Some of the scenario questions here are based on Kodekloud's CKA course labs.
Note
CKAD and CKA can have similar scenario questions. It is recommended to go through the CKAD practice tests.
Shortcuts
First run the two commands below for shortcuts.
export do="--dry-run=client -o yaml"
export now="--force --grace-period=0"
Questions
-
Upgrade the current version of kubernetes from 1.26.0 to 1.27.0 exactly using the kubeadm utility. Make sure that the upgrade is carried out one node at a time starting with the controlplane node. To minimize downtime, the deployment gold-nginx should be rescheduled on an alternate node before upgrading each node.
Upgrade controlplane node first and drain node node01 before upgrading it. Pods for gold-nginx should run on the controlplane node subsequently.
Answer
Start with the controlplane first.
controlplane ~ ➜ k get no NAME STATUS ROLES AGE VERSION controlplane Ready control-plane 30m v1.26.0 node01 Ready <none> 29m v1.26.0 controlplane ~ ➜ k drain controlplane --ignore-daemonsets node/controlplane cordoned Warning: ignoring DaemonSet-managed Pods: kube-system/kube-proxy-9q57t, kube-system/weave-net-txlpl evicting pod kube-system/coredns-787d4945fb-qdt8z evicting pod kube-system/coredns-787d4945fb-c4qz4 pod/coredns-787d4945fb-c4qz4 evicted pod/coredns-787d4945fb-qdt8z evicted node/controlplane drained controlplane ~ ➜ k get no NAME STATUS ROLES AGE VERSION controlplane Ready,SchedulingDisabled control-plane 30m v1.26.0 node01 Ready <none> 30m v1.26.0 controlplane ~ ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES gold-nginx-6c5b9dd56c-4sgh9 1/1 Running 0 3m10s 10.244.192.1 node01 <none> <none>
apt update apt-cache madison kubeadm apt-mark unhold kubelet kubectl && \ apt-get update && apt-get install -y \ kubeadm=1.27.0-00 \ kubelet=1.27.0-00 \ kubectl=1.27.0-00 \ apt-mark hold kubelet kubectl
controlplane ~ ➜ kubeadm version kubeadm version: &version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.0", GitCommit:"1b4df30b3cdfeaba6024e81e559a6cd09a089d65", GitTreeState:"clean", BuildDate:"2023-04-11T17:09:06Z", GoVersion:"go1.20.3", Compiler:"gc", Platform:"linux/amd64"} controlplane ~ ➜ kubectl version WARNING: This version information is deprecated and will be replaced with the output from kubectl version --short. Use --output=yaml|json to get the full version. Client Version: version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.0", GitCommit:"1b4df30b3cdfeaba6024e81e559a6cd09a089d65", GitTreeState:"clean", BuildDate:"2023-04-11T17:10:18Z", GoVersion:"go1.20.3", Compiler:"gc", Platform:"linux/amd64"} Kustomize Version: v5.0.1
kubeadm upgrade plan kubeadm upgrade apply v1.27.0 sudo systemctl daemon-reload sudo systemctl restart kubelet
controlplane ~ ➜ k uncordon controlplane node/controlplane uncordoned controlplane ~ ➜ k get no NAME STATUS ROLES AGE VERSION controlplane Ready control-plane 38m v1.27.0 node01 Ready <none> 37m v1.26.0 controlplane ~ ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES gold-nginx-6c5b9dd56c-4sgh9 1/1 Running 0 10m 10.244.192.1 node01 <none> <none>
Before going to node01, drain it first.
