Lets cause some ruckus! Kubernetes in a Proxmox LXC – what could go wrong?
Last times journey in LXC containers reveal an incredible simply way to install Linux containers with “pvecm available” and I spun up three containers. This was the sole reason behind buying four Elitedesk 800 G4s – to get away from Kubernetes installs on Raspberri Pi 4s. Way easier to learn if I don’t waste a bunch of time wiping SD cards.
Lets spin up some K8S on these LXC containers!
Ubuntu 24.10 containers don’t have “curl” but additionally we need to update our packges.
Here we go again! The simple part is initiating kubectl. Typically after this I would join the nodes together and hit a brick wall. This time I will brave the kubeadm!
As per requirements of installing kubeadm I will check the required ports for openings on port 6443 with:
nc 127.0.0.1 6443 -v
Doesn’t look good, but the guide doesn’t really specify what I am looking for. Quick search reveals a few golden eggs:
ufw allow "port-number/protocol"
or
ufw allow 6443
Since nmap is not installed on the Ubuntu containers, I attempted to nmap the LXC2 container from my MacBook at IP: 192.168.2.15 and only see the SSH port is opened. 🙁
A more complex way I discovered was to use lsof
sudo lsof -i -nP | grep LISTEN
-i stands for “Internet”, but basically means that we are only interested in network ports open.
-n disable the host resolution to show the IP addresses directly (faster).
-P to display the port numbers.
The grep command is used to filter the list with only listening ports (not the ones used by established connections, for example).
Very exciting! But no port 6443 on the list. kubeadm states this as a requirement so I am not certain what is next here…
sudo lsof -i:22 (22 = port number)
More excitement! COMMAND information relating to the port and so much more! Sadly, it did not reveal anything for 6443 but as an example I searched for port 22.
Another way to get a list of open ports:
sudo ss -ltn
-t: Only show TCP ports (use -u to include UDP ports).
-l: Only list ports open in LISTEN mode (the grep equivalent),
-n: Shows port numbers, do not use their names (http, ssh, …).
Additional use of the GREP command can filter results.
sudo ss -ltn | grep 22 (22 = port number)
You can also nmap your own host if you use:
sudo nmap -p 80 localhost
DISTRACTION COMPLETE! What rabbit hole. Lets get back to messing with kubeadm. Not so sure this port will open unless a service requests it. I already added it to the firewall.
1. Update the apt package index and install packages needed to use the Kubernetes apt repository:
sudo apt-get update
# apt-transport-https may be a dummy package; if so, you can skip that package
sudo apt-get install -y apt-transport-https ca-certificates curl gpg
2. Download the public signing key for the Kubernetes package repositories. The same signing key is used for all repositories so you can disregard the version in the URL:
# If the directory `/etc/apt/keyrings` does not exist, it should be created before the curl command, read the note below.sudo mkdir -p -m 755 /etc/apt/keyrings
# curl -fsSL https://pkgs.k8s.io/core:/stable:/v1.32/deb/Release.key | sudo gpg --dearmor -o /etc/apt/keyrings/kubernetes-apt-keyring.gpg
3. Add the appropriate Kubernetes apt repository. Please note that this repository have packages only for Kubernetes 1.32; for other Kubernetes minor versions, you need to change the Kubernetes minor version in the URL to match your desired minor version (you should also check that you are reading the documentation for the version of Kubernetes that you plan to install).
# This overwrites any existing configuration in /etc/apt/sources.list.d/kubernetes.list
echo 'deb [signed-by=/etc/apt/keyrings/kubernetes-apt-keyring.gpg] https://pkgs.k8s.io/core:/stable:/v1.32/deb/ /' | sudo tee /etc/apt/sources.list.d/kubernetes.list
4. Update the apt package index, install kubelet, kubeadm and kubectl, and pin their version:
5. (Optional) Enable the kubelet service before running kubeadm:
sudo systemctl enable --now kubelet
The kubelet is now restarting every few seconds, as it waits in a crashloop for kubeadm to tell it what to do.
kubeadm init
Is throwing mad errors!
“Failed to parse kernel config: unable to load kernel module.”
Apparently, since this is an LXC and not a bare metal install, the kernel information is not loaded – as it is maintained on the host node. kubeadm wants this config file to work with the kernel. Solution as suggested by users in Stack Overflow is to push the config into the LXC. https://stackoverflow.com/questions/63427047/proxmox-lxc-add-add-linux-kernel-modules
pct push $VMID /boot/config-$(uname -r) /boot/config-$(uname -r)
Where $VMID is your container id.
Appears, upon research there may be a lack of containerd in these LXCs. The new preflight warning speaks to this.
W1222 07:01:13.328433 1848 checks.go:1080] [preflight] WARNING: Couldn't create the interface used for talking to the container runtime: failed to create new CRI runtime service: validate service connection: validate CRI v1 runtime API for endpoint "unix:///var/run/containerd/containerd.sock": rpc error: code = Unavailable desc = connection error: desc = "transport: Error while dialing: dial unix /var/run/containerd/containerd.sock: connect: no such file or directory"
The containerd binary is built dynamically for glibc-based Linux distributions such as Ubuntu and Rocky Linux. This binary may not work on musl-based distributions such as Alpine Linux. Users of such distributions may have to install containerd from the source or a third party package.
FAQ: For Kubernetes, do I need to download cri-containerd-(cni-)<VERSION>-<OS-<ARCH>.tar.gz too?
Answer: No.
As the Kubernetes CRI feature has been already included in containerd-<VERSION>-<OS>-<ARCH>.tar.gz, you do not need to download the cri-containerd-.... archives to use CRI.
The cri-containerd-... archives are deprecated, do not work on old Linux distributions, and will be removed in containerd 2.0.
[ERROR FileContent--proc-sys-net-ipv4-ip_forward]: /proc/sys/net/ipv4/ip_forward contents are not set to 1
I removed the # from the net.ipv4.ip_forward=1 and then ran a reboot on the LXC and I still have the same error.
The cat <<EOF syntax is very useful when working with multi-line text in Bash, eg. when assigning multi-line string to a shell variable, file or a pipe.
Leave a Reply