-
Notifications
You must be signed in to change notification settings - Fork 219
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to attach volumes to pod, Error failed to attach: node "xxxxxx-xxx4139" has no NodeID annotation #314
Comments
Please contact NetApp Support to open a support case on this issue. The "has no NodeID annotation" may be a Kubernetes issue but more information is needed. |
Haven't enabled required Feature Gates? |
All the required feature gates are enabled
On Sun, 17 Nov 2019 at 4:35 AM, scaleoutsean ***@***.***> wrote:
Haven't enabled required Feature Gates?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#314?email_source=notifications&email_token=ABSOTUL32C7YIX57ORWQJFTQUC3XPA5CNFSM4JN37TP2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEEIA34I#issuecomment-554700273>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABSOTUNEUH5MNZS5WVTE6QTQUC3XPANCNFSM4JN37TPQ>
.
--
Thanks & Regards
Sanjay Singh
|
I noticed in our environment that below annotation is missing on nodes
|
The original error (no nodeID) typically is because the trident node server was not able to start properly. Check the daemonset pod to make sure they all started without error |
All the pods under trident namespace are working.
|
@san360, did you recieve any feedback via the ticket? |
So far nothing. Are you facing similar issue as well? |
@san360 - if you have a support case open with NetApp, please send me the case # to martyt@netapp.com. I'll see if I can figure out what's going on. Thanks. |
@san360 Yes we had the same issue. We had to modify the mounts of the worker nodes (make them shared) and install trident with custom-yaml (adjusted the kubelet_path) This sorted out our problmen and made trident work as it should. |
Thanks for the update. I tried to install trident with custom yaml but it failed to start the daemonset container due to missing triden-csi secret. Does it generate secret yaml for you? |
@san360 Yes, the Trident installer generates the trident-csi secret automatically. |
@san360 We were finally able to reproduce this issue. When using containerized kubelet or a container orchestrator that does not install kubelet in /var/lib/kubelet all references to /var/lib/kubelet in the daemonset YAML need to be updated. Also, the kubelet path needs to be the same on all nodes. Mixing containerized kubelet with non-containerized kubelet, for example, is not supported. When using containerized kubelet, RancherOS, Rancher, PKS, or any other container orchestrator that changes the path of kubelet Trident needs to be installed with customized YAML. OpenShift is an exception where customized YAML is not needed.
As of Trident 19.10.0 these are all the references to /var/lib/kubelet that need to be updated.
We are working on a change to make Trident easier to install when the kubelet path differs from the default. Thanks for your feedback and patience so far. Let us know if this fixes your issue. |
@san360 I believe this is resolved, so closing this issue. Please let me know if that is not the case, and we will reopen. |
Co-authored-by: Alex Meade <mr.alex.meade@gmail.com>
Errors from log files
K8's version 1.13.12
Trident 19.10 and installed with csi flag
The text was updated successfully, but these errors were encountered: