the issue of "clusterctl init"

112 views
Skip to first unread message

Zhuang Jia

unread,
Mar 15, 2021, 7:41:47 AM3/15/21
to Metal3 Development List
Hi Feruzjon Muyassarov  :
I am newbie in Metal3.  I have passed 01_prepare_host.sh  and 02_configure_host.sh but failed in 03_launch_mgmt_cluster.sh with keeping print  "Creating Issuer="test-selfsigned"" and timeout.

I am running in CentOS7.9  and using  CAPM3_VERSION=v1alpha3, is the configuration still supported ?

====================================================
+ clusterctl init --core cluster-api:v0.3.14 --bootstrap kubeadm:v0.3.14 --control-plane kubeadm:v0.3.14 --infrastructure=metal3:v0.3.2 -v5
Using configuration File="/home/labuser/.cluster-api/clusterctl.yaml"
Installing the clusterctl inventory CRD
Creating CustomResourceDefinition="providers.clusterctl.cluster.x-k8s.io"
Fetching providers
Fetching File="core-components.yaml" Provider="cluster-api" Version="v0.3.14"
Fetching File="bootstrap-components.yaml" Provider="bootstrap-kubeadm" Version="v0.3.14"
Fetching File="control-plane-components.yaml" Provider="control-plane-kubeadm" Version="v0.3.14"
Using Override="infrastructure-components.yaml" Provider="infrastructure-metal3" Version="v0.3.2"
Fetching File="metadata.yaml" Provider="cluster-api" Version="v0.3.14"
Fetching File="metadata.yaml" Provider="bootstrap-kubeadm" Version="v0.3.14"
Fetching File="metadata.yaml" Provider="control-plane-kubeadm" Version="v0.3.14"
Using Override="metadata.yaml" Provider="infrastructure-metal3" Version="v0.3.2"
Creating Namespace="cert-manager-test"
Installing cert-manager Version="v0.16.1"
Creating Namespace="cert-manager"
Creating CustomResourceDefinition="certificaterequests.cert-manager.io"
Creating CustomResourceDefinition="certificates.cert-manager.io"
Creating CustomResourceDefinition="challenges.acme.cert-manager.io"
Creating CustomResourceDefinition="clusterissuers.cert-manager.io"
Creating CustomResourceDefinition="issuers.cert-manager.io"
Creating CustomResourceDefinition="orders.acme.cert-manager.io"
Creating ServiceAccount="cert-manager-cainjector" Namespace="cert-manager"
Creating ServiceAccount="cert-manager" Namespace="cert-manager"
Creating ServiceAccount="cert-manager-webhook" Namespace="cert-manager"
Creating ClusterRole="cert-manager-cainjector"
Creating ClusterRole="cert-manager-controller-issuers"
Creating ClusterRole="cert-manager-controller-clusterissuers"
Creating ClusterRole="cert-manager-controller-certificates"
Creating ClusterRole="cert-manager-controller-orders"
Creating ClusterRole="cert-manager-controller-challenges"
Creating ClusterRole="cert-manager-controller-ingress-shim"
Creating ClusterRole="cert-manager-view"
Creating ClusterRole="cert-manager-edit"
Creating ClusterRoleBinding="cert-manager-cainjector"
Creating ClusterRoleBinding="cert-manager-controller-issuers"
Creating ClusterRoleBinding="cert-manager-controller-clusterissuers"
Creating ClusterRoleBinding="cert-manager-controller-certificates"
Creating ClusterRoleBinding="cert-manager-controller-orders"
Creating ClusterRoleBinding="cert-manager-controller-challenges"
Creating ClusterRoleBinding="cert-manager-controller-ingress-shim"
Creating Role="cert-manager-cainjector:leaderelection" Namespace="kube-system"
Creating Role="cert-manager:leaderelection" Namespace="kube-system"
Creating Role="cert-manager-webhook:dynamic-serving" Namespace="cert-manager"
Creating RoleBinding="cert-manager-cainjector:leaderelection" Namespace="kube-system"
Creating RoleBinding="cert-manager:leaderelection" Namespace="kube-system"
Creating RoleBinding="cert-manager-webhook:dynamic-serving" Namespace="cert-manager"
Creating Service="cert-manager" Namespace="cert-manager"
Creating Service="cert-manager-webhook" Namespace="cert-manager"
Creating Deployment="cert-manager-cainjector" Namespace="cert-manager"
Creating Deployment="cert-manager" Namespace="cert-manager"
Creating Deployment="cert-manager-webhook" Namespace="cert-manager"
Creating MutatingWebhookConfiguration="cert-manager-webhook"
Creating ValidatingWebhookConfiguration="cert-manager-webhook"
Waiting for cert-manager to be available...
Updating Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
Creating Issuer="test-selfsigned" Namespace="cert-manager-test"
03_launch_mgmt_cluster_fail.txt

feruzjon....@est.tech

unread,
Mar 19, 2021, 5:38:13 PM3/19/21
to Metal3 Development List

Hi,

Sorry for late reply. CAPM3_VERSION=v1alpha3 is still supported. But it
is has been a while that we stopped testing Metal3-dev-env on Centos7
and we actually removed Centos7 related scripts. Currently all our CI jobs
are running on Centos8 and Ubuntu20.04. There might be some other
issues related to cert-manager in your environment. You will need to check
the logs of the cert-manager pod.
Also, I think it would be easier to discuss and solve the issue on slack.
Because ML is not the fastest way of communication at least for me.

Best regards,
Feruzjon Muyassarov
Reply all
Reply to author
Forward
0 new messages