-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KCP upgrade is failing because of wrong member in etcd #5509
Comments
Did you have a machine healthcheck on this cluster, and are you using kube-vip or something else for the LB? |
Yes, its kube-vip and yes, it has MHCs for both workers and controlplanes |
/priority awaiting-more-evidence @MaxRink could you provide KCP logs and a dump of KCP + control plane machines. |
Unfortunately not, i needed to fix the cluster as it was used. |
https://gist.github.com/MaxRink/8d95f60fc518c6cb053aec37f4fe74ed
|
@MaxRink this kind of smells of #5477 @gab-satchi and @srm09 have been testing a workaround in vmware-tanzu/tanzu-framework#954 . I don't know if that resolved it. |
/area control-plane |
/milestone v1.2 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What steps did you take and what happened:
After starting an upgrade of KCP etcd on the new nodes never got up and running, thus API-Server was faling to come up and the upgrade never succeeded.
After debugging we found that there was a wong peer in ETCd
After removing that everything started working.
The question is, how has that made it into etcd, given that that cluster has only be touched by CAPI
What did you expect to happen:
Upgrade succeeds without manual intervention
Anything else you would like to add:
https://kubernetes.slack.com/archives/C8TSNPY4T/p1635330143156400
Environment:
kubectl version
): 1.20.9 -> 1.20.11/etc/os-release
):/kind bug
The text was updated successfully, but these errors were encountered: