-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dynamic EBS storage "no volume plugin found" #1037
Comments
I somehow missed the cloudprovider plugins are removed in k3s. Looking for other solutions |
You should be able to set those flags in v0.10.2, I am not able to reproduce the error |
@erikwilson I'm attempting to reproduce. What would |
Hi Everyone, I managed to resolve the issue by the help of installing the CSI driver of AWS EBS and EFS to my k3s cluster. References
Important notes
kubectl set image daemonset/efs-csi-node efs-plugin=amazon/aws-efs-csi-driver:v0.2.0 -n kube-system
kubectl set image daemonset/efs-csi-node csi-driver-registrar=quay.io/k8scsi/csi-node-driver-registrar:v1.1.0 -n kube-system
kubectl set image daemonset/efs-csi-node liveness-probe=quay.io/k8scsi/livenessprobe:v1.1.0 -n kube-system
kubectl set image daemonset/ebs-csi-node liveness-probe=quay.io/k8scsi/livenessprobe:v1.1.0 -n kube-system
kubectl set image daemonset/ebs-csi-node node-driver-registrar=quay.io/k8scsi/csi-node-driver-registrar:v1.1.0 -n kube-system
kubectl set image daemonset/ebs-csi-node ebs-plugin=amazon/aws-ebs-csi-driver:v0.4.0 -n kube-system |
@vkim-rogers, Thanks for your help. I'm attempting to follow the AWS EBS CSI driver instructions you mentioned. But I don't have a aws-auth configmap as mentioned in the instructions. Hence running
Just gives:
How did you get the rolearn without that command? Thanks again. |
Thanks @vkim-rogers, that got me going as well! You can skip that part if you assign the policies to the ec2 instances some other way. You just need to be able to do run commands like For example I have my EC2 InstanceProfiles set up like this in CloudFormation now:
I ran the following commands in this order:
Using the old versions of these above resulted in the ebs-csi-node pods failing their healthchecks. This seemed to be because of this issue: kubernetes-sigs/aws-ebs-csi-driver#494 when running I did edit the DaemonSet with the following based on some things I found in the aws-ebs-csi-driver repo:
Old:
New:
My StorageClass definition looks like this:
PVC:
|
Version:
k3s version v0.10.2 (8833bfd9)
curl -sfL https://get.k3s.io | INSTALL_K3S_EXEC=\"server --bind-address 0.0.0.0\" sh -
Describe the bug
I've created the ebs storageclass with the manifest:
When I create/describe a pvc, I'm given:
journalctl:
To Reproduce
Follow recommended EBS steps.
Expected behavior
PVC is created
Actual behavior
Shown in logs
Additional context
So, I can't find any documented successes of getting this working in k3s. Per the cloud-provider-aws repo the only requirement is to run the kubernetes components with
--cloud-provider=external
I see some components are deployed with it, but when I was greeted with the error
time="2019-11-08T19:56:23Z" level=fatal msg="flag provided but not defined: -cloud-provider"
When I deploy with
curl -sfL https://get.k3s.io | INSTALL_K3S_EXEC="server --bind-address 0.0.0.0 --kube-apiserver-arg cloud-provider=external --kube-controller-arg cloud-provider=external --kubelet-arg cloud-provider=external" sh -
The text was updated successfully, but these errors were encountered: