-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cluster creation fails with error 137 #3160
Comments
If it's failing when you add more nodes, it's typically a resource limitation, such as https://kind.sigs.k8s.io/docs/user/known-issues/#pod-errors-due-to-too-many-open-files We can't diagnose those without the |
So I do have much higher amount of file watchers configured than what is mentioned on page
Furthermore, I've uploaded logs here. |
from entrypoint logs
That's .... bizzare?
Those binaries are shipped with the image ... |
The specific inotify for Kubernetes requirement varies with the usage from the host environment (e.g. sometimes IDEs are already consuming many of them, depends on how many nodes etc), so knowing the amount doesn't help us much, but indeed the logs don't indicate it's related to that specficially as the nodes are exiting early during a simple filesystem operation. |
I think this is a variant of #3043
|
This is certainly weird. Any idea what could cause this? Or any way I can avoid this? |
I think you could try changing Looks like maybe the default is typically host, maybe a difference in distros? |
It is host by default as far as I'm aware. |
@BenTheElder I looked further into configuration of my system and it was being blocked by a security solution installed on my machine. I forgot that was installed and once I checked, I realized it was blocking mount & unmount operations. Added those to exception list and now everything works as expected. Thanks to all the information you provided, I managed to learn a lot of new things. Appreciate it. I'll close this issue now. |
Thanks, if you're able to share I'd be curious what security solution 😅 blocking mount operations would definitely do it, we need to do lots of those for the containers, volumes etc. |
@BenTheElder Sorry I cannot disclose that information, but I think any security solution like CrowdStrike or Cylance could block this. |
I can CONFIRM from bitter experience that Crowdstrike CAN and DOES kill pods at birth - and you get a 137 error. |
What happened:
I installed kind just recently following the documentation and tried to create a cluster with and without manual configuration. And it always fails with error 137. And only rarely creates cluster when I do not specify a configuration.
Following is the command output
The configuration file is very simple, as taken from the kind page
I tried exporting logs and I get this
What you expected to happen:
I expected the cluster to be created without any hiccups.
How to reproduce it (as minimally and precisely as possible):
I am not sure, I just installed kind using
go install sigs.k8s.io/kind@latest
Anything else we need to know?:
None
Environment:
kind version
): kind v0.18.0 go1.20.1 linux/amd64docker info
orpodman info
):/etc/os-release
):kubectl version
):The text was updated successfully, but these errors were encountered: