• kubeadm k8s初始化日志


    [root@k8s-master01 ~]# kubeadm init \
    > --kubernetes-version=v1.23.5 \
    > --pod-network-cidr=10.244.0.0/16 \
    > --service-cidr=10.96.0.0/12 \
    > --apiserver-advertise-address=172.16.59.30 \
    > --ignore-preflight-errors=all --v=6 \
    > --image-repository registry.aliyuncs.com/google_containers 
    I0402 22:05:49.970048   66995 initconfiguration.go:117] detected and using CRI socket: /var/run/dockershim.sock
    I0402 22:05:49.970216   66995 kubelet.go:217] the value of KubeletConfiguration.cgroupDriver is empty; setting it to "systemd"
    [init] Using Kubernetes version: v1.23.5
    [preflight] Running pre-flight checks
    I0402 22:05:49.977080   66995 checks.go:578] validating Kubernetes and kubeadm version
    I0402 22:05:49.977131   66995 checks.go:171] validating if the firewall is enabled and active
    I0402 22:05:49.991583   66995 checks.go:206] validating availability of port 6443
    I0402 22:05:49.992050   66995 checks.go:206] validating availability of port 10259
    I0402 22:05:49.992090   66995 checks.go:206] validating availability of port 10257
    I0402 22:05:49.992134   66995 checks.go:283] validating the existence of file /etc/kubernetes/manifests/kube-apiserver.yaml
    I0402 22:05:49.992154   66995 checks.go:283] validating the existence of file /etc/kubernetes/manifests/kube-controller-manager.yaml
    I0402 22:05:49.992178   66995 checks.go:283] validating the existence of file /etc/kubernetes/manifests/kube-scheduler.yaml
    I0402 22:05:49.992193   66995 checks.go:283] validating the existence of file /etc/kubernetes/manifests/etcd.yaml
    I0402 22:05:49.992226   66995 checks.go:433] validating if the connectivity type is via proxy or direct
    I0402 22:05:49.992265   66995 checks.go:472] validating http connectivity to first IP address in the CIDR
    I0402 22:05:49.992311   66995 checks.go:472] validating http connectivity to first IP address in the CIDR
    I0402 22:05:49.992342   66995 checks.go:107] validating the container runtime
    I0402 22:05:50.134776   66995 checks.go:133] validating if the "docker" service is enabled and active
    I0402 22:05:50.152882   66995 checks.go:332] validating the contents of file /proc/sys/net/bridge/bridge-nf-call-iptables
    I0402 22:05:50.152956   66995 checks.go:332] validating the contents of file /proc/sys/net/ipv4/ip_forward
    I0402 22:05:50.153025   66995 checks.go:654] validating whether swap is enabled or not
    I0402 22:05:50.153233   66995 checks.go:373] validating the presence of executable conntrack
    I0402 22:05:50.153577   66995 checks.go:373] validating the presence of executable ip
    I0402 22:05:50.153774   66995 checks.go:373] validating the presence of executable iptables
    I0402 22:05:50.153799   66995 checks.go:373] validating the presence of executable mount
    I0402 22:05:50.153975   66995 checks.go:373] validating the presence of executable nsenter
    I0402 22:05:50.154010   66995 checks.go:373] validating the presence of executable ebtables
    I0402 22:05:50.154045   66995 checks.go:373] validating the presence of executable ethtool
    I0402 22:05:50.154069   66995 checks.go:373] validating the presence of executable socat
    I0402 22:05:50.154110   66995 checks.go:373] validating the presence of executable tc
    I0402 22:05:50.154136   66995 checks.go:373] validating the presence of executable touch
    I0402 22:05:50.154171   66995 checks.go:521] running all checks
    I0402 22:05:50.270734   66995 checks.go:404] checking whether the given node name is valid and reachable using net.LookupHost
    I0402 22:05:50.271149   66995 checks.go:620] validating kubelet version
    I0402 22:05:50.331288   66995 checks.go:133] validating if the "kubelet" service is enabled and active
    I0402 22:05:50.340398   66995 checks.go:206] validating availability of port 10250
    I0402 22:05:50.340668   66995 checks.go:206] validating availability of port 2379
    I0402 22:05:50.340707   66995 checks.go:206] validating availability of port 2380
    I0402 22:05:50.340751   66995 checks.go:246] validating the existence and emptiness of directory /var/lib/etcd
    [preflight] Pulling images required for setting up a Kubernetes cluster
    [preflight] This might take a minute or two, depending on the speed of your internet connection
    [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'
    I0402 22:05:50.340880   66995 checks.go:842] using image pull policy: IfNotPresent
    I0402 22:05:50.376610   66995 checks.go:851] image exists: registry.aliyuncs.com/google_containers/kube-apiserver:v1.23.5
    I0402 22:05:50.410854   66995 checks.go:851] image exists: registry.aliyuncs.com/google_containers/kube-controller-manager:v1.23.5
    I0402 22:05:50.445480   66995 checks.go:851] image exists: registry.aliyuncs.com/google_containers/kube-scheduler:v1.23.5
    I0402 22:05:50.479812   66995 checks.go:851] image exists: registry.aliyuncs.com/google_containers/kube-proxy:v1.23.5
    I0402 22:05:50.510706   66995 checks.go:851] image exists: registry.aliyuncs.com/google_containers/pause:3.6
    I0402 22:05:50.544083   66995 checks.go:851] image exists: registry.aliyuncs.com/google_containers/etcd:3.5.1-0
    I0402 22:05:50.578454   66995 checks.go:851] image exists: registry.aliyuncs.com/google_containers/coredns:v1.8.6
    [certs] Using certificateDir folder "/etc/kubernetes/pki"
    I0402 22:05:50.578663   66995 certs.go:112] creating a new certificate authority for ca
    [certs] Generating "ca" certificate and key
    I0402 22:05:50.728414   66995 certs.go:522] validating certificate period for ca certificate
    [certs] Generating "apiserver" certificate and key
    [certs] apiserver serving cert is signed for DNS names [k8s-master01 kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local] and IPs [10.96.0.1 172.16.59.30]
    [certs] Generating "apiserver-kubelet-client" certificate and key
    I0402 22:05:50.988819   66995 certs.go:112] creating a new certificate authority for front-proxy-ca
    [certs] Generating "front-proxy-ca" certificate and key
    I0402 22:05:51.112625   66995 certs.go:522] validating certificate period for front-proxy-ca certificate
    [certs] Generating "front-proxy-client" certificate and key
    I0402 22:05:51.270485   66995 certs.go:112] creating a new certificate authority for etcd-ca
    [certs] Generating "etcd/ca" certificate and key
    I0402 22:05:51.367285   66995 certs.go:522] validating certificate period for etcd/ca certificate
    [certs] Generating "etcd/server" certificate and key
    [certs] etcd/server serving cert is signed for DNS names [k8s-master01 localhost] and IPs [172.16.59.30 127.0.0.1 ::1]
    [certs] Generating "etcd/peer" certificate and key
    [certs] etcd/peer serving cert is signed for DNS names [k8s-master01 localhost] and IPs [172.16.59.30 127.0.0.1 ::1]
    [certs] Generating "etcd/healthcheck-client" certificate and key
    [certs] Generating "apiserver-etcd-client" certificate and key
    I0402 22:05:51.966379   66995 certs.go:78] creating new public/private key files for signing service account users
    [certs] Generating "sa" key and public key
    [kubeconfig] Using kubeconfig folder "/etc/kubernetes"
    I0402 22:05:52.122244   66995 kubeconfig.go:103] creating kubeconfig file for admin.conf
    [kubeconfig] Writing "admin.conf" kubeconfig file
    I0402 22:05:52.298443   66995 kubeconfig.go:103] creating kubeconfig file for kubelet.conf
    [kubeconfig] Writing "kubelet.conf" kubeconfig file
    I0402 22:05:52.402190   66995 kubeconfig.go:103] creating kubeconfig file for controller-manager.conf
    [kubeconfig] Writing "controller-manager.conf" kubeconfig file
    I0402 22:05:52.477380   66995 kubeconfig.go:103] creating kubeconfig file for scheduler.conf
    [kubeconfig] Writing "scheduler.conf" kubeconfig file
    I0402 22:05:52.618765   66995 kubelet.go:65] Stopping the kubelet
    [kubelet-start] Writing kubelet environment file with flags to file "/var/lib/kubelet/kubeadm-flags.env"
    [kubelet-start] Writing kubelet configuration to file "/var/lib/kubelet/config.yaml"
    [kubelet-start] Starting the kubelet
    [control-plane] Using manifest folder "/etc/kubernetes/manifests"
    [control-plane] Creating static Pod manifest for "kube-apiserver"
    I0402 22:05:52.792238   66995 manifests.go:99] [control-plane] getting StaticPodSpecs
    I0402 22:05:52.792950   66995 certs.go:522] validating certificate period for CA certificate
    I0402 22:05:52.793033   66995 manifests.go:125] [control-plane] adding volume "ca-certs" for component "kube-apiserver"
    I0402 22:05:52.793050   66995 manifests.go:125] [control-plane] adding volume "etc-pki" for component "kube-apiserver"
    I0402 22:05:52.793072   66995 manifests.go:125] [control-plane] adding volume "k8s-certs" for component "kube-apiserver"
    I0402 22:05:52.796053   66995 manifests.go:154] [control-plane] wrote static Pod manifest for component "kube-apiserver" to "/etc/kubernetes/manifests/kube-apiserver.yaml"
    [control-plane] Creating static Pod manifest for "kube-controller-manager"
    I0402 22:05:52.796091   66995 manifests.go:99] [control-plane] getting StaticPodSpecs
    I0402 22:05:52.796587   66995 manifests.go:125] [control-plane] adding volume "ca-certs" for component "kube-controller-manager"
    I0402 22:05:52.796607   66995 manifests.go:125] [control-plane] adding volume "etc-pki" for component "kube-controller-manager"
    I0402 22:05:52.796630   66995 manifests.go:125] [control-plane] adding volume "flexvolume-dir" for component "kube-controller-manager"
    I0402 22:05:52.796646   66995 manifests.go:125] [control-plane] adding volume "k8s-certs" for component "kube-controller-manager"
    I0402 22:05:52.796661   66995 manifests.go:125] [control-plane] adding volume "kubeconfig" for component "kube-controller-manager"
    I0402 22:05:52.797942   66995 manifests.go:154] [control-plane] wrote static Pod manifest for component "kube-controller-manager" to "/etc/kubernetes/manifests/kube-controller-manager.yaml"
    [control-plane] Creating static Pod manifest for "kube-scheduler"
    I0402 22:05:52.797966   66995 manifests.go:99] [control-plane] getting StaticPodSpecs
    I0402 22:05:52.798300   66995 manifests.go:125] [control-plane] adding volume "kubeconfig" for component "kube-scheduler"
    I0402 22:05:52.801007   66995 manifests.go:154] [control-plane] wrote static Pod manifest for component "kube-scheduler" to "/etc/kubernetes/manifests/kube-scheduler.yaml"
    [etcd] Creating static Pod manifest for local etcd in "/etc/kubernetes/manifests"
    I0402 22:05:52.801957   66995 local.go:65] [etcd] wrote Static Pod manifest for a local etcd member to "/etc/kubernetes/manifests/etcd.yaml"
    I0402 22:05:52.801997   66995 waitcontrolplane.go:91] [wait-control-plane] Waiting for the API server to be healthy
    I0402 22:05:52.802448   66995 loader.go:372] Config loaded from file:  /etc/kubernetes/admin.conf
    [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory "/etc/kubernetes/manifests". This can take up to 4m0s
    I0402 22:05:52.804493   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s  in 0 milliseconds
    I0402 22:05:53.309004   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s  in 0 milliseconds
    I0402 22:05:53.805335   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s  in 0 milliseconds
    I0402 22:05:54.305892   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s  in 0 milliseconds
    I0402 22:05:54.806035   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s  in 0 milliseconds
    I0402 22:05:55.315644   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s  in 4 milliseconds
    I0402 22:05:58.183931   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s 500 Internal Server Error in 2376 milliseconds
    I0402 22:05:58.310356   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s 500 Internal Server Error in 4 milliseconds
    I0402 22:05:58.808281   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s 500 Internal Server Error in 2 milliseconds
    I0402 22:05:59.312517   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s 500 Internal Server Error in 7 milliseconds
    I0402 22:05:59.811630   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s 500 Internal Server Error in 5 milliseconds
    I0402 22:06:00.310583   66995 round_trippers.go:553] GET https://172.16.59.30:6443/healthz?timeout=10s 200 OK in 5 milliseconds
    [apiclient] All control plane components are healthy after 7.507625 seconds
    I0402 22:06:00.310709   66995 uploadconfig.go:110] [upload-config] Uploading the kubeadm ClusterConfiguration to a ConfigMap
    [upload-config] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace
    I0402 22:06:00.317018   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-system/configmaps?timeout=10s 201 Created in 5 milliseconds
    I0402 22:06:00.322379   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/roles?timeout=10s 201 Created in 4 milliseconds
    I0402 22:06:00.327180   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings?timeout=10s 201 Created in 4 milliseconds
    I0402 22:06:00.327335   66995 uploadconfig.go:124] [upload-config] Uploading the kubelet component config to a ConfigMap
    [kubelet] Creating a ConfigMap "kubelet-config-1.23" in namespace kube-system with the configuration for the kubelets in the cluster
    NOTE: The "kubelet-config-1.23" naming of the kubelet ConfigMap is deprecated. Once the UnversionedKubeletConfigMap feature gate graduates to Beta the default name will become just "kubelet-config". Kubeadm upgrade will handle this transition transparently.
    I0402 22:06:00.332897   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-system/configmaps?timeout=10s 201 Created in 5 milliseconds
    I0402 22:06:00.337640   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/roles?timeout=10s 201 Created in 4 milliseconds
    I0402 22:06:00.342656   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings?timeout=10s 201 Created in 4 milliseconds
    I0402 22:06:00.342771   66995 uploadconfig.go:129] [upload-config] Preserving the CRISocket information for the control-plane node
    I0402 22:06:00.342799   66995 patchnode.go:31] [patchnode] Uploading the CRI Socket information "/var/run/dockershim.sock" to the Node API object "k8s-master01" as an annotation
    I0402 22:06:00.848145   66995 round_trippers.go:553] GET https://172.16.59.30:6443/api/v1/nodes/k8s-master01?timeout=10s 200 OK in 4 milliseconds
    I0402 22:06:00.855797   66995 round_trippers.go:553] PATCH https://172.16.59.30:6443/api/v1/nodes/k8s-master01?timeout=10s 200 OK in 6 milliseconds
    [upload-certs] Skipping phase. Please see --upload-certs
    [mark-control-plane] Marking the node k8s-master01 as control-plane by adding the labels: [node-role.kubernetes.io/master(deprecated) node-role.kubernetes.io/control-plane node.kubernetes.io/exclude-from-external-load-balancers]
    [mark-control-plane] Marking the node k8s-master01 as control-plane by adding the taints [node-role.kubernetes.io/master:NoSchedule]
    I0402 22:06:01.366567   66995 round_trippers.go:553] GET https://172.16.59.30:6443/api/v1/nodes/k8s-master01?timeout=10s 200 OK in 9 milliseconds
    I0402 22:06:01.373530   66995 round_trippers.go:553] PATCH https://172.16.59.30:6443/api/v1/nodes/k8s-master01?timeout=10s 200 OK in 5 milliseconds
    [bootstrap-token] Using token: yup5oo.s5ui8hfrrcm5jf2j
    [bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles
    I0402 22:06:01.376910   66995 round_trippers.go:553] GET https://172.16.59.30:6443/api/v1/namespaces/kube-system/secrets/bootstrap-token-yup5oo?timeout=10s 404 Not Found in 2 milliseconds
    I0402 22:06:01.382097   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-system/secrets?timeout=10s 201 Created in 4 milliseconds
    [bootstrap-token] configured RBAC rules to allow Node Bootstrap tokens to get nodes
    I0402 22:06:01.386375   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/clusterroles?timeout=10s 201 Created in 3 milliseconds
    I0402 22:06:01.391869   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 5 milliseconds
    [bootstrap-token] configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials
    I0402 22:06:01.396932   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 4 milliseconds
    [bootstrap-token] configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token
    I0402 22:06:01.403483   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 6 milliseconds
    [bootstrap-token] configured RBAC rules to allow certificate rotation for all node client certificates in the cluster
    I0402 22:06:01.408355   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 4 milliseconds
    [bootstrap-token] Creating the "cluster-info" ConfigMap in the "kube-public" namespace
    I0402 22:06:01.408626   66995 clusterinfo.go:47] [bootstrap-token] loading admin kubeconfig
    I0402 22:06:01.409007   66995 loader.go:372] Config loaded from file:  /etc/kubernetes/admin.conf
    I0402 22:06:01.409027   66995 clusterinfo.go:58] [bootstrap-token] copying the cluster from admin.conf to the bootstrap kubeconfig
    I0402 22:06:01.409264   66995 clusterinfo.go:70] [bootstrap-token] creating/updating ConfigMap in kube-public namespace
    I0402 22:06:01.418358   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-public/configmaps?timeout=10s 201 Created in 8 milliseconds
    I0402 22:06:01.418583   66995 clusterinfo.go:84] creating the RBAC rules for exposing the cluster-info ConfigMap in the kube-public namespace
    I0402 22:06:01.426075   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-public/roles?timeout=10s 201 Created in 7 milliseconds
    I0402 22:06:01.433054   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-public/rolebindings?timeout=10s 201 Created in 6 milliseconds
    I0402 22:06:01.433753   66995 kubeletfinalize.go:90] [kubelet-finalize] Assuming that kubelet client certificate rotation is enabled: found "/var/lib/kubelet/pki/kubelet-client-current.pem"
    [kubelet-finalize] Updating "/etc/kubernetes/kubelet.conf" to point to a rotatable kubelet client certificate and key
    I0402 22:06:01.434276   66995 loader.go:372] Config loaded from file:  /etc/kubernetes/kubelet.conf
    I0402 22:06:01.434896   66995 kubeletfinalize.go:134] [kubelet-finalize] Restarting the kubelet to enable client certificate rotation
    I0402 22:06:01.674300   66995 round_trippers.go:553] GET https://172.16.59.30:6443/apis/apps/v1/namespaces/kube-system/deployments?labelSelector=k8s-app%3Dkube-dns 200 OK in 14 milliseconds
    I0402 22:06:01.708799   66995 round_trippers.go:553] GET https://172.16.59.30:6443/api/v1/namespaces/kube-system/configmaps/coredns?timeout=10s 404 Not Found in 23 milliseconds
    I0402 22:06:01.722507   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-system/configmaps?timeout=10s 201 Created in 13 milliseconds
    I0402 22:06:01.739766   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/clusterroles?timeout=10s 201 Created in 16 milliseconds
    I0402 22:06:01.757515   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 14 milliseconds
    I0402 22:06:01.793644   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-system/serviceaccounts?timeout=10s 201 Created in 35 milliseconds
    I0402 22:06:01.811903   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/apps/v1/namespaces/kube-system/deployments?timeout=10s 201 Created in 17 milliseconds
    I0402 22:06:01.830976   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-system/services?timeout=10s 201 Created in 18 milliseconds
    [addons] Applied essential addon: CoreDNS
    I0402 22:06:01.839757   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-system/serviceaccounts?timeout=10s 201 Created in 8 milliseconds
    I0402 22:06:01.859085   66995 round_trippers.go:553] POST https://172.16.59.30:6443/api/v1/namespaces/kube-system/configmaps?timeout=10s 201 Created in 18 milliseconds
    I0402 22:06:01.867811   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/apps/v1/namespaces/kube-system/daemonsets?timeout=10s 201 Created in 7 milliseconds
    I0402 22:06:01.876887   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?timeout=10s 201 Created in 8 milliseconds
    I0402 22:06:01.887857   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/roles?timeout=10s 201 Created in 10 milliseconds
    I0402 22:06:01.900701   66995 round_trippers.go:553] POST https://172.16.59.30:6443/apis/rbac.authorization.k8s.io/v1/namespaces/kube-system/rolebindings?timeout=10s 201 Created in 12 milliseconds
    [addons] Applied essential addon: kube-proxy
    I0402 22:06:01.901505   66995 loader.go:372] Config loaded from file:  /etc/kubernetes/admin.conf
    I0402 22:06:01.902035   66995 loader.go:372] Config loaded from file:  /etc/kubernetes/admin.conf
    
    Your Kubernetes control-plane has initialized successfully!
    
    To start using your cluster, you need to run the following as a regular user:
    
      mkdir -p $HOME/.kube
      sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
      sudo chown $(id -u):$(id -g) $HOME/.kube/config
    
    Alternatively, if you are the root user, you can run:
    
      export KUBECONFIG=/etc/kubernetes/admin.conf
    
    You should now deploy a pod network to the cluster.
    Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at:
      https://kubernetes.io/docs/concepts/cluster-administration/addons/
    
    Then you can join any number of worker nodes by running the following on each as root:
    
    kubeadm join 172.16.59.30:6443 --token yup5oo.s5ui8hfrrcm5jf2j \
            --discovery-token-ca-cert-hash sha256:3fe816c50e13da9491b277711e6e77dc0d6d10c03b23f2d7487d5b3bea9b9525 
    
  • 相关阅读:
    Webstorm 下的Angular2.0开发之路
    利用hexo+github+nodejs搭建自我博客的一天
    滑稽的下午angularjs 2.0管道的使用
    DNGuard 标准版 v2.90发布
    DNGuard Enterprise v2.92 released
    C#复杂表达式的问题
    直接在.Net程序(C#)中执行 native code
    采用Native 引导方式的.Net加密保护
    DNGuard HVM Trial V2.82 发布
    DNGuard Enterprise v2.90 released
  • 原文地址:https://www.cnblogs.com/heidsoft/p/16095218.html
Copyright © 2020-2023  润新知