controlplane ~ ➜ k get no NAME STATUS ROLES AGE VERSION controlplane Ready control-plane 39m v1.27.0 node01 Ready <none> 38m v1.26.0 controlplane ~ ➜ k drain node01 --ignore-daemonsets node/node01 cordoned Warning: ignoring DaemonSet-managed Pods: kube-system/kube-proxy-d5t6j, kube-system/weave-net-kwhpv evicting pod kube-system/coredns-5d78c9869d-pzbkb evicting pod admin2406/deploy2-7b6d9445df-tgp74 evicting pod admin2406/deploy3-66785bc8f5-22nv7 evicting pod default/gold-nginx-6c5b9dd56c-4sgh9 evicting pod admin2406/deploy1-5d88679d77-nvbfc evicting pod admin2406/deploy5-7cbf794564-t66r2 evicting pod kube-system/coredns-5d78c9869d-844r9 evicting pod admin2406/deploy4-55554b4b4c-zkz7p pod/deploy5-7cbf794564-t66r2 evicted I0104 05:34:38.455763 17683 request.go:696] Waited for 1.05165341s due to client-side throttling, not priority and fairness, request: GET:https://controlplane:6443/api/v1/namespaces/admin2406/pods/deploy1-5d88679d77-nvbfc pod/deploy1-5d88679d77-nvbfc evicted pod/deploy4-55554b4b4c-zkz7p evicted pod/deploy3-66785bc8f5-22nv7 evicted pod/gold-nginx-6c5b9dd56c-4sgh9 evicted pod/deploy2-7b6d9445df-tgp74 evicted pod/coredns-5d78c9869d-844r9 evicted pod/coredns-5d78c9869d-pzbkb evicted node/node01 drained controlplane ~ ➜ k get no NAME STATUS ROLES AGE VERSION controlplane Ready control-plane 39m v1.27.0 node01 Ready,SchedulingDisabled <none> 39m v1.26.0
Now run the same commands in node-01.
ssh node01 apt update apt-cache madison kubeadm apt-mark unhold kubelet kubectl && \ apt-get update && apt-get install -y \ kubeadm=1.27.0-00 \ kubelet=1.27.0-00 \ kubectl=1.27.0-00 \ apt-mark hold kubelet kubectl kubeadm version kubectl version kubeadm upgrade plan sudo kubeadm upgrade apply v1.27.0 sudo systemctl daemon-reload sudo systemctl restart kubelet
root@node01 ~ ✦ ✖ kubeadm version kubeadm version: &version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.0", GitCommit:"1b4df30b3cdfeaba6024e81e559a6cd09a089d65", GitTreeState:"clean", BuildDate:"2023-04-11T17:09:06Z", GoVersion:"go1.20.3", Compiler:"gc", Platform:"linux/amd64"} root@node01 ~ ✦ ➜ kubectl version WARNING: This version information is deprecated and will be replaced with the output from kubectl version --short. Use --output=yaml|json to get the full version. Client Version: version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.0", GitCommit:"1b4df30b3cdfeaba6024e81e559a6cd09a089d65", GitTreeState:"clean", BuildDate:"2023-04-11T17:10:18Z", GoVersion:"go1.20.3", Compiler:"gc", Platform:"linux/amd64"}
Now before we uncordon the node01, we must first make sure that the pod is running on controlplane, as instructed.
controlplane ~ ✦2 ✖ k get po NAME READY STATUS RESTARTS AGE gold-nginx-6c5b9dd56c-xjc6c 0/1 Pending 0 3m30s controlplane ~ ✦2 ➜ k describe po gold-nginx-6c5b9dd56c-xjc6c | grep -i events -A 5 Events: Type Reason Age From Message ---- ------ ---- ---- ------- Warning FailedScheduling 4m59s default-scheduler 0/2 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/control-plane: }, 1 node(s) were unschedulable. preemption: 0/2 nodes are available: 2 Preemption is not helpful for scheduling. controlplane ~ ✦2 ➜ k describe nodes controlplane | grep -i taint Taints: node-role.kubernetes.io/control-plane:NoSchedule
To allow scheduling of pods controlplane, we need to remove the taint on the controlplane.
controlplane ~ ✦2 ✖ k describe nodes controlplane | grep -i taint Taints: node-role.kubernetes.io/control-plane:NoSchedule controlplane ~ ✦2 ➜ k taint no controlplane node-role.kubernetes.io/control-plane:NoSchedule- node/controlplane untainted controlplane ~ ✦2 ➜ k describe nodes controlplane | grep -i taint Taints: <none> controlplane ~ ✦2 ➜ k get po NAME READY STATUS RESTARTS AGE gold-nginx-6c5b9dd56c-xjc6c 0/1 ContainerCreating 0 7m10s controlplane ~ ✦2 ➜ k get po NAME READY STATUS RESTARTS AGE gold-nginx-6c5b9dd56c-xjc6c 1/1 Running 0 7m13s controlplane ~ ✦2 ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES gold-nginx-6c5b9dd56c-xjc6c 1/1 Running 0 7m17s 10.244.0.4 controlplane <none> <none>
We can now uncordon node01.
controlplane ~ ✦2 ➜ k get no NAME STATUS ROLES AGE VERSION controlplane Ready control-plane 56m v1.27.0 node01 Ready,SchedulingDisabled <none> 55m v1.27.0 controlplane ~ ✦2 ➜ k uncordon node01 node/node01 uncordoned controlplane ~ ✦2 ➜ k get no NAME STATUS ROLES AGE VERSION controlplane Ready control-plane 56m v1.27.0 node01 Ready <none> 55m v1.27.0 controlplane ~ ✦2 ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES gold-nginx-6c5b9dd56c-xjc6c 1/1 Running 0 7m44s 10.244.0.4 controlplane <none> <none>
-
Print the names of all deployments in the admin2406 namespace in the following format:
DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE
The data should be sorted by the increasing order of the deployment name.
Answer
controlplane ~ ✦2 ➜ k get ns NAME STATUS AGE admin1401 Active 28m admin2406 Active 28m alpha Active 28m default Active 57m kube-node-lease Active 57m kube-public Active 57m kube-system Active 57m controlplane ~ ✦2 ➜ k get deployments.apps -n admin2406 NAME READY UP-TO-DATE AVAILABLE AGE deploy1 1/1 1 1 29m deploy2 1/1 1 1 29m deploy3 1/1 1 1 29m deploy4 1/1 1 1 29m deploy5 1/1 1 1 29m
Use custom columns to specify the headers.
controlplane ~ ✦2 ➜ k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:a,CONTAINER_IMAGE:b,READY_REPLICAS:c,NAMESPACE:d" DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none> <none>
Now that we got the format, we just need to supply the values. Let's use one sample first.
controlplane ~ ✦2 ➜ k get deployments.apps -n admin2406 deploy1 NAME READY UP-TO-DATE AVAILABLE AGE deploy1 1/1 1 1 35m controlplane ~ ✦2 ➜ k get deployments.apps -n admin2406 NAME READY UP-TO-DATE AVAILABLE AGE deploy1 1/1 1 1 35m deploy2 1/1 1 1 35m deploy3 1/1 1 1 35m deploy4 1/1 1 1 35m deploy5 1/1 1 1 35m controlplane ~ ✦2 ➜ k get deployments.apps -n admin2406 deploy1 NAME READY UP-TO-DATE AVAILABLE AGE deploy1 1/1 1 1 35m
Determine the values that is needed and use dot notation.
controlplane ~ ✦2 ➜ k get deployments.apps -n admin2406 deploy1 -o json { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1" }, "creationTimestamp": "2024-01-04T10:23:24Z", "generation": 1, "labels": { "app": "deploy1" }, "name": "deploy1", "namespace": "admin2406", "resourceVersion": "6133", "uid": "0c04a727-afbd-4242-9a9f-abc45879367b" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app": "deploy1" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": "25%" }, "type": "RollingUpdate" }, "template": { "metadata": { "creationTimestamp": null, "labels": { "app": "deploy1" } }, "spec": { "containers": [ { "image": "nginx", "imagePullPolicy": "Always", "name": "nginx",
Start with first column:
Deployment names = {.metadata.name}
controlplane ~ ✦2 ➜ k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:{.metadata.name},CONTAINER_IMAGE:b,READY_REPLICAS:c,NAMESPACE:d" DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE deploy1 <none> <none> <none> deploy2 <none> <none> <none> deploy3 <none> <none> <none> deploy4 <none> <none> <none> deploy5 <none> <none> <none>
Now the container image.
