openshift

From Diminutive Monkey, 6 Months ago, written in Plain Text, viewed 89 times.
URL http://pastebin.mattei.co/index.php/view/301c09ad Embed
Download Paste or View Raw
  1. FAILED - RETRYING: Approve node certificates when bootstrapping (1 retries left).
  2. fatal: [odk.rm.ht]: FAILED! => {"all_subjects_found": ["subject=/O=system:nodes/CN=system:node:odk.rm.ht\n", "subject=/O=system:nodes/CN=system:node:odk.rm.ht\n", "subject=/O=system:nodes/CN=system:node:odk.rm.ht\n", "subject=/O=system:nodes/CN=system:node:odk.rm.ht\n"], "attempts": 30, "changed": false, "client_approve_results": [], "client_csrs": {}, "msg": "Could not find csr for nodes: odk-infra.rm.ht, odk-node2.rm.ht, odk-node1", "oc_get_nodes": {"apiVersion": "v1", "items": [{"apiVersion": "v1", "kind": "Node", "metadata": {"annotations": {"node.openshift.io/md5sum": "7d5d0bf7c58ca8b2f34598be64adbd1b", "volumes.kubernetes.io/controller-managed-attach-detach": "true"}, "creationTimestamp": "2019-05-12T23:43:13Z", "labels": {"beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/hostname": "odk.rm.ht", "node-role.kubernetes.io/master": "true"}, "name": "odk.rm.ht", "namespace": "", "resourceVersion": "1814", "selfLink": "/api/v1/nodes/odk.rm.ht", "uid": "b5310a6a-750f-11e9-a30b-5254008838aa"}, "spec": {}, "status": {"addresses": [{"address": "208.53.44.239", "type": "InternalIP"}, {"address": "odk.rm.ht", "type": "Hostname"}], "allocatable": {"cpu": "4", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "17751940Ki", "pods": "250"}, "capacity": {"cpu": "4", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "17854340Ki", "pods": "250"}, "conditions": [{"lastHeartbeatTime": "2019-05-12T23:50:12Z", "lastTransitionTime": "2019-05-12T23:43:08Z", "message": "kubelet has sufficient disk space available", "reason": "KubeletHasSufficientDisk", "status": "False", "type": "OutOfDisk"}, {"lastHeartbeatTime": "2019-05-12T23:50:12Z", "lastTransitionTime": "2019-05-12T23:43:08Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure"}, {"lastHeartbeatTime": "2019-05-12T23:50:12Z", "lastTransitionTime": "2019-05-12T23:43:08Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure"}, {"lastHeartbeatTime": "2019-05-12T23:50:12Z", "lastTransitionTime": "2019-05-12T23:43:08Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure"}, {"lastHeartbeatTime": "2019-05-12T23:50:12Z", "lastTransitionTime": "2019-05-12T23:47:22Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready"}], "daemonEndpoints": {"kubeletEndpoint": {"Port": 10250}}, "images": [{"names": ["docker.io/openshift/origin-node@sha256:fd24163b06e1e54ff0c6bbb82d959d9cbce4a643a8fcf75a66c0f0207bb35581", "docker.io/openshift/origin-node:v3.11"], "sizeBytes": 1172943725}, {"names": ["docker.io/openshift/origin-control-plane@sha256:e41d426b8cd347e9dc1f1e575a79db30fc41551aefcfe511f28e3c68be1a20fd", "docker.io/openshift/origin-control-plane:v3.11"], "sizeBytes": 828783719}, {"names": ["docker.io/openshift/origin-pod@sha256:ea4573d6c20881d038e9af662cbb0c2c19fa5b5377655fb574a78abdb2af40ec", "docker.io/openshift/origin-pod:v3.11", "docker.io/openshift/origin-pod:v3.11.0"], "sizeBytes": 261526187}, {"names": ["quay.io/coreos/etcd@sha256:43fbc8a457aa0cb887da63d74a48659e13947cb74b96a53ba8f47abb6172a948", "quay.io/coreos/etcd:v3.2.22"], "sizeBytes": 37269372}], "nodeInfo": {"architecture": "amd64", "bootID": "1f64a8f0-49fb-48ae-9a11-d5813a5c4836", "containerRuntimeVersion": "docker://1.13.1", "kernelVersion": "3.10.0-957.12.1.el7.x86_64", "kubeProxyVersion": "v1.11.0+d4cacc0", "kubeletVersion": "v1.11.0+d4cacc0", "machineID": "e662e6b4a9e44eb2a7ec0b243fd952f4", "operatingSystem": "linux", "osImage": "CentOS Linux 