-
Notifications
You must be signed in to change notification settings - Fork 752
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kubesphere在线kubernetes部署失败 #334
Comments
第二次出现问题: changed: [localhost] TASK [metrics-server : Metrics-Server | Creating manifests] ******************** changed: [localhost] => (item={u'type': u'config', u'name': u'values', u'file': u'values.yaml'}) TASK [metrics-server : Metrics-Server | Installing metrics-server] ************* fatal: [localhost]: FAILED! => {"changed": true, "cmd": "/usr/local/bin/helm upgrade --install metrics-server/etc/kubesphere/metrics-server --namespace kube-system\n", "delta": "0:00:00.975578", "end": "2019-10-25 19:19:29.722614", "msg": "non-zero return code", "rc": 1, "start": "2019-10-25 19:19:28.747036", "stderr": "Error: Could not get apiVersions from Kubernetes: unable to retrieve the complete list of server APIs: authentication.istio.io/v1alpha1: the server could not find the requested resource, config.istio.io/v1alpha2: the server could not find the requested resource, networking.istio.io/v1alpha3: the server could not find the requested resource, rbac.istio.io/v1alpha1: the server could not find the requested resource", "stderr_lines": ["Error: Could not get apiVersions from Kubernetes: unable to retrieve the complete list of server APIs: authentication.istio.io/v1alpha1: the server could not find the requested resource, config.istio.io/v1alpha2: the server couldnot find the requested resource, networking.istio.io/v1alpha3: the server could not find the requested resource, rbac.istio.io/v1alpha1: the server could not find the requested resource"], "stdout": "Release "metrics-server" does not exist. Installing it now.", "stdout_lines": ["Release "metrics-server" does not exist. Installing it now."]} PLAY RECAP ********************************************************************* localhost : ok=35 changed=27 unreachable=0 failed=1 skipped=7 rescued=0 ignored=0 |
第三次出现问题: FAILED - RETRYING: ks-monitor | Installing prometheus-operator (4 retries left). FAILED - RETRYING: ks-monitor | Installing prometheus-operator (3 retries left). FAILED - RETRYING: ks-monitor | Installing prometheus-operator (2 retries left). FAILED - RETRYING: ks-monitor | Installing prometheus-operator (1 retries left). failed: [localhost] (item=sources) => {"ansible_loop_var": "item", "attempts": 5, "changed": true, "cmd": "/usr/local/bin/kubectl apply -f /etc/kubesphere/prometheus/sources", "delta": "0:00:01.786886", "end": "2019-10-25 19:22:49.231470", "failed_when_result": true, "item": "sources", "msg": "non-zero return code", "rc": 1, "start": "2019-10-25 19:22:47.444584", "stderr": "Error from server (Invalid): error when creating "/etc/kubesphere/prometheus/sources/prometheus-prometheus.yaml": Prometheus.monitoring.coreos.com "k8s" is invalid: []:Invalid value: map[string]interface {}{"apiVersion":"monitoring.coreos.com/v1", "kind":"Prometheus", "metadata":map[string]interface {}{"annotations":map[string]interface {}{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"monitoring.coreos.com/v1\",\"kind\":\"Prometheus\",\"metadata\":{\"annotations\":{},\"labels\":{\"prometheus\":\"k8s\"},\"name\":\"k8s\",\"namespace\":\"kubesphere-monitoring-system\"},\"spec\":{\"affinity\":{\"podAntiAffinity\":{\"preferredDuringSchedulingIgnoredDuringExecution\":[{\"podAffinityTerm\":{\"labelSelector\":{\"matchExpressions\":[{\"key\":\"prometheus\",\"operator\":\"In\",\"values\":[\"k8s\"]}]},\"namespaces\":[\"kubesphere-monitoring-system\"],\"topologyKey\":\"kubernetes.io/hostname\"},\"weight\":100}]}},\"baseImage\":\"dockerhub.qingcloud.com/prometheus/prometheus\",\"imagePullSecrets\":[{\"name\":\"qingcloud\"}],\"nodeSelector\":{\"beta.kubernetes.io/os\":\"linux\"},\"query\":{\"maxConcurrency\":1000},\"replicas\":2,\"resources\":{\"limits\":{\"cpu\":\"2.5\",\"memory\":\"2Gi\"},\"requests\":{\"cpu\":\"80m\",\"memory\":\"400Mi\"}},\"retention\":\"7d\",\"ruleSelector\":{\"matchLabels\":{\"prometheus\":\"k8s\",\"role\":\"alert-rules\"}},\"scrapeInterval\":\"1m\",\"securityContext\":{\"fsGroup\":0,\"runAsNonRoot\":false,\"runAsUser\":0},\"serviceAccountName\":\"prometheus-k8s\",\"serviceMonitorNamespaceSelector\":{},\"serviceMonitorSelector\":{\"matchExpressions\":[{\"key\":\"k8s-app\",\"operator\":\"In\",\"values\":[\"kube-state-metrics\",\"node-exporter\",\"kubelet\",\"prometheus-system\"]}]},\"storage\":{\"volumeClaimTemplate\":{\"spec\":{\"resources\":{\"requests\":{\"storage\":\"20Gi\"}},\"storageClassName\":null}}},\"tolerations\":[{\"effect\":\"NoSchedule\",\"key\":\"dedicated\",\"operator\":\"Equal\",\"value\":\"monitoring\"}],\"version\":\"v2.5.0\"}}\n"}, "creationTimestamp":"2019-10-25T19:22:48Z", "generation":1, "labels":map[string]interface {}{"prometheus":"k8s"}, "name":"k8s", "namespace":"kubesphere-monitoring-system", "uid":"f41b2c48-f370-46be-b923-e2478db45e10"}, "spec":map[string]interface {}{"affinity":map[string]interface {}{"podAntiAffinity":map[string]interface {}{"preferredDuringSchedulingIgnoredDuringExecution":[]interface {}{map[string]interface {}{"podAffinityTerm":map[string]interface {}{"labelSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"prometheus", "operator":"In", "values":[]interface {}{"k8s"}}}}, "namespaces":[]interface {}{"kubesphere-monitoring-system"}, "topologyKey":"kubernetes.io/hostname"}, "weight":100}}}}, "baseImage":"dockerhub.qingcloud.com/prometheus/prometheus", "imagePullSecrets":[]interface {}{map[string]interface {}{"name":"qingcloud"}}, "nodeSelector":map[string]interface {}{"beta.kubernetes.io/os":"linux"}, "query":map[string]interface {}{"maxConcurrency":1000}, "replicas":2, "resources":map[string]interface {}{"limits":map[string]interface {}{"cpu":"2.5", "memory":"2Gi"}, "requests":map[string]interface {}{"cpu":"80m", "memory":"400Mi"}}, "retention":"7d", "ruleSelector":map[string]interface{}{"matchLabels":map[string]interface {}{"prometheus":"k8s", "role":"alert-rules"}}, "scrapeInterval":"1m", "securityContext":map[string]interface {}{"fsGroup":0, "runAsNonRoot":false, "runAsUser":0}, "serviceAccountName":"prometheus-k8s", "serviceMonitorNamespaceSelector":map[string]interface {}{}, "serviceMonitorSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"k8s-app", "operator":"In", "values":[]interface {}{"kube-state-metrics", "node-exporter", "kubelet", "prometheus-system"}}}}, "storage":map[string]interface {}{"volumeClaimTemplate":map[string]interface {}{"spec":map[string]interface {}{"resources":map[string]interface {}{"requests":map[string]interface {}{"storage":"20Gi"}}, "storageClassName":interface {}(nil)}}}, "tolerations":[]interface {}{map[string]interface {}{"effect":"NoSchedule", "key":"dedicated", "operator":"Equal", "value":"monitoring"}}, "version":"v2.5.0"}}: validation failure list:\nspec.storage.volumeClaimTemplate.spec.storageClassName in body must be of type string: "null"\nError from server (Invalid): error when creating "/etc/kubesphere/prometheus/sources/prometheus-prometheusSystem.yaml": Prometheus.monitoring.coreos.com "k8s-system" is invalid: []: Invalid value: map[string]interface {}{"apiVersion":"monitoring.coreos.com/v1", "kind":"Prometheus", "metadata":map[string]interface {}{"annotations":map[string]interface {}{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"monitoring.coreos.com/v1\",\"kind\":\"Prometheus\",\"metadata\":{\"annotations\":{},\"labels\":{\"prometheus\":\"k8s-system\"},\"name\":\"k8s-system\",\"namespace\":\"kubesphere-monitoring-system\"},\"spec\":{\"additionalScrapeConfigs\":{\"key\":\"prometheus-additional.yaml\",\"name\":\"additional-scrape-configs\"},\"affinity\":{\"podAntiAffinity\":{\"preferredDuringSchedulingIgnoredDuringExecution\":[{\"podAffinityTerm\":{\"labelSelector\":{\"matchExpressions\":[{\"key\":\"prometheus\",\"operator\":\"In\",\"values\":[\"k8s-system\"]}]},\"namespaces\":[\"kubesphere-monitoring-system\"],\"topologyKey\":\"kubernetes.io/hostname\"},\"weight\":100}]}},\"baseImage\":\"dockerhub.qingcloud.com/prometheus/prometheus\",\"imagePullSecrets\":[{\"name\":\"qingcloud\"}],\"nodeSelector\":{\"beta.kubernetes.io/os\":\"linux\"},\"query\":{\"maxConcurrency\":1000},\"replicas\":2,\"resources\":{\"limits\":{\"cpu\":\"2.5\",\"memory\":\"2Gi\"},\"requests\":{\"cpu\":\"60m\",\"memory\":\"400Mi\"}},\"retention\":\"7d\",\"ruleSelector\":{\"matchLabels\":{\"prometheus\":\"k8s\",\"role\":\"alert-rules\"}},\"scrapeInterval\":\"1m\",\"secrets\":[\"kube-etcd-client-certs\"],\"securityContext\":{\"fsGroup\":0,\"runAsNonRoot\":false,\"runAsUser\":0},\"serviceAccountName\":\"prometheus-k8s\",\"serviceMonitorNamespaceSelector\":{},\"serviceMonitorSelector\":{\"matchExpressions\":[{\"key\":\"k8s-app\",\"operator\":\"In\",\"values\":[\"etcd\",\"coredns\",\"apiserver\",\"prometheus\",\"kube-scheduler\",\"kube-controller-manager\"]}]},\"storage\":{\"volumeClaimTemplate\":{\"spec\":{\"resources\":{\"requests\":{\"storage\":\"20Gi\"}},\"storageClassName\":null}}},\"tolerations\":[{\"effect\":\"NoSchedule\",\"key\":\"dedicated\",\"operator\":\"Equal\",\"value\":\"monitoring\"}],\"version\":\"v2.5.0\"}}\n"}, "creationTimestamp":"2019-10-25T19:22:48Z", "generation":1, "labels":map[string]interface {}{"prometheus":"k8s-system"}, "name":"k8s-system", "namespace":"kubesphere-monitoring-system", "uid":"868782a4-2536-4662-967d-84aa8139d21d"}, "spec":map[string]interface {}{"additionalScrapeConfigs":map[string]interface {}{"key":"prometheus-additional.yaml", "name":"additional-scrape-configs"}, "affinity":map[string]interface {}{"podAntiAffinity":map[string]interface {}{"preferredDuringSchedulingIgnoredDuringExecution":[]interface {}{map[string]interface {}{"podAffinityTerm":map[string]interface {}{"labelSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"prometheus", "operator":"In", "values":[]interface {}{"k8s-system"}}}}, "namespaces":[]interface {}{"kubesphere-monitoring-system"}, "topologyKey":"kubernetes.io/hostname"}, "weight":100}}}}, "baseImage":"dockerhub.qingcloud.com/prometheus/prometheus", "imagePullSecrets":[]interface {}{map[string]interface {}{"name":"qingcloud"}},"nodeSelector":map[string]interface {}{"beta.kubernetes.io/os":"linux"}, "query":map[string]interface{}{"maxConcurrency":1000}, "replicas":2, "resources":map[string]interface {}{"limits":map[string]interface {}{"cpu":"2.5", "memory":"2Gi"}, "requests":map[string]interface {}{"cpu":"60m", "memory":"400Mi"}}, "retention":"7d", "ruleSelector":map[string]interface {}{"matchLabels":map[string]interface {}{"prometheus":"k8s", "role":"alert-rules"}}, "scrapeInterval":"1m", "secrets":[]interface{}{"kube-etcd-client-certs"}, "securityContext":map[string]interface {}{"fsGroup":0, "runAsNonRoot":false, "runAsUser":0}, "serviceAccountName":"prometheus-k8s", "serviceMonitorNamespaceSelector":map[string]interface {}{}, "serviceMonitorSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"k8s-app", "operator":"In", "values":[]interface {}{"etcd", "coredns", "apiserver", "prometheus", "kube-scheduler", "kube-controller-manager"}}}}, "storage":map[string]interface {}{"volumeClaimTemplate":map[string]interface {}{"spec":map[string]interface {}{"resources":map[string]interface {}{"requests":map[string]interface {}{"storage":"20Gi"}}, "storageClassName":interface {}(nil)}}}, "tolerations":[]interface {}{map[string]interface {}{"effect":"NoSchedule", "key":"dedicated", "operator":"Equal", "value":"monitoring"}}, "version":"v2.5.0"}}: validation failure list:\nspec.storage.volumeClaimTemplate.spec.storageClassName in body must be of type string: "null"", "stderr_lines": ["Error from server (Invalid): error when creating "/etc/kubesphere/prometheus/sources/prometheus-prometheus.yaml": Prometheus.monitoring.coreos.com "k8s" is invalid: []: Invalid value: map[string]interface {}{"apiVersion":"monitoring.coreos.com/v1", "kind":"Prometheus", "metadata":map[string]interface {}{"annotations":map[string]interface {}{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"monitoring.coreos.com/v1\",\"kind\":\"Prometheus\",\"metadata\":{\"annotations\":{},\"labels\":{\"prometheus\":\"k8s\"},\"name\":\"k8s\",\"namespace\":\"kubesphere-monitoring-system\"},\"spec\":{\"affinity\":{\"podAntiAffinity\":{\"preferredDuringSchedulingIgnoredDuringExecution\":[{\"podAffinityTerm\":{\"labelSelector\":{\"matchExpressions\":[{\"key\":\"prometheus\",\"operator\":\"In\",\"values\":[\"k8s\"]}]},\"namespaces\":[\"kubesphere-monitoring-system\"],\"topologyKey\":\"kubernetes.io/hostname\"},\"weight\":100}]}},\"baseImage\":\"dockerhub.qingcloud.com/prometheus/prometheus\",\"imagePullSecrets\":[{\"name\":\"qingcloud\"}],\"nodeSelector\":{\"beta.kubernetes.io/os\":\"linux\"},\"query\":{\"maxConcurrency\":1000},\"replicas\":2,\"resources\":{\"limits\":{\"cpu\":\"2.5\",\"memory\":\"2Gi\"},\"requests\":{\"cpu\":\"80m\",\"memory\":\"400Mi\"}},\"retention\":\"7d\",\"ruleSelector\":{\"matchLabels\":{\"prometheus\":\"k8s\",\"role\":\"alert-rules\"}},\"scrapeInterval\":\"1m\",\"securityContext\":{\"fsGroup\":0,\"runAsNonRoot\":false,\"runAsUser\":0},\"serviceAccountName\":\"prometheus-k8s\",\"serviceMonitorNamespaceSelector\":{},\"serviceMonitorSelector\":{\"matchExpressions\":[{\"key\":\"k8s-app\",\"operator\":\"In\",\"values\":[\"kube-state-metrics\",\"node-exporter\",\"kubelet\",\"prometheus-system\"]}]},\"storage\":{\"volumeClaimTemplate\":{\"spec\":{\"resources\":{\"requests\":{\"storage\":\"20Gi\"}},\"storageClassName\":null}}},\"tolerations\":[{\"effect\":\"NoSchedule\",\"key\":\"dedicated\",\"operator\":\"Equal\",\"value\":\"monitoring\"}],\"version\":\"v2.5.0\"}}\n"}, "creationTimestamp":"2019-10-25T19:22:48Z", "generation":1, "labels":map[string]interface {}{"prometheus":"k8s"}, "name":"k8s", "namespace":"kubesphere-monitoring-system", "uid":"f41b2c48-f370-46be-b923-e2478db45e10"}, "spec":map[string]interface {}{"affinity":map[string]interface {}{"podAntiAffinity":map[string]interface {}{"preferredDuringSchedulingIgnoredDuringExecution":[]interface {}{map[string]interface {}{"podAffinityTerm":map[string]interface {}{"labelSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"prometheus", "operator":"In", "values":[]interface {}{"k8s"}}}}, "namespaces":[]interface {}{"kubesphere-monitoring-system"}, "topologyKey":"kubernetes.io/hostname"}, "weight":100}}}}, "baseImage":"dockerhub.qingcloud.com/prometheus/prometheus", "imagePullSecrets":[]interface {}{map[string]interface {}{"name":"qingcloud"}}, "nodeSelector":map[string]interface {}{"beta.kubernetes.io/os":"linux"}, "query":map[string]interface {}{"maxConcurrency":1000}, "replicas":2, "resources":map[string]interface {}{"limits":map[string]interface {}{"cpu":"2.5", "memory":"2Gi"}, "requests":map[string]interface {}{"cpu":"80m", "memory":"400Mi"}}, "retention":"7d", "ruleSelector":map[string]interface {}{"matchLabels":map[string]interface {}{"prometheus":"k8s", "role":"alert-rules"}}, "scrapeInterval":"1m", "securityContext":map[string]interface {}{"fsGroup":0, "runAsNonRoot":false, "runAsUser":0}, "serviceAccountName":"prometheus-k8s", "serviceMonitorNamespaceSelector":map[string]interface {}{}, "serviceMonitorSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"k8s-app", "operator":"In", "values":[]interface {}{"kube-state-metrics", "node-exporter", "kubelet", "prometheus-system"}}}}, "storage":map[string]interface {}{"volumeClaimTemplate":map[string]interface {}{"spec":map[string]interface {}{"resources":map[string]interface {}{"requests":map[string]interface {}{"storage":"20Gi"}}, "storageClassName":interface {}(nil)}}}, "tolerations":[]interface {}{map[string]interface {}{"effect":"NoSchedule", "key":"dedicated", "operator":"Equal", "value":"monitoring"}}, "version":"v2.5.0"}}: validation failure list:", "spec.storage.volumeClaimTemplate.spec.storageClassName in body must be of type string: "null"", "Error from server (Invalid): error when creating "/etc/kubesphere/prometheus/sources/prometheus-prometheusSystem.yaml": Prometheus.monitoring.coreos.com "k8s-system" is invalid: []: Invalid value: map[string]interface {}{"apiVersion":"monitoring.coreos.com/v1", "kind":"Prometheus", "metadata":map[string]interface {}{"annotations":map[string]interface {}{"kubectl.kubernetes.io/last-applied-configuration":"{\"apiVersion\":\"monitoring.coreos.com/v1\",\"kind\":\"Prometheus\",\"metadata\":{\"annotations\":{},\"labels\":{\"prometheus\":\"k8s-system\"},\"name\":\"k8s-system\",\"namespace\":\"kubesphere-monitoring-system\"},\"spec\":{\"additionalScrapeConfigs\":{\"key\":\"prometheus-additional.yaml\",\"name\":\"additional-scrape-configs\"},\"affinity\":{\"podAntiAffinity\":{\"preferredDuringSchedulingIgnoredDuringExecution\":[{\"podAffinityTerm\":{\"labelSelector\":{\"matchExpressions\":[{\"key\":\"prometheus\",\"operator\":\"In\",\"values\":[\"k8s-system\"]}]},\"namespaces\":[\"kubesphere-monitoring-system\"],\"topologyKey\":\"kubernetes.io/hostname\"},\"weight\":100}]}},\"baseImage\":\"dockerhub.qingcloud.com/prometheus/prometheus\",\"imagePullSecrets\":[{\"name\":\"qingcloud\"}],\"nodeSelector\":{\"beta.kubernetes.io/os\":\"linux\"},\"query\":{\"maxConcurrency\":1000},\"replicas\":2,\"resources\":{\"limits\":{\"cpu\":\"2.5\",\"memory\":\"2Gi\"},\"requests\":{\"cpu\":\"60m\",\"memory\":\"400Mi\"}},\"retention\":\"7d\",\"ruleSelector\":{\"matchLabels\":{\"prometheus\":\"k8s\",\"role\":\"alert-rules\"}},\"scrapeInterval\":\"1m\",\"secrets\":[\"kube-etcd-client-certs\"],\"securityContext\":{\"fsGroup\":0,\"runAsNonRoot\":false,\"runAsUser\":0},\"serviceAccountName\":\"prometheus-k8s\",\"serviceMonitorNamespaceSelector\":{},\"serviceMonitorSelector\":{\"matchExpressions\":[{\"key\":\"k8s-app\",\"operator\":\"In\",\"values\":[\"etcd\",\"coredns\",\"apiserver\",\"prometheus\",\"kube-scheduler\",\"kube-controller-manager\"]}]},\"storage\":{\"volumeClaimTemplate\":{\"spec\":{\"resources\":{\"requests\":{\"storage\":\"20Gi\"}},\"storageClassName\":null}}},\"tolerations\":[{\"effect\":\"NoSchedule\",\"key\":\"dedicated\",\"operator\":\"Equal\",\"value\":\"monitoring\"}],\"version\":\"v2.5.0\"}}\n"}, "creationTimestamp":"2019-10-25T19:22:48Z", "generation":1, "labels":map[string]interface {}{"prometheus":"k8s-system"}, "name":"k8s-system", "namespace":"kubesphere-monitoring-system", "uid":"868782a4-2536-4662-967d-84aa8139d21d"}, "spec":map[string]interface {}{"additionalScrapeConfigs":map[string]interface {}{"key":"prometheus-additional.yaml", "name":"additional-scrape-configs"}, "affinity":map[string]interface {}{"podAntiAffinity":map[string]interface {}{"preferredDuringSchedulingIgnoredDuringExecution":[]interface {}{map[string]interface {}{"podAffinityTerm":map[string]interface {}{"labelSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"prometheus", "operator":"In", "values":[]interface {}{"k8s-system"}}}}, "namespaces":[]interface {}{"kubesphere-monitoring-system"}, "topologyKey":"kubernetes.io/hostname"}, "weight":100}}}}, "baseImage":"dockerhub.qingcloud.com/prometheus/prometheus", "imagePullSecrets":[]interface {}{map[string]interface {}{"name":"qingcloud"}}, "nodeSelector":map[string]interface {}{"beta.kubernetes.io/os":"linux"}, "query":map[string]interface {}{"maxConcurrency":1000}, "replicas":2, "resources":map[string]interface {}{"limits":map[string]interface {}{"cpu":"2.5", "memory":"2Gi"}, "requests":map[string]interface {}{"cpu":"60m", "memory":"400Mi"}}, "retention":"7d", "ruleSelector":map[string]interface {}{"matchLabels":map[string]interface {}{"prometheus":"k8s", "role":"alert-rules"}}, "scrapeInterval":"1m", "secrets":[]interface {}{"kube-etcd-client-certs"}, "securityContext":map[string]interface {}{"fsGroup":0, "runAsNonRoot":false, "runAsUser":0}, "serviceAccountName":"prometheus-k8s", "serviceMonitorNamespaceSelector":map[string]interface {}{}, "serviceMonitorSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"k8s-app", "operator":"In", "values":[]interface {}{"etcd", "coredns", "apiserver", "prometheus", "kube-scheduler", "kube-controller-manager"}}}}, "storage":map[string]interface {}{"volumeClaimTemplate":map[string]interface {}{"spec":map[string]interface {}{"resources":map[string]interface {}{"requests":map[string]interface {}{"storage":"20Gi"}}, "storageClassName":interface {}(nil)}}}, "tolerations":[]interface {}{map[string]interface {}{"effect":"NoSchedule", "key":"dedicated", "operator":"Equal", "value":"monitoring"}}, "version":"v2.5.0"}}: validation failure list:", "spec.storage.volumeClaimTemplate.spec.storageClassName in body must be of type string: "null""], "stdout": "secret/additional-scrape-configs unchanged\nclusterrole.rbac.authorization.k8s.io/kube-state-metrics unchanged\nclusterrolebinding.rbac.authorization.k8s.io/kube-state-metrics unchanged\ndeployment.apps/kube-state-metrics unchanged\nrole.rbac.authorization.k8s.io/kube-state-metrics unchanged\nrolebinding.rbac.authorization.k8s.io/kube-state-metrics unchanged\nservice/kube-state-metrics unchanged\nserviceaccount/kube-state-metrics unchanged\nservicemonitor.monitoring.coreos.com/kube-state-metrics unchanged\nclusterrole.rbac.authorization.k8s.io/node-exporter unchanged\nclusterrolebinding.rbac.authorization.k8s.io/node-exporter unchanged\ndaemonset.apps/node-exporter configured\nservice/node-exporter unchanged\nserviceaccount/node-exporter unchanged\nservicemonitor.monitoring.coreos.com/node-exporter unchanged\nclusterrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nclusterrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nendpoints/etcd unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s-config unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s-config unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nprometheusrule.monitoring.coreos.com/prometheus-k8s-rules unchanged\nservice/prometheus-k8s unchanged\nserviceaccount/prometheus-k8s unchanged\nservice/etcd configured\nservice/kube-controller-manager unchanged\nservice/kube-scheduler unchanged\nservicemonitor.monitoring.coreos.com/prometheus unchanged\nservicemonitor.monitoring.coreos.com/kube-apiserver unchanged\nservicemonitor.monitoring.coreos.com/coredns unchanged\nservicemonitor.monitoring.coreos.com/etcd unchanged\nservicemonitor.monitoring.coreos.com/kube-controller-manager unchanged\nservicemonitor.monitoring.coreos.com/kube-scheduler unchanged\nservicemonitor.monitoring.coreos.com/kubelet unchanged\nservicemonitor.monitoring.coreos.com/prometheus-system unchanged\nservice/prometheus-k8s-system unchanged", "stdout_lines": ["secret/additional-scrape-configs unchanged", "clusterrole.rbac.authorization.k8s.io/kube-state-metrics unchanged", "clusterrolebinding.rbac.authorization.k8s.io/kube-state-metrics unchanged", "deployment.apps/kube-state-metrics unchanged", "role.rbac.authorization.k8s.io/kube-state-metrics unchanged", "rolebinding.rbac.authorization.k8s.io/kube-state-metrics unchanged", "service/kube-state-metrics unchanged", "serviceaccount/kube-state-metrics unchanged", "servicemonitor.monitoring.coreos.com/kube-state-metrics unchanged", "clusterrole.rbac.authorization.k8s.io/node-exporter unchanged", "clusterrolebinding.rbac.authorization.k8s.io/node-exporter unchanged", "daemonset.apps/node-exporter configured", "service/node-exporter unchanged", "serviceaccount/node-exporter unchanged", "servicemonitor.monitoring.coreos.com/node-exporter unchanged", "clusterrole.rbac.authorization.k8s.io/prometheus-k8s unchanged", "clusterrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "endpoints/etcd unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s-config unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s-config unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s unchanged", "prometheusrule.monitoring.coreos.com/prometheus-k8s-rules unchanged", "service/prometheus-k8s unchanged", "serviceaccount/prometheus-k8s unchanged", "service/etcd configured", "service/kube-controller-manager unchanged", "service/kube-scheduler unchanged", "servicemonitor.monitoring.coreos.com/prometheus unchanged", "servicemonitor.monitoring.coreos.com/kube-apiserver unchanged", "servicemonitor.monitoring.coreos.com/coredns unchanged", "servicemonitor.monitoring.coreos.com/etcd unchanged", "servicemonitor.monitoring.coreos.com/kube-controller-manager unchanged", "servicemonitor.monitoring.coreos.com/kube-scheduler unchanged", "servicemonitor.monitoring.coreos.com/kubelet unchanged", "servicemonitor.monitoring.coreos.com/prometheus-system unchanged", "service/prometheus-k8s-system unchanged"]} PLAY RECAP ********************************************************************* localhost : ok=61 changed=52 unreachable=0 failed=1 skipped=9 rescued=0 ignored=0 |
config 中是否配置了storageclass |
@pixiake https://github.com/helm/helm/issues/3130#issuecomment-345506262 why not update the install README.md by adding the following scripts: # upgrade helm
helm init --upgrade --service-account tiller
# helm_rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: tiller
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: tiller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-admin
subjects:
- kind: ServiceAccount
name: tiller
namespace: kube-system
# apply helm_rbac.yaml
kubectl apply -f helm_rabc.yaml you can edit and make some adjustment when somewhere wrong i expressed; i hope this will make help for new commer to k8s and kubesphere; |
@hsdtsyl I have reviewd your resolution that related to helm rabc. But it may not just related to rabc role management and authentication due there are several errors occur. After that errors disappeared when i use the same version helm client and server while the kubernetes cluster downgraded. In last few days, 4 different deployment mode tests was done about kubesphere and figured out that kubesphere 2.0.2 currently can support kubesphere kubernetes v1.13.5 properly on my end. You may can see the test results in following link: Supported kubernetes version on my end was found from all-in-one deployment mode. |
4.storageClass: kubectl get sc NAME PROVISIONER AGE thin-disk kubernetes.io/vsphere-volume 10h configure 中没有定义特别的storageclass,这个SC是default 也是惟一的 |
config 中要填下storageclass name |
我也遇到同样的问题,请问楼主解决了吗? |
我的办法是使用低版本的k8s |
请问你成功的k8s版本是哪个版本? 会出现下面的报错 FAILED - RETRYING: ks-monitor | Installing prometheus-operator (4 retries left). FAILED - RETRYING: ks-monitor | Installing prometheus-operator (3 retries left). FAILED - RETRYING: ks-monitor | Installing prometheus-operator (2 retries left). FAILED - RETRYING: ks-monitor | Installing prometheus-operator (1 retries left). failed: [localhost] (item=sources) => {"ansible_loop_var": "item", "attempts": 5, "changed": true, "cmd": "/usr/local/bin/kubectl apply -f /etc/kubesphere/prometheus/sources", "delta": "0:00:01.786886", "end": "2019-10-25 19:22:49.231470", "failed_when_result": true, "item": "sources", "msg": "non-zero return code", "rc": 1, "start": "2019-10-25 19:22:47.444584", "stderr": "Error from server (Invalid): error when creating "/etc/kubesphere/prometheus/sources/prometheus-prometheus.yaml": Prometheus.monitoring.coreos.com "k8s" is invalid: []:Invalid value: map[string]interface {}{"apiVersion":"monitoring.coreos.com/v1", "kind":"Prometheus", "metadata":map[string]interface {}{"annotations":map[string]interface {}{"kubectl.kubernetes.io/last-applied-configuration":"{"apiVersion":"monitoring.coreos.com/v1","kind":"Prometheus","metadata":{"annotations":{},"labels":{"prometheus":"k8s"},"name":"k8s","namespace":"kubesphere-monitoring-system"},"spec":{"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"podAffinityTerm":{"labelSelector":{"matchExpressions":[{"key":"prometheus","operator":"In","values":["k8s"]}]},"namespaces":["kubesphere-monitoring-system"],"topologyKey":"kubernetes.io/hostname"},"weight":100}]}},"baseImage":"dockerhub.qingcloud.com/prometheus/prometheus","imagePullSecrets":[{"name":"qingcloud"}],"nodeSelector":{"beta.kubernetes.io/os":"linux"},"query":{"maxConcurrency":1000},"replicas":2,"resources":{"limits":{"cpu":"2.5","memory":"2Gi"},"requests":{"cpu":"80m","memory":"400Mi"}},"retention":"7d","ruleSelector":{"matchLabels":{"prometheus":"k8s","role":"alert-rules"}},"scrapeInterval":"1m","securityContext":{"fsGroup":0,"runAsNonRoot":false,"runAsUser":0},"serviceAccountName":"prometheus-k8s","serviceMonitorNamespaceSelector":{},"serviceMonitorSelector":{"matchExpressions":[{"key":"k8s-app","operator":"In","values":["kube-state-metrics","node-exporter","kubelet","prometheus-system"]}]},"storage":{"volumeClaimTemplate":{"spec":{"resources":{"requests":{"storage":"20Gi"}},"storageClassName":null}}},"tolerations":[{"effect":"NoSchedule","key":"dedicated","operator":"Equal","value":"monitoring"}],"version":"v2.5.0"}}\n"}, "creationTimestamp":"2019-10-25T19:22:48Z", "generation":1, "labels":map[string]interface {}{"prometheus":"k8s"}, "name":"k8s", "namespace":"kubesphere-monitoring-system", "uid":"f41b2c48-f370-46be-b923-e2478db45e10"}, "spec":map[string]interface {}{"affinity":map[string]interface {}{"podAntiAffinity":map[string]interface {}{"preferredDuringSchedulingIgnoredDuringExecution":[]interface {}{map[string]interface {}{"podAffinityTerm":map[string]interface {}{"labelSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"prometheus", "operator":"In", "values":[]interface {}{"k8s"}}}}, "namespaces":[]interface {}{"kubesphere-monitoring-system"}, "topologyKey":"kubernetes.io/hostname"}, "weight":100}}}}, "baseImage":"dockerhub.qingcloud.com/prometheus/prometheus", "imagePullSecrets":[]interface {}{map[string]interface {}{"name":"qingcloud"}}, "nodeSelector":map[string]interface {}{"beta.kubernetes.io/os":"linux"}, "query":map[string]interface {}{"maxConcurrency":1000}, "replicas":2, "resources":map[string]interface {}{"limits":map[string]interface {}{"cpu":"2.5", "memory":"2Gi"}, "requests":map[string]interface {}{"cpu":"80m", "memory":"400Mi"}}, "retention":"7d", "ruleSelector":map[string]interface{}{"matchLabels":map[string]interface {}{"prometheus":"k8s", "role":"alert-rules"}}, "scrapeInterval":"1m", "securityContext":map[string]interface {}{"fsGroup":0, "runAsNonRoot":false, "runAsUser":0}, "serviceAccountName":"prometheus-k8s", "serviceMonitorNamespaceSelector":map[string]interface {}{}, "serviceMonitorSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"k8s-app", "operator":"In", "values":[]interface {}{"kube-state-metrics", "node-exporter", "kubelet", "prometheus-system"}}}}, "storage":map[string]interface {}{"volumeClaimTemplate":map[string]interface {}{"spec":map[string]interface {}{"resources":map[string]interface {}{"requests":map[string]interface {}{"storage":"20Gi"}}, "storageClassName":interface {}(nil)}}}, "tolerations":[]interface {}{map[string]interface {}{"effect":"NoSchedule", "key":"dedicated", "operator":"Equal", "value":"monitoring"}}, "version":"v2.5.0"}}: validation failure list:\nspec.storage.volumeClaimTemplate.spec.storageClassName in body must be of type string: "null"\nError from server (Invalid): error when creating "/etc/kubesphere/prometheus/sources/prometheus-prometheusSystem.yaml": Prometheus.monitoring.coreos.com "k8s-system" is invalid: []: Invalid value: map[string]interface {}{"apiVersion":"monitoring.coreos.com/v1", "kind":"Prometheus", "metadata":map[string]interface {}{"annotations":map[string]interface {}{"kubectl.kubernetes.io/last-applied-configuration":"{"apiVersion":"monitoring.coreos.com/v1","kind":"Prometheus","metadata":{"annotations":{},"labels":{"prometheus":"k8s-system"},"name":"k8s-system","namespace":"kubesphere-monitoring-system"},"spec":{"additionalScrapeConfigs":{"key":"prometheus-additional.yaml","name":"additional-scrape-configs"},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"podAffinityTerm":{"labelSelector":{"matchExpressions":[{"key":"prometheus","operator":"In","values":["k8s-system"]}]},"namespaces":["kubesphere-monitoring-system"],"topologyKey":"kubernetes.io/hostname"},"weight":100}]}},"baseImage":"dockerhub.qingcloud.com/prometheus/prometheus","imagePullSecrets":[{"name":"qingcloud"}],"nodeSelector":{"beta.kubernetes.io/os":"linux"},"query":{"maxConcurrency":1000},"replicas":2,"resources":{"limits":{"cpu":"2.5","memory":"2Gi"},"requests":{"cpu":"60m","memory":"400Mi"}},"retention":"7d","ruleSelector":{"matchLabels":{"prometheus":"k8s","role":"alert-rules"}},"scrapeInterval":"1m","secrets":["kube-etcd-client-certs"],"securityContext":{"fsGroup":0,"runAsNonRoot":false,"runAsUser":0},"serviceAccountName":"prometheus-k8s","serviceMonitorNamespaceSelector":{},"serviceMonitorSelector":{"matchExpressions":[{"key":"k8s-app","operator":"In","values":["etcd","coredns","apiserver","prometheus","kube-scheduler","kube-controller-manager"]}]},"storage":{"volumeClaimTemplate":{"spec":{"resources":{"requests":{"storage":"20Gi"}},"storageClassName":null}}},"tolerations":[{"effect":"NoSchedule","key":"dedicated","operator":"Equal","value":"monitoring"}],"version":"v2.5.0"}}\n"}, "creationTimestamp":"2019-10-25T19:22:48Z", "generation":1, "labels":map[string]interface {}{"prometheus":"k8s-system"}, "name":"k8s-system", "namespace":"kubesphere-monitoring-system", "uid":"868782a4-2536-4662-967d-84aa8139d21d"}, "spec":map[string]interface {}{"additionalScrapeConfigs":map[string]interface {}{"key":"prometheus-additional.yaml", "name":"additional-scrape-configs"}, "affinity":map[string]interface {}{"podAntiAffinity":map[string]interface {}{"preferredDuringSchedulingIgnoredDuringExecution":[]interface {}{map[string]interface {}{"podAffinityTerm":map[string]interface {}{"labelSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"prometheus", "operator":"In", "values":[]interface {}{"k8s-system"}}}}, "namespaces":[]interface {}{"kubesphere-monitoring-system"}, "topologyKey":"kubernetes.io/hostname"}, "weight":100}}}}, "baseImage":"dockerhub.qingcloud.com/prometheus/prometheus", "imagePullSecrets":[]interface {}{map[string]interface {}{"name":"qingcloud"}},"nodeSelector":map[string]interface {}{"beta.kubernetes.io/os":"linux"}, "query":map[string]interface{}{"maxConcurrency":1000}, "replicas":2, "resources":map[string]interface {}{"limits":map[string]interface {}{"cpu":"2.5", "memory":"2Gi"}, "requests":map[string]interface {}{"cpu":"60m", "memory":"400Mi"}}, "retention":"7d", "ruleSelector":map[string]interface {}{"matchLabels":map[string]interface {}{"prometheus":"k8s", "role":"alert-rules"}}, "scrapeInterval":"1m", "secrets":[]interface{}{"kube-etcd-client-certs"}, "securityContext":map[string]interface {}{"fsGroup":0, "runAsNonRoot":false, "runAsUser":0}, "serviceAccountName":"prometheus-k8s", "serviceMonitorNamespaceSelector":map[string]interface {}{}, "serviceMonitorSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"k8s-app", "operator":"In", "values":[]interface {}{"etcd", "coredns", "apiserver", "prometheus", "kube-scheduler", "kube-controller-manager"}}}}, "storage":map[string]interface {}{"volumeClaimTemplate":map[string]interface {}{"spec":map[string]interface {}{"resources":map[string]interface {}{"requests":map[string]interface {}{"storage":"20Gi"}}, "storageClassName":interface {}(nil)}}}, "tolerations":[]interface {}{map[string]interface {}{"effect":"NoSchedule", "key":"dedicated", "operator":"Equal", "value":"monitoring"}}, "version":"v2.5.0"}}: validation failure list:\nspec.storage.volumeClaimTemplate.spec.storageClassName in body must be of type string: "null"", "stderr_lines": ["Error from server (Invalid): error when creating "/etc/kubesphere/prometheus/sources/prometheus-prometheus.yaml": Prometheus.monitoring.coreos.com "k8s" is invalid: []: Invalid value: map[string]interface {}{"apiVersion":"monitoring.coreos.com/v1", "kind":"Prometheus", "metadata":map[string]interface {}{"annotations":map[string]interface {}{"kubectl.kubernetes.io/last-applied-configuration":"{"apiVersion":"monitoring.coreos.com/v1","kind":"Prometheus","metadata":{"annotations":{},"labels":{"prometheus":"k8s"},"name":"k8s","namespace":"kubesphere-monitoring-system"},"spec":{"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"podAffinityTerm":{"labelSelector":{"matchExpressions":[{"key":"prometheus","operator":"In","values":["k8s"]}]},"namespaces":["kubesphere-monitoring-system"],"topologyKey":"kubernetes.io/hostname"},"weight":100}]}},"baseImage":"dockerhub.qingcloud.com/prometheus/prometheus","imagePullSecrets":[{"name":"qingcloud"}],"nodeSelector":{"beta.kubernetes.io/os":"linux"},"query":{"maxConcurrency":1000},"replicas":2,"resources":{"limits":{"cpu":"2.5","memory":"2Gi"},"requests":{"cpu":"80m","memory":"400Mi"}},"retention":"7d","ruleSelector":{"matchLabels":{"prometheus":"k8s","role":"alert-rules"}},"scrapeInterval":"1m","securityContext":{"fsGroup":0,"runAsNonRoot":false,"runAsUser":0},"serviceAccountName":"prometheus-k8s","serviceMonitorNamespaceSelector":{},"serviceMonitorSelector":{"matchExpressions":[{"key":"k8s-app","operator":"In","values":["kube-state-metrics","node-exporter","kubelet","prometheus-system"]}]},"storage":{"volumeClaimTemplate":{"spec":{"resources":{"requests":{"storage":"20Gi"}},"storageClassName":null}}},"tolerations":[{"effect":"NoSchedule","key":"dedicated","operator":"Equal","value":"monitoring"}],"version":"v2.5.0"}}\n"}, "creationTimestamp":"2019-10-25T19:22:48Z", "generation":1, "labels":map[string]interface {}{"prometheus":"k8s"}, "name":"k8s", "namespace":"kubesphere-monitoring-system", "uid":"f41b2c48-f370-46be-b923-e2478db45e10"}, "spec":map[string]interface {}{"affinity":map[string]interface {}{"podAntiAffinity":map[string]interface {}{"preferredDuringSchedulingIgnoredDuringExecution":[]interface {}{map[string]interface {}{"podAffinityTerm":map[string]interface {}{"labelSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"prometheus", "operator":"In", "values":[]interface {}{"k8s"}}}}, "namespaces":[]interface {}{"kubesphere-monitoring-system"}, "topologyKey":"kubernetes.io/hostname"}, "weight":100}}}}, "baseImage":"dockerhub.qingcloud.com/prometheus/prometheus", "imagePullSecrets":[]interface {}{map[string]interface {}{"name":"qingcloud"}}, "nodeSelector":map[string]interface {}{"beta.kubernetes.io/os":"linux"}, "query":map[string]interface {}{"maxConcurrency":1000}, "replicas":2, "resources":map[string]interface {}{"limits":map[string]interface {}{"cpu":"2.5", "memory":"2Gi"}, "requests":map[string]interface {}{"cpu":"80m", "memory":"400Mi"}}, "retention":"7d", "ruleSelector":map[string]interface {}{"matchLabels":map[string]interface {}{"prometheus":"k8s", "role":"alert-rules"}}, "scrapeInterval":"1m", "securityContext":map[string]interface {}{"fsGroup":0, "runAsNonRoot":false, "runAsUser":0}, "serviceAccountName":"prometheus-k8s", "serviceMonitorNamespaceSelector":map[string]interface {}{}, "serviceMonitorSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"k8s-app", "operator":"In", "values":[]interface {}{"kube-state-metrics", "node-exporter", "kubelet", "prometheus-system"}}}}, "storage":map[string]interface {}{"volumeClaimTemplate":map[string]interface {}{"spec":map[string]interface {}{"resources":map[string]interface {}{"requests":map[string]interface {}{"storage":"20Gi"}}, "storageClassName":interface {}(nil)}}}, "tolerations":[]interface {}{map[string]interface {}{"effect":"NoSchedule", "key":"dedicated", "operator":"Equal", "value":"monitoring"}}, "version":"v2.5.0"}}: validation failure list:", "spec.storage.volumeClaimTemplate.spec.storageClassName in body must be of type string: "null"", "Error from server (Invalid): error when creating "/etc/kubesphere/prometheus/sources/prometheus-prometheusSystem.yaml": Prometheus.monitoring.coreos.com "k8s-system" is invalid: []: Invalid value: map[string]interface {}{"apiVersion":"monitoring.coreos.com/v1", "kind":"Prometheus", "metadata":map[string]interface {}{"annotations":map[string]interface {}{"kubectl.kubernetes.io/last-applied-configuration":"{"apiVersion":"monitoring.coreos.com/v1","kind":"Prometheus","metadata":{"annotations":{},"labels":{"prometheus":"k8s-system"},"name":"k8s-system","namespace":"kubesphere-monitoring-system"},"spec":{"additionalScrapeConfigs":{"key":"prometheus-additional.yaml","name":"additional-scrape-configs"},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"podAffinityTerm":{"labelSelector":{"matchExpressions":[{"key":"prometheus","operator":"In","values":["k8s-system"]}]},"namespaces":["kubesphere-monitoring-system"],"topologyKey":"kubernetes.io/hostname"},"weight":100}]}},"baseImage":"dockerhub.qingcloud.com/prometheus/prometheus","imagePullSecrets":[{"name":"qingcloud"}],"nodeSelector":{"beta.kubernetes.io/os":"linux"},"query":{"maxConcurrency":1000},"replicas":2,"resources":{"limits":{"cpu":"2.5","memory":"2Gi"},"requests":{"cpu":"60m","memory":"400Mi"}},"retention":"7d","ruleSelector":{"matchLabels":{"prometheus":"k8s","role":"alert-rules"}},"scrapeInterval":"1m","secrets":["kube-etcd-client-certs"],"securityContext":{"fsGroup":0,"runAsNonRoot":false,"runAsUser":0},"serviceAccountName":"prometheus-k8s","serviceMonitorNamespaceSelector":{},"serviceMonitorSelector":{"matchExpressions":[{"key":"k8s-app","operator":"In","values":["etcd","coredns","apiserver","prometheus","kube-scheduler","kube-controller-manager"]}]},"storage":{"volumeClaimTemplate":{"spec":{"resources":{"requests":{"storage":"20Gi"}},"storageClassName":null}}},"tolerations":[{"effect":"NoSchedule","key":"dedicated","operator":"Equal","value":"monitoring"}],"version":"v2.5.0"}}\n"}, "creationTimestamp":"2019-10-25T19:22:48Z", "generation":1, "labels":map[string]interface {}{"prometheus":"k8s-system"}, "name":"k8s-system", "namespace":"kubesphere-monitoring-system", "uid":"868782a4-2536-4662-967d-84aa8139d21d"}, "spec":map[string]interface {}{"additionalScrapeConfigs":map[string]interface {}{"key":"prometheus-additional.yaml", "name":"additional-scrape-configs"}, "affinity":map[string]interface {}{"podAntiAffinity":map[string]interface {}{"preferredDuringSchedulingIgnoredDuringExecution":[]interface {}{map[string]interface {}{"podAffinityTerm":map[string]interface {}{"labelSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"prometheus", "operator":"In", "values":[]interface {}{"k8s-system"}}}}, "namespaces":[]interface {}{"kubesphere-monitoring-system"}, "topologyKey":"kubernetes.io/hostname"}, "weight":100}}}}, "baseImage":"dockerhub.qingcloud.com/prometheus/prometheus", "imagePullSecrets":[]interface {}{map[string]interface {}{"name":"qingcloud"}}, "nodeSelector":map[string]interface {}{"beta.kubernetes.io/os":"linux"}, "query":map[string]interface {}{"maxConcurrency":1000}, "replicas":2, "resources":map[string]interface {}{"limits":map[string]interface {}{"cpu":"2.5", "memory":"2Gi"}, "requests":map[string]interface {}{"cpu":"60m", "memory":"400Mi"}}, "retention":"7d", "ruleSelector":map[string]interface {}{"matchLabels":map[string]interface {}{"prometheus":"k8s", "role":"alert-rules"}}, "scrapeInterval":"1m", "secrets":[]interface {}{"kube-etcd-client-certs"}, "securityContext":map[string]interface {}{"fsGroup":0, "runAsNonRoot":false, "runAsUser":0}, "serviceAccountName":"prometheus-k8s", "serviceMonitorNamespaceSelector":map[string]interface {}{}, "serviceMonitorSelector":map[string]interface {}{"matchExpressions":[]interface {}{map[string]interface {}{"key":"k8s-app", "operator":"In", "values":[]interface {}{"etcd", "coredns", "apiserver", "prometheus", "kube-scheduler", "kube-controller-manager"}}}}, "storage":map[string]interface {}{"volumeClaimTemplate":map[string]interface {}{"spec":map[string]interface {}{"resources":map[string]interface {}{"requests":map[string]interface {}{"storage":"20Gi"}}, "storageClassName":interface {}(nil)}}}, "tolerations":[]interface {}{map[string]interface {}{"effect":"NoSchedule", "key":"dedicated", "operator":"Equal", "value":"monitoring"}}, "version":"v2.5.0"}}: validation failure list:", "spec.storage.volumeClaimTemplate.spec.storageClassName in body must be of type string: "null""], "stdout": "secret/additional-scrape-configs unchanged\nclusterrole.rbac.authorization.k8s.io/kube-state-metrics unchanged\nclusterrolebinding.rbac.authorization.k8s.io/kube-state-metrics unchanged\ndeployment.apps/kube-state-metrics unchanged\nrole.rbac.authorization.k8s.io/kube-state-metrics unchanged\nrolebinding.rbac.authorization.k8s.io/kube-state-metrics unchanged\nservice/kube-state-metrics unchanged\nserviceaccount/kube-state-metrics unchanged\nservicemonitor.monitoring.coreos.com/kube-state-metrics unchanged\nclusterrole.rbac.authorization.k8s.io/node-exporter unchanged\nclusterrolebinding.rbac.authorization.k8s.io/node-exporter unchanged\ndaemonset.apps/node-exporter configured\nservice/node-exporter unchanged\nserviceaccount/node-exporter unchanged\nservicemonitor.monitoring.coreos.com/node-exporter unchanged\nclusterrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nclusterrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nendpoints/etcd unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s-config unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s-config unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nrole.rbac.authorization.k8s.io/prometheus-k8s unchanged\nprometheusrule.monitoring.coreos.com/prometheus-k8s-rules unchanged\nservice/prometheus-k8s unchanged\nserviceaccount/prometheus-k8s unchanged\nservice/etcd configured\nservice/kube-controller-manager unchanged\nservice/kube-scheduler unchanged\nservicemonitor.monitoring.coreos.com/prometheus unchanged\nservicemonitor.monitoring.coreos.com/kube-apiserver unchanged\nservicemonitor.monitoring.coreos.com/coredns unchanged\nservicemonitor.monitoring.coreos.com/etcd unchanged\nservicemonitor.monitoring.coreos.com/kube-controller-manager unchanged\nservicemonitor.monitoring.coreos.com/kube-scheduler unchanged\nservicemonitor.monitoring.coreos.com/kubelet unchanged\nservicemonitor.monitoring.coreos.com/prometheus-system unchanged\nservice/prometheus-k8s-system unchanged", "stdout_lines": ["secret/additional-scrape-configs unchanged", "clusterrole.rbac.authorization.k8s.io/kube-state-metrics unchanged", "clusterrolebinding.rbac.authorization.k8s.io/kube-state-metrics unchanged", "deployment.apps/kube-state-metrics unchanged", "role.rbac.authorization.k8s.io/kube-state-metrics unchanged", "rolebinding.rbac.authorization.k8s.io/kube-state-metrics unchanged", "service/kube-state-metrics unchanged", "serviceaccount/kube-state-metrics unchanged", "servicemonitor.monitoring.coreos.com/kube-state-metrics unchanged", "clusterrole.rbac.authorization.k8s.io/node-exporter unchanged", "clusterrolebinding.rbac.authorization.k8s.io/node-exporter unchanged", "daemonset.apps/node-exporter configured", "service/node-exporter unchanged", "serviceaccount/node-exporter unchanged", "servicemonitor.monitoring.coreos.com/node-exporter unchanged", "clusterrole.rbac.authorization.k8s.io/prometheus-k8s unchanged", "clusterrolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "endpoints/etcd unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s-config unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "rolebinding.rbac.authorization.k8s.io/prometheus-k8s unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s-config unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s unchanged", "role.rbac.authorization.k8s.io/prometheus-k8s unchanged", "prometheusrule.monitoring.coreos.com/prometheus-k8s-rules unchanged", "service/prometheus-k8s unchanged", "serviceaccount/prometheus-k8s unchanged", "service/etcd configured", "service/kube-controller-manager unchanged", "service/kube-scheduler unchanged", "servicemonitor.monitoring.coreos.com/prometheus unchanged", "servicemonitor.monitoring.coreos.com/kube-apiserver unchanged", "servicemonitor.monitoring.coreos.com/coredns unchanged", "servicemonitor.monitoring.coreos.com/etcd unchanged", "servicemonitor.monitoring.coreos.com/kube-controller-manager unchanged", "servicemonitor.monitoring.coreos.com/kube-scheduler unchanged", "servicemonitor.monitoring.coreos.com/kubelet unchanged", "servicemonitor.monitoring.coreos.com/prometheus-system unchanged", "service/prometheus-k8s-system unchanged"]} PLAY RECAP ********************************************************************* localhost : ok=61 changed=52 unreachable=0 failed=1 skipped=9 rescued=0 ignored=0 |
@kissingtiger |
1.system:
cat /etc/redhat-release
CentOS Linux release 7.7.1908 (Core)
2.kubernetes version:
kubectl version | grep Server
Server Version: version.Info{Major:"1", Minor:"15", GitVersion:"v1.15.3", GitCommit:"2d3c76f9091b6bec110a5e63777c332469e0cba2", GitTreeState:"clean", BuildDate:"2019-08-19T11:05:50Z", GoVersion:"go1.12.9", Compiler:"gc", Platform:"linux/amd64"}
3.helm version:
helm version
Client: &version.Version{SemVer:"v2.15.1", GitCommit:"cf1de4f8ba70eded310918a8af3a96bfe8e7683b", GitTreeState:"clean"}
Server: &version.Version{SemVer:"v2.15.1", GitCommit:"cf1de4f8ba70eded310918a8af3a96bfe8e7683b", GitTreeState:"clean"}
4.storageClass:
kubectl get sc
NAME PROVISIONER AGE
thin-disk kubernetes.io/vsphere-volume 10h
5.error logs:
kubectl logs -n kubesphere-system $(kubectl get pod -n kubesphere-system -l job-name=kubesphere-installer -o jsonpath='{.items[0].metadata.name}') -f
[WARNING]: provided hosts list is empty, only localhost is available. Note
that the implicit localhost does not match 'all'
PLAY [localhost] ***************************************************************
TASK [download : include_tasks] ************************************************
skipping: [localhost]
TASK [download : Download items] ***********************************************
skipping: [localhost]
TASK [download : Sync container] ***********************************************
skipping: [localhost]
TASK [kubesphere-defaults : Configure defaults] ********************************
ok: [localhost] => {
}
TASK [ks-devops/sonarqube : ks-devops | Creating ks-jenkins webhook(external)] ***
skipping: [localhost]
TASK [ks-devops/sonarqube : ks-devops | Getting sonarqube installation files] ***
changed: [localhost]
TASK [ks-devops/sonarqube : Sonarqube | Creating manifests] ********************
changed: [localhost] => (item={u'name': u'custom-values-sonarqube', u'file': u'custom-values-sonarqube.yaml'})
TASK [ks-devops/sonarqube : Sonarqube | Deploy Sonarqube] **********************
fatal: [localhost]: FAILED! => {"changed": true, "cmd": "/usr/local/bin/helm upgrade --install ks-sonarqube /etc/kubesphere/sonarqube/sonarqube-0.13.5.tgz -f /etc/kubesphere/sonarqube/custom-values-sonarqube.yaml --namespace kubesphere-devops-system\n", "delta": "0:00:01.665860", "end": "2019-10-25 18:20:48.887010", "msg": "non-zero return code", "rc": 1, "start": "2019-10-25 18:20:47.221150", "stderr": "Error: UPGRADE FAILED: configmaps is forbidden: User "system:serviceaccount:kube-system:default" cannot list resource "configmaps" in API group "" in the namespace "kube-system"", "stderr_lines": ["Error: UPGRADE FAILED: configmaps is forbidden: User "system:serviceaccount:kube-system:default" cannot list resource "configmaps" in API group "" in the namespace "kube-system""], "stdout": "", "stdout_lines": []}
PLAY RECAP *********************************************************************
localhost : ok=3 changed=2 unreachable=0 failed=1 skipped=4 rescued=0 ignored=0
The text was updated successfully, but these errors were encountered: