This message was deleted.
# k3s
a
This message was deleted.
c
I am confused, what does the container runtime socket path have to do with the kubelet root dir?
the only thing that root-dir changes is where /var/lib/kubelet is at, that has nothing to do with containerd
l
sorry yes … of course … containerd data was “moved” via symbolic links from the default /run/k3s to our defined new folder on an LVM2.
not by specifying the root.dir
c
you might consider using bind mounts instead of symlinks. that tends to work better for things that want to monitor the original paths.
🙏 1
🤔 1
l
hmm check … okay interesting.
Had a check and found that yes indeed the CCm does several lookups for the node on the hci ( google compute engine ). That are unsuccessful - because the name of the node does match its vm name on the hci. However, downgrading to v4.14 of the ccm and at least it’s allowed to join as expected. Without me having to restart the k3s service multiple times quickly after each other 🤣 . Now I need to find a way to tell the ccm the VM name pattern to look after. And also see if upgrading to a version after v4.16 is better.
I finally found the smoking gun in the ccm logs. I created this issue in the kubernetes org. On the cloud-provider-gcp repo: https://github.com/kubernetes/cloud-provider-gcp/issues/791 All of this makes me think that’s going to be hard to use the with-node-id on the cloud. Am I correct in saying that this is a k3s specific feature @creamy-pencil-82913 ?
c
yes it absolutely is
👍 1
I would probably try to figure out why the node password secret isn’t getting cleaned up when the node is deleted.
🤔 1
l
It’s a cool feature though! I like the thinking. I just can’t find a way to tell the ccm to use another way of deriving what name to use to identify the vm on the underlying hci
Yeah … I have colleagues suggestion the same. Maybe I’m to stubborn here in trying to get the --with-node-id to work on GCP GCE
c
yeah I would probably try to address the root cause, instead of trying to get your workaround working
l
check.
I’m grateful for your help and pointers on this. And patience 😄
Helped a great deal.
Is it K3s itself that, before a node is removed ensures that the node-password.k3s secret is removed?
c
not before. When. When the node resource is deleted, it should trigger a delete of the node password secret
1