{.spec.template.spec.containers[0].image}
controlplane ~ ✦2 ➜ k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:{.metadata.name},CONTAINER_IMAGE:{.spec.template.spec.containers[0].image},READY_REPLICAS:c,NAMESPACE:d" DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE deploy1 nginx <none> <none> deploy2 nginx:alpine <none> <none> deploy3 nginx:1.16 <none> <none> deploy4 nginx:1.17 <none> <none> deploy5 nginx:latest <none> <none>
Now the ready replicas.
{.status.readyReplicas}
controlplane ~ ✦2 ➜ k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:{.metadata.name},CONTAINER_IMAGE:{.spec.template.spec.containers[0].image},READY_REPLICAS:{.status.readyReplicas},NAMESPACE:d" DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE deploy1 nginx 1 <none> deploy2 nginx:alpine 1 <none> deploy3 nginx:1.16 1 <none> deploy4 nginx:1.17 1 <none> deploy5 nginx:latest 1 <none>
Finally, the namespace.
{.metadata.namespace}
controlplane ~ ✦2 ➜ k get -n admin2406 deployments.apps -o custom-columns="DEPLOYMENT:{.metadata.name},CONTAINER_IMAGE:{.spec.template.spec.containers[0].image},READY_REPLICAS:{.status.readyReplicas},NAMESPACE:{.metadata.namespace}" DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE deploy1 nginx 1 admin2406 deploy2 nginx:alpine 1 admin2406 deploy3 nginx:1.16 1 admin2406 deploy4 nginx:1.17 1 admin2406 deploy5 nginx:latest 1 admin2406
Now sort it by deployment name.
controlplane ~ ➜ kubectl -n admin2406 get deployment -o custom-columns=DEPLOYMENT:.metadata.name,CONTAINER_IMAGE:.spec.template.spec.containers[].image,READY_REPLICAS:.status.readyReplicas,NAMESPACE:.metadata.namespace --sort-by=.metadata.name DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE deploy1 nginx 1 admin2406 deploy2 nginx:alpine 1 admin2406 deploy3 nginx:1.16 1 admin2406 deploy4 nginx:1.17 1 admin2406 deploy5 nginx:latest 1 admin2406
Finally, forward it to the specified file.
kubectl -n admin2406 get deployment -o custom-columns=DEPLOYMENT:.metadata.name,CONTAINER_IMAGE:.spec.template.spec.containers[].image,READY_REPLICAS:.status.readyReplicas,NAMESPACE:.metadata.namespace --sort-by=.metadata.name > /opt/admin2406_data
controlplane ~ ➜ ls -la /opt/admin2406_data -rw-r--r-- 1 root root 348 Jan 4 06:57 /opt/admin2406_data controlplane ~ ➜ cat /opt/admin2406_data DEPLOYMENT CONTAINER_IMAGE READY_REPLICAS NAMESPACE deploy1 nginx 1 admin2406 deploy2 nginx:alpine 1 admin2406 deploy3 nginx:1.16 1 admin2406 deploy4 nginx:1.17 1 admin2406 deploy5 nginx:latest 1 admin2406
-
A kubeconfig file called admin.kubeconfig has been created in /root/CKA. There is something wrong with the configuration. Troubleshoot and fix it.
Answer
Make sure the port for the kube-apiserver is correct. So for this change port from 4380 to 6443.
