-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot create cluster due to 'docker exec --privileged kind-control-plane cat /kind/version' failing #2156
Comments
We need Also yes, it is the same symptom but the symptom is just "the first time we try to interact with the node container we find out it isn't running" which means it crashed due to something with the host. It's not related to that issue. |
This reminds me of #2112 (comment) but there we only know it's related to the kernel and not the root cause yet. Here we also need more information (I will update the issue template for future issues). |
Same here. Also Gentoo. Could it be because we are not running SystemD, but OpenRC? Output from
My
Output from |
Please note this part:
When you see this step fail (
Yes, please try kind @ HEAD, particularly after: d777456. SystemD is basically required in the container space now (particularly for cgroupsv2) but we're doing our best to only require it within the nodes. Nobody is running Kubernetes / containerd / ... CI that isn't systemd based though. It should work without systemd after that patch, I've had one user report success on a different distro. To test: |
And thanks for the tip! I couldn't tell from the existing report that this was not on systemd. In that case it is most likely already fixed, we have a release coming in the next few weeks. |
Thank you. That worked! Could not have been a better timing for the fix ;) I will consider moving all my Gentoo machines to SystemD, but I am sad to hear that it is becoming the only option. All my machines at home use OpenRC with either Gentoo or Alpine. Thank you for still supporting installations using non-SystemD init. |
Excellent, glad to hear it. We'll be shipping a tagged release soon, tentatively inline with Kubernetes 1.21 https://www.kubernetes.dev/resources/release/
You really shouldn't have to move your development machines, but on the other hand I wouldn't be too surprised to discover more places depending on this sort of thing unintentionally in the future. It's possible it will continue to receive support from other tools, but see e.g. discussion here: kubernetes/kubeadm#2376 For the most part we should be able to run systemd inside docker on a host with or without systemd, but I can't speak for the other projects, only that my observation is that the ecosystem seems to be trending in the direction of that last link for some time now. |
When you say "we", does that also refer to the original report by @nuno-silva? |
I cannot see if @nuno-silva is using systemd or openrc. The use flags do not show it (some packages have use flags to turn on/off systemd support, but docker does not). You may have to wait on @nuno-silva for a response. I can tell you that the issue I run into is almost 100% similar, same errors and log output except for the kernel version, machine name and of course what usually differs per installation. |
Hey everyone! Thanks for looking into this and sorry for the delay. Here's the missing logs (they seem to be just like @deorder's except for SecurityOpt, CgroupnsMode and Capabilities, so you can skip them... see below): kind create cluster --retain``` $ kind create cluster --retain Creating cluster "kind" ... β Ensuring node image (kindest/node:v1.20.2) πΌ β Preparing nodes π¦ β Writing configuration π ERROR: failed to create cluster: failed to generate kubeadm config content: failed to get kubernetes version from node: failed to get file: command "docker exec --privileged kind-control-plane cat /kind/version" failed with error: exit status 1 Command Output: Error response from daemon: Container 19bb0e3e1f33a874d9c10689f891c1a42f6d0bf9c8124b30083d20789a6d165d is not running ```docker logs kind-control-plane``` $ docker logs kind-control-plane INFO: ensuring we can execute mount/umount even with userns-remap INFO: remounting /sys read-only INFO: making mounts shared INFO: detected cgroup v1 INFO: fix cgroup mounts for all subsystems INFO: ensuring we can execute mount/umount even with userns-remap INFO: remounting /sys read-only INFO: making mounts shared INFO: detected cgroup v1 INFO: fix cgroup mounts for all subsystems ```Note that since the original report I've upgraded As per @BenTheElder's #2156 (comment), I tried kind as of 8fe8b96 and it works!
so it seems to be related to not using Systemd and is now fixed. Thank you both for the help and a special thanks to the Kind team for still supporting installations using non-systemd init! |
What happened:
kind create cluster
fails to run:What you expected to happen:
kind create cluster
should create a cluster.How to reproduce it (as minimally and precisely as possible):
go get sigs.k8s.io/kind
export PATH=$PATH:$(go env GOPATH)/bin
kind create cluster
Anything else we need to know?:
Same symptoms as #1288 (?)
Environment:
kind version
):kind v0.10.0 go1.16.2 linux/amd64
kubectl version
):docker info
):/etc/os-release
):dockerd is running as root. I'm running kind as a normal user which is in the
docker
group.The text was updated successfully, but these errors were encountered: