Lab 3.2, step 13. Set up on 2 vm on aws
Hello,
I have 2 vm set up on aws, t2. large (2 cores 8 gb of memory each)
I have also read the problems another user exposed on this forum in this question.
Everything went well on Lab 3.1.
I have followed instructions for Lab 3.2, I have even doubled checked that the hostname-i from the CP node is saved on the file /etc/hosts for both instances (CP and Worker).
The problem is on the step 13 from Lab 2. Perhaps I am doing something wrong here, what I do is to copy the output of the command sudo kubeadm create --print-join-command
executed on the CP node to the Worker node via CLI. Note: output from command executed on CP includes the private IP of the CP node.
However, when looking at the instructions from Lab2, while the sha256 pasted on the CLI of the worker node matches the one form the CP node, the token does not match. That is why I wonder if I could be doing something wrong here.
[SCREENSHOTS OF THE COURSE MATERIALS REMOVED BY THE FORUM ADMINISTRATOR]
Here is the output I get when attempting step 113 on the worker noe (image provides 2 trials, with and without --node-name=worker)
I have also checked NACL and SG of both instances and they are correct.
Finally, I have entered the commands sudo kubeadm reset
and sudo kubeadm init
before attempting to reproduce step 13 of lab 3.2
I have also checked that the kubelet and containerd are running with commands belowsudo systemctl status kubelet
sudo systemctl status containerd
Unfortunately, the output was the same.
I would appreciate if someone could shed some light on this.
Thanks in advance for your help.
Josep Maria
Answers
-
on the /etc/hosts I have also added the address of the worker node, just below the one from the cp node, as worker
xx.xx.xx.xx k8cp
xx.xx.xx.xx worker
127.0.0.1 localhostthen the outcome is still not satisfactory
0 -
Hi @josepmaria,
One of the benefits of EC2 host naming convention is that an instance's hostname is derived from the private IP address of the instance. This is helpful in scenarios when other commands such as
hostname -i
orip a
do not work.When working with AWS SG it is important to ensure both EC2 instances are in the same SG, and that they are not provisioned in their own dedicated SGs. The order they are provisioned is unimportant. It is essential, however, that the SG protecting your VMs allows all ingress traffic from all sources, all protocols, to all port destinations.
Populating the hosts files on both VMs with k8scp, cp, and worker entries and their associated private IP addresses is indeed a wise choice.
Make sure that the
--node-name=cp
option is appended to the fullkubeadm init
command as it is presented in the lab guide, and that--node-name=worker
option is appended to thekubeadm join
command.And last, but not least, please refrain from sharing copyrighted course content (lecture content or lab content) screenshots in this public forum.
Regards,
-Chris1 -
Hi @chrispokorni ,
Thank you very much for your detailed explanation, I appreciate it.
I learn a lot from your courses and explanations.
I shall follow your advise and let you know the outcome.
As for the screenshots from the Labs shared, I sincerely apologize. There was no intention to violate any copyright rules. I shall request forum moderators to allow me to modify this post, so that question can be reformulated by removing the screenshots.
Sincerely,
Josep Maria
0 -
Hi @chrispokorni ,
I have followed your instructions and set up the ec2 nodes again. Both are on the default VPC, and share the same security group (default security node created for the CP was used when creating the ec2 for the worker node)
I have verified that the configuration is correct.
Unfortunately, when entering the output of the command sudo
kubeadm token create --print-join-command
(from the CP node) on the Worker node (having added--node-name=worker
), I keep getting the same output:I would appreciate if you could give me another advise.
Thank you,
Sincerely,
Josep Maria
Ps: upon my request, forum moderators deleted copyrighted content from the former post on this conversation. I apologize again for the inconvenience.0 -
Hi @chrispokorni ,
Thanks for your patience, I finally found the solution.
I added another inbound rule custom tcp pot 6443 on the SG and it worked.
0 -
Hi @josepmaria,
The default SG of a VPC typically blocks many protocols and many ports that are required by Kubernetes and its plugins. You can add individual rules to the SG as you make progress through the lab exercises, or you can follow the instructions from the AWS video guide from the introductory chapter for a quicker way to enable all traffic to the EC2 VMs.
Regards,
-Chris1 -
Hi @chrispokorni ,
Thanks for your message. I appreciate your time and information provided.
