Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add masternode privileges to existing nodes #2896

Open
redtiger08 opened this issue May 18, 2023 · 0 comments
Open

Add masternode privileges to existing nodes #2896

redtiger08 opened this issue May 18, 2023 · 0 comments

Comments

@redtiger08
Copy link

https://www.kubesphere.io/docs/v3.3/installing-on-linux/cluster-operation/add-new-nodes/

I added a master node to the existing node and ran it, but only a message saying that it was successful came out and the value did not change.
I think the hosts setting is also finished. Anything I need to add?

Below is my sample.yaml

09:56:21 KST Pipeline[AddNodesPipeline] execute successfully
[root@bu20-04 kubernetes]# kubectl get nodes
NAME STATUS ROLES AGE VERSION
bu20-04 Ready control-plane,master 7d22h v1.23.7
bu20-05 Ready worker 7d22h v1.23.7
bu20-06 Ready worker 7d22h v1.23.7

apiVersion: kubekey.kubesphere.io/v1alpha2
kind: Cluster
metadata:
name: sample
spec:
hosts:

  • {name: bu20-04, address: 192.168.137.234, internalAddress: 192.168.137.234, user: root, password: "1111"}

  • {name: bu20-05, address: 192.168.137.235, internalAddress: 192.168.137.235, user: root, password: "1111"}

  • {name: bu20-06, address: 192.168.137.236, internalAddress: 192.168.137.236, user: root, password: "1111"}
    roleGroups:
    etcd:

    • bu20-04
      control-plane:
    • bu20-04
    • bu20-05
      worker:
    • bu20-05
    • bu20-06
      controlPlaneEndpoint:

    Internal loadbalancer for apiservers

    internalLoadbalancer: haproxy

    domain: lb.kubesphere.local
    addres: "192.168.137.13"
    port: 6443
    kubernetes:
    version: v1.23.7
    clusterName: cluster.local
    autoRenewCerts: true
    containerManager: docker
    etcd:
    type: kubekey
    network:
    plugin: calico
    kubePodsCIDR: 10.233.64.0/18
    kubeServiceCIDR: 10.233.0.0/18

    multus support. https://github.com/k8snetworkplumbingwg/multus-cni

    multusCNI:
    enabled: false
    registry:
    privateRegistry: ""
    namespaceOverride: ""
    registryMirrors: []
    insecureRegistries: []
    addons: []
    openpitrix:
    store:
    enabled: true

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant