This message was deleted.
# rke2
a
This message was deleted.
s
Hey, we saw the same behavior as well, however the provisioning process in our case succeeds
e
What did you do? Just let it go for a while?
s
Yeah, provisioning in our environs takes about 10-12 minutes, but we see a lot of these error messages
e
Hmm, this has been going for about 2.5 hours and still same thing. 😞
s
Oh wow
h
what RKE2 version and OS ? Firewall settings ? From second node, can you reach 1st node on port 9345? what's in your config.yaml ?
sorry - if you have already worked thru all that - but those are some of the things I would look
e
I'll go through it all again if it means I can get this working. 🀣
πŸ‘ 1
🀞 1
Copy code
❯ kubectl --kubeconfig master1.yaml get node
NAME      STATUS   ROLES                       AGE    VERSION
master1   Ready    control-plane,etcd,master   3h4m   v1.28.10+rke2r1
OS: NixOS
Currently firewall is disabled
Copy code
$ cat /etc/rancher/rke2/config.yaml
disable-kube-proxy: true
h
also in your
config.yaml
your
token
matches on both nodes correct ?
e
Copy code
rke2 'server' '--token-file=/join.token' '--server=<https://10.22.30.11:6443|https://10.22.30.11:6443>' '--cni=cilium' '--disable-kube-proxy' '--cluster-cidr=10.24.0.0/16'
On the second machine
/join.token
is
/var/lib/rancher/rke2/server/node-token
from the first master
πŸ‘ 1
Copy code
$ curl <https://10.22.30.11:9345|https://10.22.30.11:9345>
curl: (35) OpenSSL/3.0.13: error:16000069:STORE routines::unregistered scheme
Wait, should
--server
be 6443 or 9345?
h
on all my RKE2 config.yaml I have 9345
v1.28.10
e
Then I bet that's it
πŸ™Œ 1
h
I believe k3s uses 6443 (but I maybe wrong)
e
I think you're right. I came from k3s and I'm pretty sure it was always 6443 there.
h
change config.yaml rke2-killall.sh systemctl start rke2-server (assuming NixOS uses systemd)
e
PROGRESS!
Copy code
Jun 21 23:58:41 master3 rke2[1014]: time="2024-06-21T23:58:41Z" level=fatal msg="starting kubernetes: preparing server: CA cert validation failed: Get \"<https://10.22.30.11:9345/cacerts>\": tls: failed to verify certificate: x509: certificate is valid for 10.22.20.11, 10.43.0.1, 127.0.0.1, ::1, not 10.22.30.11"
That's easy to fix
But that's for tomorrow, not tonight. Thanks though dude, you just solved my issue!
🎊 1
πŸŽ‰ 1
h
no problem - have a great weekend
e
Thanks! You too!
Copy code
❯ kubectl --kubeconfig master1.yaml get nodes
NAME      STATUS   ROLES                       AGE     VERSION
master1   Ready    control-plane,etcd,master   8m46s   v1.28.10+rke2r1
master2   Ready    control-plane,etcd,master   67s     v1.28.10+rke2r1
WOO! Thanks again @hundreds-evening-84071!!!
🎊 1
πŸŽ‰ 1
156 Views