Sincerely,
Josep Maria
0
Categories
- All Categories
- 167 LFX Mentorship
- 219 LFX Mentorship: Linux Kernel
- 801 Linux Foundation IT Professional Programs
- 358 Cloud Engineer IT Professional Program
- 180 Advanced Cloud Engineer IT Professional Program
- 83 DevOps Engineer IT Professional Program
- 149 Cloud Native Developer IT Professional Program
- 112 Express Training Courses
- 138 Express Courses - Discussion Forum
- 6.2K Training Courses
- 48 LFC110 Class Forum - Discontinued
- 17 LFC131 Class Forum
- 42 LFD102 Class Forum
- 227 LFD103 Class Forum
- 19 LFD110 Class Forum
- 39 LFD121 Class Forum
- 15 LFD133 Class Forum
- 7 LFD134 Class Forum
- 17 LFD137 Class Forum
- 63 LFD201 Class Forum
- 3 LFD210 Class Forum
- 5 LFD210-CN Class Forum
- 2 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum - Discontinued
- 1 LFD233 Class Forum
- 2 LFD237 Class Forum
- 23 LFD254 Class Forum
- 697 LFD259 Class Forum
- 109 LFD272 Class Forum
- 3 LFD272-JP クラス フォーラム
- 10 LFD273 Class Forum
- 154 LFS101 Class Forum
- 1 LFS111 Class Forum
- 1 LFS112 Class Forum
- 1 LFS116 Class Forum
- 1 LFS118 Class Forum
- LFS120 Class Forum
- 7 LFS142 Class Forum
- 7 LFS144 Class Forum
- 3 LFS145 Class Forum
- 1 LFS146 Class Forum
- 3 LFS147 Class Forum
- 1 LFS148 Class Forum
- 15 LFS151 Class Forum
- 1 LFS157 Class Forum
- 34 LFS158 Class Forum
- 8 LFS162 Class Forum
- 1 LFS166 Class Forum
- 1 LFS167 Class Forum
- 3 LFS170 Class Forum
- 2 LFS171 Class Forum
- 1 LFS178 Class Forum
- 1 LFS180 Class Forum
- 1 LFS182 Class Forum
- 1 LFS183 Class Forum
- 29 LFS200 Class Forum
- 736 LFS201 Class Forum - Discontinued
- 2 LFS201-JP クラス フォーラム
- 14 LFS203 Class Forum
- 135 LFS207 Class Forum
- 1 LFS207-DE-Klassenforum
- 1 LFS207-JP クラス フォーラム
- 301 LFS211 Class Forum
- 55 LFS216 Class Forum
- 48 LFS241 Class Forum
- 48 LFS242 Class Forum
- 37 LFS243 Class Forum
- 15 LFS244 Class Forum
- LFS245 Class Forum
- LFS246 Class Forum
- 50 LFS250 Class Forum
- 1 LFS250-JP クラス フォーラム
- LFS251 Class Forum
- 155 LFS253 Class Forum
- LFS254 Class Forum
- LFS255 Class Forum
- 5 LFS256 Class Forum
- 1 LFS257 Class Forum
- 1.3K LFS258 Class Forum
- 10 LFS258-JP クラス フォーラム
- 122 LFS260 Class Forum
- 159 LFS261 Class Forum
- 42 LFS262 Class Forum
- 82 LFS263 Class Forum - Discontinued
- 15 LFS264 Class Forum - Discontinued
- 11 LFS266 Class Forum - Discontinued
- 20 LFS267 Class Forum
- 25 LFS268 Class Forum
- 31 LFS269 Class Forum
- 3 LFS270 Class Forum
- 199 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- LFS274 Class Forum
- 3 LFS281 Class Forum
- 10 LFW111 Class Forum
- 261 LFW211 Class Forum
- 182 LFW212 Class Forum
- 15 SKF100 Class Forum
- 1 SKF200 Class Forum
- 1 SKF201 Class Forum
- 782 Hardware
- 198 Drivers
- 68 I/O Devices
- 37 Monitors
- 96 Multimedia
- 174 Networking
- 91 Printers & Scanners
- 83 Storage
- 758 Linux Distributions
- 80 Debian
- 67 Fedora
- 15 Linux Mint
- 13 Mageia
- 23 openSUSE
- 143 Red Hat Enterprise
- 31 Slackware
- 13 SUSE Enterprise
- 348 Ubuntu
- 461 Linux System Administration
- 39 Cloud Computing
- 70 Command Line/Scripting
- Github systems admin projects
- 90 Linux Security
- 77 Network Management
- 101 System Management
- 46 Web Management
- 64 Mobile Computing
- 17 Android
- 34 Development
- 1.2K New to Linux
- 1K Getting Started with Linux
- 371 Off Topic
- 114 Introductions
- 174 Small Talk
- 19 Study Material
- 806 Programming and Development
- 304 Kernel Development
- 204 Software Development
- 1.8K Software
- 263 Applications
- 180 Command Line
- 3 Compiling/Installing
- 405 Games
- 309 Installation
- 97 All In Program
- 97 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)