-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Networking issue produces CrashLoopBackOff #3214
Comments
What address range are you using for these VMs? Do the VMs have more than one interface? Do you see the same result if you stop and disable firewalld before installing K3s? |
The VMs are running in the
Also, |
Can you attach the full k3s and k3s-agent service logs, as well as the output of |
I uploaded the logs as files since they are pretty long: |
I'm having this issue on these conditions:
If I install it without that option then it works. I'm using Debian without firewall. |
After few hours of debugging, I solved my issue with: curl -sfL https://get.k3s.io | INSTALL_K3S_EXEC="--bind-address 192.168.10.11 --advertise-address 192.168.10.11" sh - That flag was not needed in |
I tried adding the |
I have got this working using a newer version and will therefore close the issue. |
Environmental Info:
K3s Version: v1.20.5+k3s1
Node(s) CPU architecture, OS, and Version:
Linux kube-master-01 5.8.0-50-generic #56-Ubuntu SMP Mon Apr 12 17:18:36 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
Cluster Configuration:
Describe the bug:
I have set up K3S on four Proxmox VMs and am experiencing a networking issue similar to #24 that is producing a
CrashLoopBackOff
for multiple pods, including:helm-install-traefik
kubernetes-dashboard
It seems that networking to
10.42.0.0/16
is not working. Take the following error message for example:Steps To Reproduce:
Masters:
Installing K3s:
Getting Token:
Worker:
Expected behavior:
All pods and deployments should start without going into a
CrashLoopBackOff
.Actual behavior:
Deployments experience networking issues on
10.42.0.0/16
addresses and therefore go into aCrashLoopBackOff
.Additional context / logs:
Executing
systemctl status k3s
on the master node:Executing
sudo systemctl status k3s-agent
on worker node:Solutions I have tried
I have already looked at issue #24 and deleted all iptables rules, but it did not fix my specific problem.
The text was updated successfully, but these errors were encountered: