prvng_platform/crates/data/tasks/d3b0d53f-6f70-4e09-97d9-bd1693f27d68.json

23 lines
No EOL
13 KiB
JSON

{
"id": "d3b0d53f-6f70-4e09-97d9-bd1693f27d68",
"name": "component_install_kubernetes",
"command": "bash",
"args": [
"-c",
"base64 -d < '/tmp/orchestrator_comp_d3b0d53f-6f70-4e09-97d9-bd1693f27d68.tar.gz.b64' > /tmp/kubernetes.tar.gz && scp -i '/Users/jesusperezlorenzo/.ssh/htz_ops' /tmp/kubernetes.tar.gz 'root@libre-wuji-cp-0:/tmp/' && ssh -i '/Users/jesusperezlorenzo/.ssh/htz_ops' 'root@libre-wuji-cp-0' 'rm -rf /tmp/kubernetes && mkdir -p /tmp/kubernetes && tar xzf /tmp/kubernetes.tar.gz -C /tmp/kubernetes && cd /tmp/kubernetes && sudo bash install-kubernetes.sh install ; rc=$?; rm -f /tmp/kubernetes.tar.gz && rm -rf /tmp/kubernetes; exit $rc' ; rc=$?; rm -f '/tmp/orchestrator_comp_d3b0d53f-6f70-4e09-97d9-bd1693f27d68.tar.gz.b64' /tmp/kubernetes.tar.gz; exit $rc"
],
"dependencies": [],
"status": "Completed",
"created_at": "2026-04-21T02:11:19.972626Z",
"started_at": "2026-04-21T02:11:20.201878Z",
"completed_at": "2026-04-21T02:11:55.167529Z",
"output": "Hit:1 http://mirror.hetzner.com/debian/packages bookworm InRelease\nHit:2 http://deb.debian.org/debian bookworm InRelease\nHit:3 http://security.debian.org/debian-security bookworm-security InRelease\nHit:4 http://mirror.hetzner.com/debian/packages bookworm-backports InRelease\nHit:5 http://mirror.hetzner.com/debian/packages bookworm-updates InRelease\nHit:6 http://mirror.hetzner.com/debian/security bookworm-security InRelease\nHit:7 http://deb.debian.org/debian bookworm-updates InRelease\nReading package lists...\nReading package lists...\nBuilding dependency tree...\nReading state information...\napt-transport-https is already the newest version (2.6.1).\ncurl is already the newest version (7.88.1-10+deb12u14).\nThe following NEW packages will be installed:\n gnupg2\n0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.\nNeed to get 446 kB of archives.\nAfter this operation, 465 kB of additional disk space will be used.\nGet:1 http://deb.debian.org/debian bookworm/main arm64 gnupg2 all 2.2.40-1.1+deb12u2 [446 kB]\nFetched 446 kB in 0s (10.8 MB/s)\nSelecting previously unselected package gnupg2.\r\n(Reading database ... \r(Reading database ... 5%\r(Reading database ... 10%\r(Reading database ... 15%\r(Reading database ... 20%\r(Reading database ... 25%\r(Reading database ... 30%\r(Reading database ... 35%\r(Reading database ... 40%\r(Reading database ... 45%\r(Reading database ... 50%\r(Reading database ... 55%\r(Reading database ... 60%\r(Reading database ... 65%\r(Reading database ... 70%\r(Reading database ... 75%\r(Reading database ... 80%\r(Reading database ... 85%\r(Reading database ... 90%\r(Reading database ... 95%\r(Reading database ... 100%\r(Reading database ... 41877 files and directories currently installed.)\r\nPreparing to unpack .../gnupg2_2.2.40-1.1+deb12u2_all.deb ...\r\nUnpacking gnupg2 (2.2.40-1.1+deb12u2) ...\r\nSetting up gnupg2 (2.2.40-1.1+deb12u2) ...\r\nProcessing triggers for man-db (2.11.2-2) ...\r\nHit:1 http://mirror.hetzner.com/debian/packages bookworm InRelease\nHit:2 http://deb.debian.org/debian bookworm InRelease\nHit:3 http://security.debian.org/debian-security bookworm-security InRelease\nHit:4 http://mirror.hetzner.com/debian/packages bookworm-backports InRelease\nHit:5 http://mirror.hetzner.com/debian/packages bookworm-updates InRelease\nHit:6 http://mirror.hetzner.com/debian/security bookworm-security InRelease\nHit:7 http://deb.debian.org/debian bookworm-updates InRelease\nGet:8 https://prod-cdn.packages.k8s.io/repositories/isv:/kubernetes:/core:/stable:/v1.35/deb InRelease [1227 B]\nGet:9 https://prod-cdn.packages.k8s.io/repositories/isv:/kubernetes:/core:/stable:/v1.35/deb Packages [7603 B]\nFetched 8830 B in 1s (7120 B/s)\nReading package lists...\nkubelet was already not on hold.\nkubectl was already not on hold.\nkubeadm was already not on hold.\nReading package lists...\nBuilding dependency tree...\nReading state information...\nThe following additional packages will be installed:\n cri-tools kubernetes-cni\nThe following NEW packages will be installed:\n cri-tools kubeadm kubectl kubelet kubernetes-cni\n0 upgraded, 5 newly installed, 0 to remove and 0 not upgraded.\nNeed to get 81.7 MB of archives.\nAfter this operation, 311 MB of additional disk space will be used.\nGet:1 https://prod-cdn.packages.k8s.io/repositories/isv:/kubernetes:/core:/stable:/v1.35/deb cri-tools 1.35.0-1.1 [14.5 MB]\nGet:2 https://prod-cdn.packages.k8s.io/repositories/isv:/kubernetes:/core:/stable:/v1.35/deb kubeadm 1.35.4-1.1 [10.6 MB]\nGet:3 https://prod-cdn.packages.k8s.io/repositories/isv:/kubernetes:/core:/stable:/v1.35/deb kubectl 1.35.4-1.1 [9768 kB]\nGet:4 https://prod-cdn.packages.k8s.io/repositories/isv:/kubernetes:/core:/stable:/v1.35/deb kubernetes-cni 1.8.0-1.1 [36.0 MB]\nGet:5 https://prod-cdn.packages.k8s.io/repositories/isv:/kubernetes:/core:/stable:/v1.35/deb kubelet 1.35.4-1.1 [10.8 MB]\nFetched 81.7 MB in 1s (91.0 MB/s)\nSelecting previously unselected package cri-tools.\r\n(Reading database ... \r(Reading database ... 5%\r(Reading database ... 10%\r(Reading database ... 15%\r(Reading database ... 20%\r(Reading database ... 25%\r(Reading database ... 30%\r(Reading database ... 35%\r(Reading database ... 40%\r(Reading database ... 45%\r(Reading database ... 50%\r(Reading database ... 55%\r(Reading database ... 60%\r(Reading database ... 65%\r(Reading database ... 70%\r(Reading database ... 75%\r(Reading database ... 80%\r(Reading database ... 85%\r(Reading database ... 90%\r(Reading database ... 95%\r(Reading database ... 100%\r(Reading database ... 41884 files and directories currently installed.)\r\nPreparing to unpack .../cri-tools_1.35.0-1.1_arm64.deb ...\r\nUnpacking cri-tools (1.35.0-1.1) ...\r\nSelecting previously unselected package kubeadm.\r\nPreparing to unpack .../kubeadm_1.35.4-1.1_arm64.deb ...\r\nUnpacking kubeadm (1.35.4-1.1) ...\r\nSelecting previously unselected package kubectl.\r\nPreparing to unpack .../kubectl_1.35.4-1.1_arm64.deb ...\r\nUnpacking kubectl (1.35.4-1.1) ...\r\nSelecting previously unselected package kubernetes-cni.\r\nPreparing to unpack .../kubernetes-cni_1.8.0-1.1_arm64.deb ...\r\nUnpacking kubernetes-cni (1.8.0-1.1) ...\r\nSelecting previously unselected package kubelet.\r\nPreparing to unpack .../kubelet_1.35.4-1.1_arm64.deb ...\r\nUnpacking kubelet (1.35.4-1.1) ...\r\nSetting up kubectl (1.35.4-1.1) ...\r\nSetting up cri-tools (1.35.0-1.1) ...\r\nSetting up kubernetes-cni (1.8.0-1.1) ...\r\nSetting up kubeadm (1.35.4-1.1) ...\r\nSetting up kubelet (1.35.4-1.1) ...\r\nkubelet set on hold.\nkubectl set on hold.\nkubeadm set on hold.\n[init] Using Kubernetes version: v1.35.4\n[preflight] Running pre-flight checks\n[preflight] Pulling images required for setting up a Kubernetes cluster\n[preflight] This might take a minute or two, depending on the speed of your internet connection\n[preflight] You can also perform this action beforehand using 'kubeadm config images pull'\n[certs] Using certificateDir folder \"/etc/kubernetes/pki\"\n[certs] Generating \"ca\" certificate and key\n[certs] Generating \"apiserver\" certificate and key\n[certs] apiserver serving cert is signed for DNS names [kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.libre-wuji.local libre-wuji libre-wuji-cp-0] and IPs [10.96.0.1 10.0.8.20 127.0.0.1 ::1]\n[certs] Generating \"apiserver-kubelet-client\" certificate and key\n[certs] Generating \"front-proxy-ca\" certificate and key\n[certs] Generating \"front-proxy-client\" certificate and key\n[certs] Generating \"etcd/ca\" certificate and key\n[certs] Generating \"etcd/server\" certificate and key\n[certs] etcd/server serving cert is signed for DNS names [libre-wuji-cp-0 localhost] and IPs [10.0.8.20 127.0.0.1 ::1]\n[certs] Generating \"etcd/peer\" certificate and key\n[certs] etcd/peer serving cert is signed for DNS names [libre-wuji-cp-0 localhost] and IPs [10.0.8.20 127.0.0.1 ::1]\n[certs] Generating \"etcd/healthcheck-client\" certificate and key\n[certs] Generating \"apiserver-etcd-client\" certificate and key\n[certs] Generating \"sa\" key and public key\n[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n[kubeconfig] Writing \"admin.conf\" kubeconfig file\n[kubeconfig] Writing \"super-admin.conf\" kubeconfig file\n[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/instance-config.yaml\"\n[patches] Applied patch of type \"application/strategic-merge-patch+json\" to target \"kubeletconfiguration\"\n[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n[kubelet-start] Starting the kubelet\n[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\"\n[kubelet-check] Waiting for a healthy kubelet at http://127.0.0.1:10248/healthz. This can take up to 4m0s\n[kubelet-check] The kubelet is healthy after 501.576213ms\n[control-plane-check] Waiting for healthy control plane components. This can take up to 4m0s\n[control-plane-check] Checking kube-apiserver at https://10.0.8.20:6443/livez\n[control-plane-check] Checking kube-controller-manager at https://127.0.0.1:10257/healthz\n[control-plane-check] Checking kube-scheduler at https://127.0.0.1:10259/livez\n[control-plane-check] kube-controller-manager is healthy after 1.014367313s\n[control-plane-check] kube-scheduler is healthy after 3.198203942s\n[control-plane-check] kube-apiserver is healthy after 5.001868131s\n[upload-config] Storing the configuration used in ConfigMap \"kubeadm-config\" in the \"kube-system\" Namespace\n[kubelet] Creating a ConfigMap \"kubelet-config\" in namespace kube-system with the configuration for the kubelets in the cluster\n[upload-certs] Skipping phase. Please see --upload-certs\n[mark-control-plane] Marking the node libre-wuji-cp-0 as control-plane by adding the labels: [node-role.kubernetes.io/control-plane node.kubernetes.io/exclude-from-external-load-balancers]\n[bootstrap-token] Using token: aejeza.0y5qrxlzya0kkhpp\n[bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles\n[bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to get nodes\n[bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials\n[bootstrap-token] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token\n[bootstrap-token] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster\n[bootstrap-token] Creating the \"cluster-info\" ConfigMap in the \"kube-public\" namespace\n[kubelet-finalize] Updating \"/etc/kubernetes/kubelet.conf\" to point to a rotatable kubelet client certificate and key\n[addons] Applied essential addon: CoreDNS\n\nYour Kubernetes control-plane has initialized successfully!\n\nTo start using your cluster, you need to run the following as a regular user:\n\n mkdir -p $HOME/.kube\n sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config\n sudo chown $(id -u):$(id -g) $HOME/.kube/config\n\nAlternatively, if you are the root user, you can run:\n\n export KUBECONFIG=/etc/kubernetes/admin.conf\n\nYou should now deploy a pod network to the cluster.\nRun \"kubectl apply -f [podnetwork].yaml\" with one of the options listed at:\n https://kubernetes.io/docs/concepts/cluster-administration/addons/\n\nYou can now join any number of control-plane nodes by copying certificate authorities\nand service account keys on each node and then running the following as root:\n\n kubeadm join 10.0.8.20:6443 --token aejeza.0y5qrxlzya0kkhpp \\\n\t--discovery-token-ca-cert-hash sha256:7719ca049ee2c1c012c7cebb9e324f0dd6d505acb5196cd0ead327daeaf1d350 \\\n\t--control-plane \n\nThen you can join any number of worker nodes by running the following on each as root:\n\nkubeadm join 10.0.8.20:6443 --token aejeza.0y5qrxlzya0kkhpp \\\n\t--discovery-token-ca-cert-hash sha256:7719ca049ee2c1c012c7cebb9e324f0dd6d505acb5196cd0ead327daeaf1d350 \nprobes patched\n2026_04_21_021152 | apiserver probes patched: startup=300s liveness=120s readiness=15s\n2026_04_21_021152 | etcd endpoints reordered: https://127.0.0.1:2379,https://127.0.0.1:2379\nUpdating certificates in /etc/ssl/certs...\n1 added, 0 removed; done.\nRunning hooks in /etc/ca-certificates/update.d...\ndone.\n[addons] Applied essential addon: CoreDNS\nruntimeclass.node.k8s.io/runc created\n2026_04_21_021154 | Waiting for RBAC bootstrap to complete...\n2026_04_21_021154 | RBAC bootstrap complete (attempt 1)\n",
"error": null,
"tags": {
"workspace": "/Users/Akasha/project-provisioning/workspaces/libre-wuji",
"server": "libre-wuji-cp-0",
"operation": "install",
"component": "kubernetes",
"type": "component"
}
}