5.7.4 - etcd

I think it'd be handy showing in the lab how to create the etcd-cp that is used here, presuming it's a copy of etcd that has been created for debugging?
If I run the command as it is shown I get:Error from server (NotFound): pods "etcd-cp" not found
I'm pretty sure I've seen at some point how to do this, but I cannot remember it.
If I substitute for the etcd master I'm running, I get an error regarding the CA Cert:
kubectl -n kube-system exec -it etcd-k8smaster -- sh -c "ECTCDCTL_API=3 ETCDCTL_CACERT=/etc/kubernetes/pki/etcd/ca.crt ETCDCTL_CERT=/etc/kubernetes/pki/apiserver-etcd-client.crt ETCDCTL_KEY=/etc/kubernetes/pki/apiserver-etcd-client.key etcdctl --endpoints=https://127.0.0.1:2379 get /registry/secrets/default/first"
{"level":"warn","ts":"2021-10-15T06:26:54.179Z","caller":"clientv3/retry_interceptor.go:62","msg":"retrying of unary invoker failed","target":"endpoint://client-7bd8bf03-173b-48ff-9305-0a65281c1900/127.0.0.1:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: all SubConns are in TransientFailure, latest connection error: connection error: desc = \"transport: authentication handshake failed: x509: certificate signed by unknown authority\""} Error: context deadline exceeded command terminated with exit code 1
Comments
-
Hi @dnx,
The name of the etcd pod includes the hostname of the control-plane node
etcd-hostname
. In the example, the hostname iscp
.Regards,
-Chris0 -
Thanks Chris, I wondered that after I posted it,
cp
threw me off the track haha, guess that's named after youAny hint on the error I received?
0 -
Hi @dnx,
The error may be caused by unexpected key and cert files. Did you try running the command with the key and cert shown in the lab guide?
The multi-line command itself may not be parsed correctly by the command line client especially when copy/pasted from PDF; converting it into a single-line command may also help.
This is assuming that your etcd pod is named
etcd-k8smaster
wherek8smaster
is your control-plane node hostname and not just an alias.Regards,
-CP
0 -
Here is the output I based that on:
$ k get po --all-namespaces |grep etcd kube-system etcd-k8smaster 1/1 Running 0 2d11h $ sudo grep etcd /etc/kubernetes/manifests/kube-apiserver.yaml - --etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt - --etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt - --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key - --etcd-servers=https://127.0.0.1:2379
I did manage to get it working:
$ kubectl -n kube-system exec -it etcd-k8smaster -- sh -c "ECTCDCTL_API=3 ETCDCTL_CACERT=/etc/kubernetes/pki/etcd/ca.crt ETCDCTL_CERT=/etc/kubernetes/pki/etcd/server.crt ETCDCTL_KEY=/etc/kubernetes/pki/etcd/server.key etcdctl --endpoints=https://127.0.0.1:2379 get /registry/secrets/default/first" /registry/secrets/default/first k8s v1Secret firstdefault"*$c02f5f24-a877-4b6a-ab03-8d5ba8fc36de2ȶzb kubectl-createUpdatevȶFieldsV1:0 .{"f:data":{".":{},"f:somekey":{}},"f:type":{}} somekeyfindmeOpaque"
I got the cert details from the following. I'm not sure how
/etc/kubernetes/pki/apiserver-etcd-client.crt
becomes/etc/kubernetes/pki/etcd/server.crt
:$ k describe po etcd-k8smaster -n kube-system |grep pki --cert-file=/etc/kubernetes/pki/etcd/server.crt --key-file=/etc/kubernetes/pki/etcd/server.key --peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt --peer-key-file=/etc/kubernetes/pki/etcd/peer.key --peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt --trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt /etc/kubernetes/pki/etcd from etcd-certs (rw) Path: /etc/kubernetes/pki/etcd
2
Categories
- All Categories
- 158 LFX Mentorship
- 158 LFX Mentorship: Linux Kernel
- 847 Linux Foundation IT Professional Programs
- 390 Cloud Engineer IT Professional Program
- 185 Advanced Cloud Engineer IT Professional Program
