-
Notifications
You must be signed in to change notification settings - Fork 86
Open
Labels
awaiting-feedbackBlocked on input from the authorBlocked on input from the author
Description
Hi,
thank you for your work on this!!
I am trying to bootstrap an EKS cluster with a system nodegroup
1.
It always fails on the first run while creating the coredns addon
aws:eks:Addon (devsandbox-coredns):
error: sdk-v2/provider2.go:566: sdk.helper_schema: waiting for EKS Add-On (devsandbox:coredns) create: timeout while waiting for state to become 'ACTIVE' (last state: 'DEGRADED', timeout: 20m0s): [email protected]
error: 1 error occurred:
* creating urn:pulumi:devsandbox::k8s::eks:index:Cluster$aws:eks/addon:Addon::devsandbox-coredns: 1 error occurred:
* waiting for EKS Add-On (devsandbox:coredns) create: timeout while waiting for state to become 'ACTIVE' (last state: 'DEGRADED', timeout: 20m0s)
which seems sane, as at this point there are no worker-nodes where coredns could run?
on the second it goes on, while the coredns addon remains in "Degraded" status
2.
The stack has created an autoscaling group but it is not added to the cluster?
cluster_name = "mycluster"
subnet_ids = get_eks_subnets() # list of subnet id's
# Create the EKS Cluster
cluster = eks.Cluster(cluster_name,
name=cluster_name,
authentication_mode=eks.AuthenticationMode.API,
access_entries=get_access_entries(),
# default_addons_to_remove=["kube-proxy", "coredns", "vpc-cni"],
endpoint_private_access=True,
endpoint_public_access=False,
create_oidc_provider=True,
kubernetes_service_ip_address_range="172.20.0.0/16",
private_subnet_ids=subnet_ids,
vpc_id=vpc_id,
instance_type="t3.medium",
desired_capacity=2,
min_size=1,
max_size=6,
# Do not give worker nodes a public IP address
node_associate_public_ip_address=False,
)
output:
Updating (devsandbox):
Type Name Status
+ pulumi:pulumi:Stack k8s-devsandbox **creating failed (1787s)**
+ ├─ aws:iam:Role eks-nodegroup-role-devsandbox created (1s)
+ ├─ aws:iam:RolePolicyAttachment eks-cni-policy-attachment created (0.71s)
+ ├─ aws:iam:RolePolicyAttachment eks-worker-node-policy-attachment created (1s)
+ ├─ aws:iam:RolePolicyAttachment ec2-container-registry-read-only-attachment created (1s)
+ ├─ aws:iam:RolePolicyAttachment eks-nodegroup-policy-ssm-managed-instance-core created (1s)
+ └─ eks:index:Cluster devsandbox created (748s)
+ ├─ eks:index:ServiceRole devsandbox-instanceRole created (8s)
+ │ ├─ aws:iam:Role devsandbox-instanceRole-role created (2s)
+ │ ├─ aws:iam:RolePolicyAttachment devsandbox-instanceRole-e1b295bd created (1s)
+ │ ├─ aws:iam:RolePolicyAttachment devsandbox-instanceRole-3eb088f2 created (1s)
+ │ └─ aws:iam:RolePolicyAttachment devsandbox-instanceRole-03516f97 created (1s)
+ ├─ eks:index:ServiceRole devsandbox-eksRole created (9s)
+ │ ├─ aws:iam:Role devsandbox-eksRole-role created (1s)
+ │ └─ aws:iam:RolePolicyAttachment devsandbox-eksRole-4b490823 created (2s)
+ ├─ aws:ec2:SecurityGroup devsandbox-eksClusterSecurityGroup created (3s)
+ ├─ aws:ec2:SecurityGroupRule devsandbox-eksClusterInternetEgressRule created (0.86s)
+ ├─ aws:iam:InstanceProfile devsandbox-instanceProfile created (7s)
+ ├─ aws:eks:Cluster devsandbox-eksCluster created (557s)
+ ├─ pulumi:providers:kubernetes devsandbox-eks-k8s created (0.52s)
+ ├─ aws:ec2:SecurityGroup devsandbox-nodeSecurityGroup created (3s)
+ ├─ aws:eks:AccessEntry devsandbox-teamcity created (1s)
+ ├─ aws:eks:AccessEntry devsandbox-defaultNodeGroupInstanceRole created (2s)
+ ├─ aws:eks:AccessEntry devsandbox-SecurityAudit created (5s)
+ ├─ aws:eks:AccessEntry devsandbox-Admin-NonEU created (3s)
+ ├─ aws:iam:OpenIdConnectProvider devsandbox-oidcProvider created (3s)
+ ├─ aws:eks:AccessEntry devsandbox-gitlab created (4s)
+ ├─ aws:eks:Addon devsandbox-kube-proxy created (142s)
+ ├─ aws:eks:Addon devsandbox-coredns **creating failed**
+ ├─ aws:ec2:SecurityGroupRule devsandbox-eksNodeInternetEgressRule created (1s)
+ ├─ aws:ec2:SecurityGroupRule devsandbox-eksNodeClusterIngressRule created (4s)
+ ├─ aws:ec2:SecurityGroupRule devsandbox-eksClusterIngressRule created (2s)
+ ├─ aws:ec2:SecurityGroupRule devsandbox-eksNodeIngressRule created (3s)
+ ├─ aws:ec2:SecurityGroupRule devsandbox-eksExtApiServerClusterIngressRule created (3s)
+ ├─ eks:index:VpcCniAddon devsandbox-vpc-cni created (147s)
+ │ └─ aws:eks:Addon devsandbox-vpc-cni created (139s)
+ ├─ aws:ec2:LaunchTemplate devsandbox-launchTemplate created (9s)
+ └─ aws:autoscaling:Group devsandbox created (18s)
Diagnostics:
aws:eks:Addon (devsandbox-coredns):
error: sdk-v2/provider2.go:566: sdk.helper_schema: waiting for EKS Add-On (devsandbox:coredns) create: timeout while waiting for state to become 'ACTIVE' (last state: 'DEGRADED', timeout: 20m0s): [email protected]
error: 1 error occurred:
* creating urn:pulumi:devsandbox::k8s::eks:index:Cluster$aws:eks/addon:Addon::devsandbox-coredns: 1 error occurred:
* waiting for EKS Add-On (devsandbox:coredns) create: timeout while waiting for state to become 'ACTIVE' (last state: 'DEGRADED', timeout: 20m0s)
pulumi:pulumi:Stack (k8s-devsandbox):
error: update failed
error: Resource monitor has terminated, shutting down
Resources:
+ 37 created
Duration: 29m52s
➜ k8s git:(TVS-12394-fix-prodeu-kops) ✗ pulumi up -fy <aws:devsandbox>
warning: No value for configuration key "rds:postgres_instances". This is currently treated as an empty string `""`, but will be treated as `null` in a future version of pulumi.
Set the value to `""` to avoid this warning.
Updating (devsandbox):
Type Name Status
pulumi:pulumi:Stack k8s-devsandbox
├─ eks:index:Cluster devsandbox
~ │ └─ aws:eks:Addon devsandbox-coredns updated (1s)
+ └─ aws:ec2:SecurityGroupRule eks-control-plane-ingress-devsandbox created (2s)
Resources:
+ 1 created
~ 1 updated
2 changes. 37 unchanged
Duration: 27s
Metadata
Metadata
Assignees
Labels
awaiting-feedbackBlocked on input from the authorBlocked on input from the author