handsome-salesclerk-54324
03/04/2023, 6:02 PMhelm install rancher rancher-latest/rancher --namespace cattle-system --set hostname=<http://k3s-rancher.homelab.int|k3s-rancher.homelab.int>
Error: INSTALLATION FAILED: chart requires kubeVersion: < 1.25.0-0 which is incompatible with Kubernetes v1.25.6+k3s1
What am I doing wrong? I had previously run:
kubectl create namespace cattle-system
namespace/cattle-system created
kubectl create namespace cert-manager
namespace/cert-manager created
kubectl apply --validate=false -f <https://github.com/jetstack/cert-manager/releases/download/v1.0.4/cert-manager.crds.yaml>
<http://customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io|customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io> created
<http://customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io|customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io> created
<http://customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io|customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io> created
<http://customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io|customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io> created
<http://customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io|customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io> created
<http://customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io|customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io> created
helm repo add rancher-latest <https://releases.rancher.com/server-charts/latest>
"rancher-latest" already exists with the same configuration, skipping
helm repo add jetstack <https://charts.jetstack.io>
"jetstack" has been added to your repositories
helm repo update
Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "jetstack" chart repository
...Successfully got an update from the "rancher-latest" chart repository
Update Complete. ⎈Happy Helming!⎈
helm install cert-manager jetstack/cert-manager --namespace cert-manager --version v1.0.4
NAME: cert-manager
LAST DEPLOYED: Sat Mar 4 09:55:31 2023
NAMESPACE: cert-manager
STATUS: deployed
REVISION: 1
TEST SUITE: None
NOTES:
cert-manager has been deployed successfully!
In order to begin issuing certificates, you will need to set up a ClusterIssuer
or Issuer resource (for example, by creating a 'letsencrypt-staging' issuer).
More information on the different types of issuers and how to configure them
can be found in our documentation:
<https://cert-manager.io/docs/configuration/>
For information on how to configure cert-manager to automatically provision
`Certificates for Ingress resources, take a look at the `ingress-shim``
documentation:
<https://cert-manager.io/docs/usage/ingress/>
rich-motorcycle-3313
03/06/2023, 6:49 PMpolite-piano-74233
03/08/2023, 10:44 PM➜ helm install rancher rancher-latest/rancher --namespace cattle-system --set hostname=rancher.whatever
Error: INSTALLATION FAILED: chart requires kubeVersion: < 1.25.0-0 which is incompatible with Kubernetes v1.25.6+k3s1
lively-lawyer-22526
03/09/2023, 10:29 AMquick-stone-68244
03/09/2023, 4:24 PMquaint-army-49808
03/10/2023, 4:42 PMdbus
error (no data available
iirc)
Is there a way for me to do this? Thanks!bright-fireman-42144
03/10/2023, 7:59 PMcreamy-pencil-82913
03/10/2023, 8:03 PMSince the latest stable of k3s in 1.22.3I’m not sure what you mean by that
bright-fireman-42144
03/10/2023, 8:03 PMcreamy-pencil-82913
03/10/2023, 8:04 PMbright-fireman-42144
03/10/2023, 8:05 PMcreamy-pencil-82913
03/10/2023, 8:05 PMcreamy-pencil-82913
03/10/2023, 8:05 PMINSTALL_K3S_VERSION=v1.22.17+k3s1
not INSTALL_K3S_VERSION=v1.22.17
bright-fireman-42144
03/10/2023, 8:06 PMcreamy-pencil-82913
03/10/2023, 8:06 PMbright-fireman-42144
03/10/2023, 8:07 PMbright-fireman-42144
03/10/2023, 8:09 PMcreamy-pencil-82913
03/10/2023, 8:13 PMhundreds-evening-84071
03/10/2023, 9:45 PMcurl -sfL <https://get.k3s.io> | INSTALL_K3S_CHANNEL=stable sh -
or should it be done in steps? 1.22 to 1.23 to 1.24 and so on?hundreds-evening-84071
03/10/2023, 9:45 PMcreamy-pencil-82913
03/10/2023, 9:57 PMhandsome-salesclerk-54324
03/11/2023, 7:56 PMW0311 11:54:32.405026 2510 sysinfo.go:203] Nodes topology is not available, providing CPU topology
Anyone know why?acceptable-leather-15942
03/11/2023, 10:35 PMTopology Aware Hints
works on k3s? I can’t seem to get this working. All my nodes have a different <http://topology.kubernetes.io/zone|topology.kubernetes.io/zone>
label. Adding the annotation <http://service.kubernetes.io/topology-aware-hints|service.kubernetes.io/topology-aware-hints>: auto
to my service should better route the traffic, but it doesn’t seem to have an effect.loud-apartment-45889
03/12/2023, 6:53 AMbroad-farmer-70498
03/13/2023, 6:55 PMwhite-garden-41931
03/14/2023, 12:29 AM2023/03/03 00:09:28 Starting NATS Server Reloader v0.7.4
Error: too many open files
Stream closed EOF for testkube/testkube-nats-0 (reloader)
which prevents one of my pods (testkube/testkube-nats-0) from starting.
and I'm not sure if that is specific to k3s or upstream Kubernetes.
Is this a known issue or should I investigate more deeply?straight-midnight-66298
03/14/2023, 11:42 AMlimited-needle-7506
03/14/2023, 9:33 PM/etc/rancher/k3s/
.
But say the dev machine running k3s is shared by users with different credentials, each with access to the registries.yaml file and /etc/rancher/k3s/
directory.
How would I prevent user x from accessing/viewing user y's credentials stored in registries.yaml while at the same time using user's x credentials to pull and push to the private registry?
Thanks in advance.adamant-pencil-35455
03/15/2023, 12:32 PMadamant-pencil-35455
03/15/2023, 12:33 PM