k8s coredns 一直是pending状态的解决办法

当corednsPod状态为Pending时,可能由于缺少网络插件导致。通过创建和应用kube-flannel.yml配置文件,安装flannel网络插件,包括设置PodSecurityPolicy、ClusterRole、ClusterRoleBinding、ServiceAccount、ConfigMap和DaemonSet,可以解决此问题。安装完成后,等待片刻,corednsPod状态将恢复正常。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

使用kubectl get pods -n kube-system 查看如下

 coredns 一直是pending 。

经查阅资料发现coredns 最大可能是缺少网络插件导致,本文选择kube-flannel.yml方式来安装

创建文件 kube-flannel.yml,将下面内容复制并保存

---
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
  name: psp.flannel.unprivileged
  annotations:
    seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default
    seccomp.security.alpha.kubernetes.io/defaultProfileName: docker/default
    apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default
    apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default
spec:
  privileged: false
  volumes:
  - configMap
  - secret
  - emptyDir
  - hostPath
  allowedHostPaths:
  - pathPrefix: "/etc/cni/net.d"
  - pathPrefix: "/etc/kube-flannel"
  - pathPrefix: "/run/flannel"
  readOnlyRootFilesystem: false
  runAsUser:
    rule: RunAsAny
  supplementalGroups:
    rule: RunAsAny
  fsGroup:
    rule: RunAsAny
  allowPrivilegeEscalation: false
  defaultAllowPrivilegeEscalation: false
  allowedCapabilities: ['NET_ADMIN', 'NET_RAW']
  defaultAddCapabilities: []
  requiredDropCapabilities: []
  hostPID: false
  hostIPC: false
  hostNetwork: true
  hostPorts:
  - min: 0
    max: 65535
  seLinux:
    rule: 'RunAsAny'
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: flannel
rules:
- apiGroups: ['extensions']
  resources: ['podsecuritypolicies']
  verbs: ['use']
  resourceNames: ['psp.flannel.unprivileged']
- apiGroups:
  - ""
  resources:
  - pods
  verbs:
  - get
- apiGroups:
  - ""
  resources:
  - nodes
  verbs:
  - list
  - watch
- apiGroups:
  - ""
  resources:
  - nodes/status
  verbs:
  - patch
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: flannel
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: flannel
subjects:
- kind: ServiceAccount
  name: flannel
  namespace: kube-system
---
apiVersion: v1
kind: ServiceAccount
metadata:
  name: flannel
  namespace: kube-system
---
kind: ConfigMap
apiVersion: v1
metadata:
  name: kube-flannel-cfg
  namespace: kube-system
  labels:
    tier: node
    app: flannel
data:
  cni-conf.json: |
    {
      "name": "cbr0",
      "cniVersion": "0.3.1",
      "plugins": [
        {
          "type": "flannel",
          "delegate": {
            "hairpinMode": true,
            "isDefaultGateway": true
          }
        },
        {
          "type": "portmap",
          "capabilities": {
            "portMappings": true
          }
        }
      ]
    }
  net-conf.json: |
    {
      "Network": "10.244.0.0/16",
      "Backend": {
        "Type": "vxlan"
      }
    }
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
  name: kube-flannel-ds
  namespace: kube-system
  labels:
    tier: node
    app: flannel
spec:
  selector:
    matchLabels:
      app: flannel
  template:
    metadata:
      labels:
        tier: node
        app: flannel
    spec:
      affinity:
        nodeAffinity:
          requiredDuringSchedulingIgnoredDuringExecution:
            nodeSelectorTerms:
            - matchExpressions:
              - key: kubernetes.io/os
                operator: In
                values:
                - linux
      hostNetwork: true
      priorityClassName: system-node-critical
      tolerations:
      - operator: Exists
        effect: NoSchedule
      serviceAccountName: flannel
      initContainers:
      - name: install-cni-plugin
        image: rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0
        command:
        - cp
        args:
        - -f
        - /flannel
        - /opt/cni/bin/flannel
        volumeMounts:
        - name: cni-plugin
          mountPath: /opt/cni/bin
      - name: install-cni
        image: rancher/mirrored-flannelcni-flannel:v0.18.1
        command:
        - cp
        args:
        - -f
        - /etc/kube-flannel/cni-conf.json
        - /etc/cni/net.d/10-flannel.conflist
        volumeMounts:
        - name: cni
          mountPath: /etc/cni/net.d
        - name: flannel-cfg
          mountPath: /etc/kube-flannel/
      containers:
      - name: kube-flannel
        image: rancher/mirrored-flannelcni-flannel:v0.18.1
        command:
        - /opt/bin/flanneld
        args:
        - --ip-masq
        - --kube-subnet-mgr
        resources:
          requests:
            cpu: "100m"
            memory: "50Mi"
          limits:
            cpu: "100m"
            memory: "50Mi"
        securityContext:
          privileged: false
          capabilities:
            add: ["NET_ADMIN", "NET_RAW"]
        env:
        - name: POD_NAME
          valueFrom:
            fieldRef:
              fieldPath: metadata.name
        - name: POD_NAMESPACE
          valueFrom:
            fieldRef:
              fieldPath: metadata.namespace
        - name: EVENT_QUEUE_DEPTH
          value: "5000"
        volumeMounts:
        - name: run
          mountPath: /run/flannel
        - name: flannel-cfg
          mountPath: /etc/kube-flannel/
        - name: xtables-lock
          mountPath: /run/xtables.lock
      volumes:
      - name: run
        hostPath:
          path: /run/flannel
      - name: cni-plugin
        hostPath:
          path: /opt/cni/bin
      - name: cni
        hostPath:
          path: /etc/cni/net.d
      - name: flannel-cfg
        configMap:
          name: kube-flannel-cfg
      - name: xtables-lock
        hostPath:
          path: /run/xtables.lock
          type: FileOrCreate