7 (Core)", "systemUUID": "D3319B5E-7253-4849-83BD-1E035FACC4D5"}}}], "kind": "List", "metadata": {"resourceVersion": "", "selfLink": ""}}, "raw_failures": [], "rc": 0, "server_approve_results": [], "server_csrs": null, "state": "unknown", "unwanted_csrs": [{"apiVersion": "certificates.k8s.io/v1beta1", "kind": "CertificateSigningRequest", "metadata": {"creationTimestamp": "2019-05-12T23:46:13Z", "generateName": "csr-", "name": "csr-7pk2m", "namespace": "", "resourceVersion": "1205", "selfLink": "/apis/certificates.k8s.io/v1beta1/certificatesigningrequests/csr-7pk2m", "uid": "20598e3f-7510-11e9-a30b-5254008838aa"}, "spec": {"groups": ["system:nodes", "system:authenticated"], "request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQkxEQ0IxQUlCQURBM01SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14SGpBY0JnTlZCQU1URlhONQpjM1JsYlRwdWIyUmxPbTlrYXk1eWJTNW9kREJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCRldDCnp0Y1ZyTTFUKzkrQzA0ak1PNHJDRkJXOFVIdlhqTVlpbjBvN3Q4RExtNU5mTDZBaDQ5TG9yMGNJWkxUS1hDd1EKZ1kxRXVhSS9HVGhFR1V1Z2R2NmdPekE1QmdrcWhraUc5dzBCQ1E0eExEQXFNQ2dHQTFVZEVRUWhNQitDQ1c5awpheTV5YlM1b2RJSUFod1RRTlN6dmh3VEFxQUVWaHdTc0VRQUJNQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJSEd4CkVScUp1U2NPS1Q3d3ZXMTI5MDZTaHl1bHNxa0txL0JsVU4zWEtKS0VBaUJMbXIrRWJVV29WTTFvbWdkUmV5aVkKVEYyQ3dES0RhUm52NUhncmNsQXZLUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFIFJFUVVFU1QtLS0tLQo=", "usages": ["digital signature", "key encipherment", "server auth"], "username": "system:node:odk.rm.ht"}, "status": {}}, {"apiVersion": "certificates.k8s.io/v1beta1", "kind": "CertificateSigningRequest", "metadata": {"creationTimestamp": "2019-05-12T23:47:12Z", "generateName": "csr-", "name": "csr-ff6g8", "namespace": "", "resourceVersion": "1558", "selfLink": "/apis/certificates.k8s.io/v1beta1/certificatesigningrequests/csr-ff6g8", "uid": "43470edc-7510-11e9-a30b-5254008838aa"}, "spec": {"groups": ["system:nodes", "system:authenticated"], "request": "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", "usages": ["digital signature", "key encipherment", "server auth"], "username": "system:node:odk.rm.ht"}, "status": {}}, {"apiVersion": "certificates.k8s.io/v1beta1", "kind": "CertificateSigningRequest", "metadata": {"creationTimestamp": "2019-05-12T23:43:37Z", "generateName": "csr-", "name": "csr-l78lx", "namespace": "", "resourceVersion": "944", "selfLink": "/apis/certificates.k8s.io/v1beta1/certificatesigningrequests/csr-l78lx", "uid": "c3503516-750f-11e9-a30b-5254008838aa"}, "spec": {"groups": ["system:masters", "system:cluster-admins", "system:authenticated"], "request": "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", "usages": ["digital signature", "key encipherment", "server auth"], "username": "system:admin"}, "status": {}}, {"apiVersion": "certificates.k8s.io/v1beta1", "kind": "CertificateSigningRequest", "metadata": {"creationTimestamp": "2019-05-12T23:43:37Z", "generateName": "csr-", "name": "csr-zvxcl", "namespace": "", "resourceVersion": "947", "selfLink": "/apis/certificates.k8s.io/v1beta1/certificatesigningrequests/csr-zvxcl", "uid": "c352f8b6-750f-11e9-a30b-5254008838aa"}, "spec": {"groups": ["system:masters", "system:cluster-admins", "system:authenticated"], "request": "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", "usages": ["digital signature", "key encipherment", "client auth"], "username": "system:admin"}, "status": {"certificate": "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", "conditions": [{"lastUpdateTime": "2019-05-12T23:43:37Z", "message": "Auto approving kubelet client certificate after SubjectAccessReview.", "reason": "AutoApproved", "type": "Approved"}]}}]}
  3.  
