able-intern-92883
03/12/2025, 8:47 PM/var/lib/rancher/k3s/server/node-token
file, believing that it was not needed. Indeed, this page has a note saying "Previously, K3s did not enforce the use of a token when using external SQL datastores." But that seems to have changed somewhere along the way.
What I'm wondering now is, is there any way to bring up a new replacement k3s node in this single-node cluster without having a token?able-intern-92883
03/12/2025, 8:49 PMable-intern-92883
03/12/2025, 8:51 PMcreamy-pencil-82913
03/12/2025, 8:53 PMWARNING
In addition to backing up the datastore itself, you must also back up the server token file at. You must restore this file, or pass its value into the/var/lib/rancher/k3s/server/token
option, when restoring from backup. If you do not use the same token value when restoring, the snapshot will be unusable, as the token is used to encrypt confidential data within the datastore itself.--token
creamy-pencil-82913
03/12/2025, 8:54 PMable-intern-92883
03/12/2025, 8:55 PMable-intern-92883
03/12/2025, 8:56 PMable-intern-92883
03/12/2025, 8:56 PMcreamy-pencil-82913
03/12/2025, 8:57 PMable-intern-92883
03/12/2025, 8:57 PMable-intern-92883
03/12/2025, 8:57 PMable-intern-92883
03/12/2025, 8:58 PMcreamy-pencil-82913
03/12/2025, 8:59 PMable-intern-92883
03/12/2025, 8:59 PMable-intern-92883
03/12/2025, 8:59 PMcreamy-pencil-82913
03/12/2025, 8:59 PMable-intern-92883
03/12/2025, 8:59 PMcreamy-pencil-82913
03/12/2025, 9:00 PMable-intern-92883
03/12/2025, 9:01 PMcreamy-pencil-82913
03/12/2025, 9:02 PM/bootstrap/
- it’ll create new cluster CAs and then create a new bootstrap key. Do take a new backup before doing that, and make sure k3s isn’t running at the time.creamy-pencil-82913
03/12/2025, 9:03 PMable-intern-92883
03/12/2025, 9:03 PMable-intern-92883
03/12/2025, 9:03 PMable-intern-92883
03/12/2025, 9:04 PMcreamy-pencil-82913
03/12/2025, 9:04 PMcreamy-pencil-82913
03/12/2025, 9:04 PMable-intern-92883
03/12/2025, 9:05 PMable-intern-92883
03/13/2025, 1:20 AM