- 87 DevOps Engineer IT Professional Program
- 154 Cloud Native Developer IT Professional Program
- 152 Express Training Courses & Microlearning
- 149 Express Courses - Discussion Forum
- 3 Microlearning - Discussion Forum
- 7.1K Training Courses
- 50 LFC110 Class Forum - Discontinued
- 74 LFC131 Class Forum
- 56 LFD102 Class Forum
- 254 LFD103 Class Forum
- 26 LFD110 Class Forum
- 50 LFD121 Class Forum
- 3 LFD123 Class Forum
- 1 LFD125 Class Forum
- 19 LFD133 Class Forum
- 10 LFD134 Class Forum
- 19 LFD137 Class Forum
- 1 LFD140 Class Forum
- 73 LFD201 Class Forum
- 8 LFD210 Class Forum
- 6 LFD210-CN Class Forum
- 2 LFD213 Class Forum - Discontinued
- LFD221 Class Forum
- 128 LFD232 Class Forum - Discontinued
- 3 LFD233 Class Forum
- 5 LFD237 Class Forum
- 25 LFD254 Class Forum
- 745 LFD259 Class Forum
- 111 LFD272 Class Forum - Discontinued
- 4 LFD272-JP クラス フォーラム - Discontinued
- 16 LFD273 Class Forum
- 435 LFS101 Class Forum
- 3 LFS111 Class Forum
- 4 LFS112 Class Forum
- 5 LFS116 Class Forum
- 9 LFS118 Class Forum
- 2 LFS120 Class Forum
- 11 LFS142 Class Forum
- 9 LFS144 Class Forum
- 6 LFS145 Class Forum
- 6 LFS146 Class Forum
- 7 LFS147 Class Forum
- 21 LFS148 Class Forum
- 17 LFS151 Class Forum
- 6 LFS157 Class Forum
- 89 LFS158 Class Forum
- 1 LFS158-JP クラス フォーラム
- 14 LFS162 Class Forum
- 2 LFS166 Class Forum - Discontinued
- 9 LFS167 Class Forum
- 4 LFS170 Class Forum
- 2 LFS171 Class Forum - Discontinued
- 4 LFS178 Class Forum - Discontinued
- 4 LFS180 Class Forum
- 3 LFS182 Class Forum
- 7 LFS183 Class Forum
- 2 LFS184 Class Forum
- 41 LFS200 Class Forum
- 737 LFS201 Class Forum - Discontinued
- 3 LFS201-JP クラス フォーラム - Discontinued
- 22 LFS203 Class Forum
- 141 LFS207 Class Forum
- 3 LFS207-DE-Klassenforum
- 3 LFS207-JP クラス フォーラム
- 302 LFS211 Class Forum - Discontinued
- 56 LFS216 Class Forum - Discontinued
- 60 LFS241 Class Forum
- 51 LFS242 Class Forum
- 39 LFS243 Class Forum
- 17 LFS244 Class Forum
- 8 LFS245 Class Forum
- 1 LFS246 Class Forum
- 1 LFS248 Class Forum
- 121 LFS250 Class Forum
- 3 LFS250-JP クラス フォーラム
- 2 LFS251 Class Forum
- 163 LFS253 Class Forum
- 1 LFS254 Class Forum - Discontinued
- 3 LFS255 Class Forum
- 15 LFS256 Class Forum
- 2 LFS257 Class Forum
- 1.4K LFS258 Class Forum
- 12 LFS258-JP クラス フォーラム
- 140 LFS260 Class Forum
- 165 LFS261 Class Forum
- 44 LFS262 Class Forum
- 82 LFS263 Class Forum - Discontinued
- 15 LFS264 Class Forum - Discontinued
- 11 LFS266 Class Forum - Discontinued
- 25 LFS267 Class Forum
- 27 LFS268 Class Forum
- 38 LFS269 Class Forum
- 11 LFS270 Class Forum
- 202 LFS272 Class Forum - Discontinued
- 2 LFS272-JP クラス フォーラム - Discontinued
- 2 LFS274 Class Forum - Discontinued
- 4 LFS281 Class Forum - Discontinued
- 30 LFW111 Class Forum
- 265 LFW211 Class Forum
- 190 LFW212 Class Forum
- 17 SKF100 Class Forum
- 2 SKF200 Class Forum
- 3 SKF201 Class Forum
- 800 Hardware
- 200 Drivers
- 68 I/O Devices
- 37 Monitors
- 104 Multimedia
- 175 Networking
- 92 Printers & Scanners
- 85 Storage
- 765 Linux Distributions
- 82 Debian
- 67 Fedora
- 20 Linux Mint
- 13 Mageia
- 23 openSUSE
- 149 Red Hat Enterprise
- 31 Slackware
- 13 SUSE Enterprise
- 356 Ubuntu
- 472 Linux System Administration
- 39 Cloud Computing
- 71 Command Line/Scripting
- Github systems admin projects
- 96 Linux Security
- 78 Network Management
- 102 System Management
- 48 Web Management
- 74 Mobile Computing
- 19 Android
- 42 Development
- 1.2K New to Linux
- 1K Getting Started with Linux
- 387 Off Topic
- 120 Introductions
- 178 Small Talk
- 28 Study Material
- 839 Programming and Development
- 311 Kernel Development
- 510 Software Development
- 1.8K Software
- 267 Applications
- 183 Command Line
- 5 Compiling/Installing
- 988 Games
- 318 Installation
- 108 All In Program
- 108 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)