  4. PLAY RECAP **************************************************************************************************************************************************************************************************
  5. localhost                  : ok=11   changed=0    unreachable=0    failed=0
  6. odk-infra.rm.ht            : ok=99   changed=22   unreachable=0    failed=0
  7. odk-node1.rm.ht            : ok=98   changed=22   unreachable=0    failed=0
  8. odk-node2.rm.ht            : ok=99   changed=22   unreachable=0    failed=0
  9. odk.rm.ht                  : ok=480  changed=235  unreachable=0    failed=1
  10.  
  11.  
  12. INSTALLER STATUS ********************************************************************************************************************************************************************************************
  13. Initialization              : Complete (0:00:23)
  14. Health Check                : Complete (0:00:31)
  15. Node Bootstrap Preparation  : Complete (0:03:49)
  16. etcd Install                : Complete (0:00:43)
  17. Master Install              : Complete (0:05:34)
  18. Master Additional Install   : Complete (0:00:46)
  19. Node Join                   : In Progress (0:03:04)
  20.         This phase can be restarted by running: playbooks/openshift-node/join.yml
  21. Sunday 12 May 2019  17:50:13 -0600 (0:03:00.431)       0:14:53.022 ************
  22. ===============================================================================
  23. Approve node certificates when bootstrapping ------------------------------------------------------------------------------------------------------------------------------------------------------- 180.43s
  24. openshift_node : Install node, clients, and conntrack packages -------------------------------------------------------------------------------------------------------------------------------------- 58.05s
  25. openshift_control_plane : Wait for control plane pods to appear ------------------------------------------------------------------------------------------------------------------------------------- 56.25s
  26. openshift_control_plane : Wait for all control plane pods to become ready --------------------------------------------------------------------------------------------------------------------------- 52.66s
  27. Run health checks (install) - EL -------------------------------------------------------------------------------------------------------------------------------------------------------------------- 30.46s
  28. openshift_ca : Install the base package for admin tooling ------------------------------------------------------------------------------------------------------------------------------------------- 26.71s
  29. openshift_node : Install GlusterFS storage plugin dependencies -------------------------------------------------------------------------------------------------------------------------------------- 17.21s
  30. openshift_node : install needed rpm(s) -------------------------------------------------------------------------------------------------------------------------------------------------------------- 16.34s
  31. openshift_node : Install Ceph storage plugin dependencies ------------------------------------------------------------------------------------------------------------------------------------------- 15.77s
  32. openshift_node_group : Wait for sync DS to set annotations on master nodes -------------------------------------------------------------------------------------------------------------------------- 11.70s
  33. openshift_manageiq : Configure role/user permissions ------------------------------------------------------------------------------------------------------------------------------------------------- 9.85s
  34. openshift_node : Install NFS storage plugin dependencies --------------------------------------------------------------------------------------------------------------------------------------------- 9.20s
  35. openshift_node : Install iSCSI storage plugin dependencies ------------------------------------------------------------------------------------------------------------------------------------------- 8.15s
  36. openshift_control_plane : Wait for APIs to become available ------------------------------------------------------------------------------------------------------------------------------------------ 7.52s
  37. openshift_node : Install dnsmasq --------------------------------------------------------------------------------------------------------------------------------------------------------------------- 5.84s
  38. openshift_excluder : Install openshift excluder - yum ------------------------------------------------------------------------------------------------------------------------------------------------ 5.27s
  39. openshift_excluder : Install docker excluder - yum --------------------------------------------------------------------------------------------------------------------------------------------------- 4.52s
  40. openshift_manageiq : Create Admin and Image Inspector Service Account -------------------------------------------------------------------------------------------------------------------------------- 3.50s
  41. openshift_ca : Create the master certificates if they do not already exist --------------------------------------------------------------------------------------------------------------------------- 3.42s
  42. openshift_cli : Install clients ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- 3.35s
  43.  
  44.  
  45. Failure summary:
  46.  
  47.  
  48.   1. Hosts:    odk.rm.ht
  49.      Play:     Approve any pending CSR requests from inventory nodes
  50.      Task:     Approve node certificates when bootstrapping
  51.      Message:  Could not find csr for nodes: odk-infra.rm.ht, odk-node2.rm.ht, odk-node1
  52. [root@odk openshift-ansible]# oc get csr
  53. NAME        AGE       REQUESTOR               CONDITION
  54. csr-7pk2m   27m       system:node:odk.rm.ht   Pending
  55. csr-dbph8   14m       system:node:odk.rm.ht   Pending
  56. csr-ff6g8   26m       system:node:odk.rm.ht   Pending
  57. csr-g676f   1m        system:node:odk.rm.ht   Pending
  58. csr-l78lx   30m       system:admin            Pending
  59. csr-zvxcl   30m       system:admin            Approved,Issued

Reply to "openshift"

Here you can reply to the paste above