sas
.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install etcd
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page