2024年6月14日发(作者:)

writing new private key to '/var/run/kubernetes/'

-----

Generating a 2048 bit RSA private key

..................................+++

...............+++

writing new private key to '/var/run/kubernetes/'

-----

Generating a 2048 bit RSA private key

....+++

.........+++

writing new private key to '/var/run/kubernetes/'

-----

2018/01/13 16:05:35 [INFO] generate received request

2018/01/13 16:05:35 [INFO] received CSR

2018/01/13 16:05:35 [INFO] generating key: rsa-2048

2018/01/13 16:05:35 [INFO] encoded CSR

2018/01/13 16:05:35 [INFO] signed certificate with serial number 3953593629775

2018/01/13 16:05:35 [INFO] generate received request [57/125]

2018/01/13 16:05:35 [INFO] received CSR

2018/01/13 16:05:35 [INFO] generating key: rsa-2048

2018/01/13 16:05:36 [INFO] encoded CSR

2018/01/13 16:05:36 [INFO] signed certificate with serial number 63821324992237

2018/01/13 16:05:36 [INFO] generate received request

2018/01/13 16:05:36 [INFO] received CSR

2018/01/13 16:05:36 [INFO] generating key: rsa-2048

2018/01/13 16:05:36 [INFO] encoded CSR

2018/01/13 16:05:36 [INFO] signed certificate with serial number 8793886257733983916547703

2018/01/13 16:05:37 [INFO] generate received request

2018/01/13 16:05:37 [INFO] received CSR

2018/01/13 16:05:37 [INFO] generating key: rsa-2048

2018/01/13 16:05:37 [INFO] encoded CSR

2018/01/13 16:05:37 [INFO] signed certificate with serial number 2976899918496

2018/01/13 16:05:37 [INFO] generate received request

2018/01/13 16:05:37 [INFO] received CSR

2018/01/13 16:05:37 [INFO] generating key: rsa-2048

2018/01/13 16:05:38 [INFO] encoded CSR

2018/01/13 16:05:38 [INFO] signed certificate with serial number 41486821458

2018/01/13 16:05:38 [INFO] generate received request

2018/01/13 16:05:38 [INFO] received CSR

2018/01/13 16:05:38 [INFO] generating key: rsa-2048

2018/01/13 16:05:38 [INFO] encoded CSR

2018/01/13 16:05:38 [INFO] signed certificate with serial number 47627885877844

2018/01/13 16:05:38 [INFO] generate received request

2018/01/13 16:05:38 [INFO] received CSR

2018/01/13 16:05:38 [INFO] generating key: rsa-2048

2018/01/13 16:05:38 [INFO] encoded CSR [29/125]

2018/01/13 16:05:38 [INFO] signed certificate with serial number 467985974367

2018/01/13 16:05:38 [INFO] generate received request

2018/01/13 16:05:38 [INFO] received CSR

2018/01/13 16:05:38 [INFO] generating key: rsa-2048

2018/01/13 16:05:39 [INFO] encoded CSR

2018/01/13 16:05:39 [INFO] signed certificate with serial number 32928358922981566876453

2018/01/13 16:05:39 [INFO] generate received request

2018/01/13 16:05:39 [INFO] received CSR

2018/01/13 16:05:39 [INFO] generating key: rsa-2048

2018/01/13 16:05:40 [INFO] encoded CSR

2018/01/13 16:05:40 [INFO] signed certificate with serial number 6

Waiting for apiserver to come up

+++ [0113 16:05:51] On try 8, apiserver: : ok

Cluster "local-up-cluster" set.

use 'kubectl --kubeconfig=/var/run/kubernetes/nfig' to use the aggregated API server

service "kube-dns" created

serviceaccount "kube-dns" created

configmap "kube-dns" created

deployment "kube-dns" created

Kube-dns addon successfully deployed.

kubelet ( 14035 ) is running.

Create default storage class for

storageclass "standard" created

Local Kubernetes cluster is running. Press Ctrl-C to shut it down.

Logs:

/tmp/

/tmp/ [1/125]

/tmp/

/tmp/

/tmp/

To start using your cluster, you can open up another terminal/tab and run:

export KUBECONFIG=/var/run/kubernetes/nfig

cluster/

Alternatively, you can write to the default kubeconfig:

export KUBERNETES_PROVIDER=local

cluster/ config set-cluster local --server=localhost:6443 --certificate-authority=/var/run/kubernetes/server-ca.

crt

cluster/ config set-credentials myself --client-key=/var/run/kubernetes/ --client-certificate=/var/run/k

ubernetes/

cluster/ config set-context local --cluster=local --user=myself

cluster/ config use-context local

cluster/

./hack/: line 1018: 13894 Killed ${CONTROLPLANE_SUDO} "${GO_OUT}/hyperkube" controller-manager -

-v=${LOG_LEVEL} --vmodule="${LOG_SPEC}" --service-account-private-key-file="${SERVICE_ACCOUNT_KEY}" --root-ca-file="${ROOT_CA_FILE}"

--cluster-signing-cert-file="${CLUSTER_SIGNING_CERT_FILE}" --cluster-signing-key-file="${CLUSTER_SIGNING_KEY_FILE}" --enable-hostpa

th-provisioner="${ENABLE_HOSTPATH_PROVISIONER}" ${node_cidr_args} --pvclaimbinder-sync-period="${CLAIM_BINDER_SYNC_PERIOD}" --featur

e-gates="${FEATURE_GATES}" ${cloud_config_arg} --kubeconfig "$CERT_DIR"/nfig --use-service-account-credentials --co

ntrollers="${KUBE_CONTROLLERS}" --master="${API_HOST}:${API_SECURE_PORT}" > "${CTLRMGR_LOG}" 2>&1

View Code

$ go get /derekparker/delve/cmd/dlv

$ ps -ef |grep "hyperkube apiserver"

$ sudo sysctl -w =0

$ cat >> ~/.bashrc <<<'

GOROOT=`go env |grep "GOROOT" |cut -d "=" -f2`

GOROOT=${GOROOT#"}

GOROOT=${GOROOT%"}

GOPATH=`go env |grep GOPATH |cut -d "=" -f 2`

GOPATH=${GOPATH%"}

GOPATH=${GOPATH#"}

export PATH="$PATH:$GOROOT/bin:$GOPATH/bin"'

$ source ~/.bashrc

$ sudo su

# echo 0 > /proc/sys/kernel/yama/ptrace_scope

# exit

$ sudo $GOPATH/bin/ attach $PID

or

$ curl localhost:8080/api/v1/pods

$ CERTDIR=/var/run/kubernetes

$ curl -i 127.0.0.1:6443/api/v1/pods --cert $CERTDIR/ --key $CERTDIR/ --cacert $CERTDIR/server-