执行  kubectl apply -f kube-flannel.yml

再次运行 kubectl  get pods -n kube-system 查看 kube-flannel网络插件状态,如下状态即为成功。

 稍等片刻 再次运行 kubectl  get pods -n kube-system   会发现coredns 正常了如下:

 

<think>好的,我现在需要帮助用户解决Kubernetes执行阶段遇到的CoreDNS插件错误。首先,我得回顾一下用户提供的引用内容,看看有没有相关的线索。引用[1]提到所有三个Pod都在运行,Deployment也正常,这可能意味着问题不在Deployment本身,而是其他配置问题。引用[2]是关于升级Kubernetes集群的,用户可能在升级后出现了CoreDNS的问题,这可能与版本兼容性有关。引用[3]提到引导过程不依赖于特定的磁盘位置,可能跟存储或挂载无关,但暂时不确定是否需要考虑这部分。 接下来,我需要考虑常见的CoreDNS错误原因。首先检查CoreDNS的Pod状态,如果处于CrashLoopBackOff,可能是配置错误或资源不足。然后查看日志,使用kubectl logs命令获取具体错误信息。如果日志显示无法连接到API服务器,可能需要检查CoreDNS的RBAC配置是否正确,比如ServiceAccount是否有足够权限。另外,网络插件是否兼容当前Kubernetes版本也很重要,尤其是用户刚升级过集群,比如从1.23到1.24,可能有些API被弃用,导致CoreDNS无法正常工作。 另外,检查CoreDNS的配置文件ConfigMap是否正确,比如上游DNS服务器设置或域名解析配置。如果CoreDNS的Pod处于Pending状态,可能是节点资源不足或节点选择器配置错误。还需要确认kube-dns服务是否存在且正常,因为CoreDNS依赖这个服务。如果用户自定义了网络策略,可能会阻止CoreDNS与其他组件的通信,需要检查相关策略。最后,考虑重新部署CoreDNS,或者回滚到之前的版本,如果问题出现在升级之后的话。 需要用户提供具体的错误信息,比如Pod状态、日志内容,以及集群升级的详细步骤,才能更准确地定位问题。可能还需要用户检查kubelet和容器运行时的日志,查看是否有相关错误。综合这些步骤,逐步排查可能的原因,最终解决CoreDNS的问题。</think>### Kubernetes CoreDNS执行阶段错误排查步骤 #### 1. 检查CoreDNS组件状态 ```bash kubectl get pods -n kube-system -l k8s-app=kube-dns ``` - 正常状态应显示两个`Running`实例(默认配置) - 若出现`CrashLoopBackOff`,需查看日志:`kubectl logs <pod-name> -n kube-system -c coredns` [^2] #### 2. 验证网络插件兼容性 在集群升级场景中(如v1.23→v1.24),需确认: ```bash kubectl get ds -n kube-system ``` - 检查Calico/Flannel等网络插件的版本是否支持目标Kubernetes版本 - 特别注意v1.24+已移除dockershim,需使用兼容的CRI运行时 #### 3. 检查DNS配置 查看CoreDNS的ConfigMap: ```bash kubectl get cm coredns -n kube-system -o yaml ``` 重点关注: ```yaml .:53 { errors health ready kubernetes cluster.local in-addr.arpa ip6.arpa { pods verified fallthrough in-addr.arpa ip6.arpa } prometheus :9153 forward . /etc/resolv.conf cache 30 loop reload loadbalance } ``` #### 4. 诊断服务端点 验证kube-dns服务状态: ```bash kubectl get svc kube-dns -n kube-system kubectl get endpoints kube-dns -n kube-system ``` 正常应显示至少一个可用端点,若为空可能表示: - CoreDNS未正确注册 - 节点网络存在问题 - 服务选择器配置错误 #### 5. 检查RBAC配置 确认ClusterRole绑定: ```bash kubectl get clusterrole system:coredns -o yaml ``` 应有如下权限: ```yaml rules: - apiGroups: [""] resources: ["endpoints", "services", "pods", "namespaces"] verbs: ["list", "watch"] ``` #### 6. 验证节点解析能力 在节点执行DNS查询测试: ```bash nslookup kubernetes.default.svc.cluster.local ``` 若解析失败,需检查: - kubelet的`--cluster-dns`参数配置 - 节点防火墙是否开放UDP/TCP 53端口 - 容器运行时(containerd/docker)的DNS配置
评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

PrinciplesMan

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值