Run the below command to know the cluster information:
controlplane ~ ➜ kubectl cluster-info --kubeconfig /root/CKA/admin.kubeconfig E0104 07:00:03.980973 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused E0104 07:00:03.981343 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused E0104 07:00:03.982790 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused E0104 07:00:03.984160 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused E0104 07:00:03.985582 11082 memcache.go:238] couldn't get current server API group list: Get "https://controlplane:4380/api?timeout=32s": dial tcp 192.26.250.9:4380: connect: connection refused To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. The connection to the server controlplane:4380 was refused - did you specify the right host or port?
vi /root/CKA/admin.kubeconfig
server: https://controlplane:6443
controlplane ~ ➜ kubectl cluster-info --kubeconfig /root/CKA/admin.kubeconfig Kubernetes control plane is running at https://controlplane:6443 CoreDNS is running at https://controlplane:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.
-
Create a new deployment called nginx-deploy, with image nginx:1.16 and 1 replica. Next upgrade the deployment to version 1.17 using rolling update.
Answer
controlplane ~ ✦2 ➜ k create deployment nginx-deploy --image nginx:1.16 --replicas 1 deployment.apps/nginx-deploy created controlplane ~ ✦2 ➜ k get deployments.apps NAME READY UP-TO-DATE AVAILABLE AGE gold-nginx 1/1 1 1 44m nginx-deploy 1/1 1 1 5s
controlplane ~ ➜ k set image deploy nginx-deploy nginx=nginx:1.17 deployment.apps/nginx-deploy image updated controlplane ~ ➜ k rollout status deployment nginx-deploy deployment "nginx-deploy" successfully rolled out
controlplane ~ ✦2 ➜ k get deployments.apps NAME READY UP-TO-DATE AVAILABLE AGE gold-nginx 1/1 1 1 45m nginx-deploy 1/1 1 1 56s controlplane ~ ✦2 ➜ k describe deployments.apps nginx-deploy | grep -i image Image: nginx:1.17
-
A new deployment called alpha-mysql has been deployed in the alpha namespace. However, the pods are not running. Troubleshoot and fix the issue. The deployment should make use of the persistent volume alpha-pv to be mounted at /var/lib/mysql and should use the environment variable MYSQL_ALLOW_EMPTY_PASSWORD=1 to make use of an empty root password.
Answer
controlplane ~ ✖ k get all -n alpha NAME READY STATUS RESTARTS AGE pod/alpha-mysql-5b7b8988c4-r8ls8 0/1 Pending 0 8m8s NAME READY UP-TO-DATE AVAILABLE AGE deployment.apps/alpha-mysql 0/1 1 0 8m8s NAME DESIRED CURRENT READY AGE replicaset.apps/alpha-mysql-5b7b8988c4 1 1 0 8m8s controlplane ~ ➜ k describe deployments.apps -n alpha alpha-mysql Name: alpha-mysql Namespace: alpha CreationTimestamp: Thu, 04 Jan 2024 06:52:44 -0500 Labels: app=alpha-mysql Annotations: deployment.kubernetes.io/revision: 1 Selector: app=alpha-mysql Replicas: 1 desired | 1 updated | 1 total | 0 available | 1 unavailable StrategyType: RollingUpdate MinReadySeconds: 0 RollingUpdateStrategy: 25% max unavailable, 25% max surge Pod Template: Labels: app=alpha-mysql Containers: mysql: Image: mysql:5.6 Port: 3306/TCP Host Port: 0/TCP Environment: MYSQL_ALLOW_EMPTY_PASSWORD: 1 Mounts: /var/lib/mysql from mysql-data (rw) Volumes: mysql-data: Type: PersistentVolumeClaim (a reference to a PersistentVolumeClaim in the same namespace) ClaimName: mysql-alpha-pvc ReadOnly: false Conditions: Type Status Reason ---- ------ ------ Available False MinimumReplicasUnavailable Progressing True ReplicaSetUpdated OldReplicaSets: <none> NewReplicaSet: alpha-mysql-5b7b8988c4 (1/1 replicas created) Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal ScalingReplicaSet 8m19s deployment-controller Scaled up replica set alpha-mysql-5b7b8988c4 to 1
Look closely at:
Volumes: mysql-data: Type: PersistentVolumeClaim (a reference to a PersistentVolumeClaim in the same namespace) ClaimName: mysql-alpha-pvc ReadOnly: false
However, there's no PVC with that name.
controlplane ~ ➜ k get pvc -n alpha NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE alpha-claim Pending slow-storage 9m1s
Create the PVC.
## pvc.yml --- apiVersion: v1 kind: PersistentVolumeClaim metadata: name: mysql-alpha-pvc namespace: alpha spec: accessModes: - ReadWriteOnce resources: requests: storage: 1Gi storageClassName: slow
controlplane ~ ➜ k apply -f pvc.yml persistentvolumeclaim/mysql-alpha-pvc created controlplane ~ ➜ k get -n alpha pvc NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE alpha-claim Pending slow-storage 10m mysql-alpha-pvc Bound alpha-pv 1Gi RWO slow 11s controlplane ~ ➜ k get -n alpha po NAME READY STATUS RESTARTS AGE alpha-mysql-5b7b8988c4-r8ls8 1/1 Running 0 10m controlplane ~ ➜ k get -n alpha deployments.apps NAME READY UP-TO-DATE AVAILABLE AGE alpha-mysql 1/1 1 1 10m
-
Take the backup of ETCD at the location /opt/etcd-backup.db on the controlplane node.
Answer
controlplane ~ ✦2 ➜ k describe -n kube-system po kube-apiserver-controlplane | grep -i ca Priority Class Name: system-node-critical Image ID: registry.k8s.io/kube-apiserver@sha256:89b8d9dbef2b905b7d028ca8b7f79d35ebd9baa66b0a3ee2ddd4f3e0e2804b45 --client-ca-file=/etc/kubernetes/pki/ca.crt controlplane ~ ✦2 ➜ k describe -n kube-system po kube-apiserver-controlplane | grep -i server.crt --tls-cert-file=/etc/kubernetes/pki/apiserver.crt controlplane ~ ✦2 ➜ k describe -n kube-system po kube-apiserver-controlplane | grep -i .key --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key --kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key --service-account-key-file=/etc/kubernetes/pki/sa.pub --service-account-signing-key-file=/etc/kubernetes/pki/sa.key --tls-private-key-file=/etc/kubernetes/pki/apiserver.key
export ETCDCTL_API=3 etcdctl \ --endpoints=127.0.0.1:2379 \ --cacert=/etc/kubernetes/pki/etcd/ca.crt \ --cert=/etc/kubernetes/pki/etcd/server.crt \ --key=/etc/kubernetes/pki/etcd/server.key \ snapshot save /opt/etcd-backup.db
controlplane ~ ➜ ls -la /opt/etcd-backup.db -rw-r--r-- 1 root root 2134048 Jan 4 07:05 /opt/etcd-backup.db
-
Create a pod called secret-1401 in the admin1401 namespace using the busybox image. The container within the pod should be called secret-admin and should sleep for 4800 seconds.
The container should mount a read-only secret volume called secret-volume at the path /etc/secret-volume. The secret being mounted has already been created for you and is called dotfile-secret.
Answer
k run secret-1401 -n admin1401 --image=busybox --dry-run=client -oyaml --command -- sleep 4800 > admin.yaml
--- apiVersion: v1 kind: Pod metadata: creationTimestamp: null name: secret-1401 namespace: admin1401 labels: run: secret-1401 spec: volumes: - name: secret-volume # secret volume secret: secretName: dotfile-secret containers: - command: - sleep - "4800" image: busybox name: secret-admin # volumes' mount path volumeMounts: - name: secret-volume readOnly: true mountPath: "/etc/secret-volume"
controlplane ~ ➜ k get po -n admin1401 NAME READY STATUS RESTARTS AGE secret-1401 1/1 Running 0 27s
-
Expose the hr-web-app as service hr-web-app-service application on port 30082 on the nodes on the cluster. The web application listens on port 8080.
-
Name: hr-web-app-service
-
Type: NodePort
-
Endpoints: 2
-
Port: 8080
-
NodePort: 30082
Answer
controlplane ~ ✦ ➜ k get po NAME READY STATUS RESTARTS AGE hr-web-app-57cd7b5799-vzmsz 1/1 Running 0 9m2s hr-web-app-57cd7b5799-wqshb 1/1 Running 0 9m2s messaging 1/1 Running 0 11m nginx-pod 1/1 Running 0 11m orange 1/1 Running 0 3m23s static-busybox 1/1 Running 0 5m52s controlplane ~ ✦ ➜ k get deployments.apps NAME READY UP-TO-DATE AVAILABLE AGE hr-web-app 2/2 2 2 9m4s controlplane ~ ✦ ➜ kubectl expose deployment hr-web-app --type=NodePort --port=8080 --name=hr-web-app-service --dry-run=client -o yaml > hr-web-app-service.yaml
Modify the YAML file and add the nodeport section:
### hr-web-app-service.yaml apiVersion: v1 kind: Service metadata: creationTimestamp: null labels: app: hr-web-app name: hr-web-app-service spec: ports: - port: 8080 protocol: TCP targetPort: 8080 nodePort: 30082 selector: app: hr-web-app type: NodePort status: loadBalancer: {}
controlplane ~ ➜ k get svc NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE hr-web-app-service NodePort 10.106.44.228 <none> 8080:30082/TCP 23s kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 128m messaging-service ClusterIP 10.100.177.203 <none> 6379/TCP 30m
-
-
Create a static pod named static-busybox on the controlplane node that uses the busybox image and the command sleep 1000.
Answer
kubectl run --restart=Never --image=busybox static-busybox --dry-run=client -oyaml --command -- sleep 1000 > /etc/kubernetes/manifests/static-busybox.yaml
controlplane ~ ➜ ls -la /etc/kubernetes/manifests/static-busybox.yaml -rw-r--r-- 1 root root 298 Jan 4 08:12 /etc/kubernetes/manifests/static-busybox.yaml controlplane ~ ➜ k get po NAME READY STATUS RESTARTS AGE hr-web-app-57cd7b5799-vzmsz 1/1 Running 0 26m hr-web-app-57cd7b5799-wqshb 1/1 Running 0 26m messaging 1/1 Running 0 28m nginx-pod 1/1 Running 0 28m orange 1/1 Running 0 20m static-busybox 1/1 Running 0 23m
-
Create a Persistent Volume with the given specification: -
-
Volume name: pv-analytics
-
Storage: 100Mi
-
Access mode: ReadWriteMany
-
Host path: /pv/data-analytics
Answer
## pv.yml apiVersion: v1 kind: PersistentVolume metadata: name: pv-analytics spec: capacity: storage: 100Mi accessModes: - ReadWriteMany hostPath: path: /pv/data-analytics
controlplane ~ ➜ k apply -f pv.yml persistentvolume/pv-analytics created controlplane ~ ➜ k get pv NAME CAPACITY ACCESS MODES RECLAIM POLICY STATUS CLAIM STORAGECLASS REASON AGE pv-analytics 100Mi RWX Retain Available
-
-
Use JSON PATH query to retrieve the osImages of all the nodes and store it in a file /opt/outputs/nodes_os_x43kj56.txt.
The osImages are under the nodeInfo section under status of each node.
Answer
controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.nodeInfo}' {"architecture":"amd64","bootID":"1ededf94-06c6-443e-b30a-58a8637de4ad","containerRuntimeVersion":"containerd://1.6.6","kernelVersion":"5.4.0-1106-gcp","kubeProxyVersion":"v1.27.0","kubeletVersion":"v1.27.0","machineID":"73d7539cb95c4ef09a8ddd274b5251bc","operatingSystem":"linux","osImage":"Ubuntu 20.04.6 LTS","systemUUID":"f27b8c4f-18b7-2007-fc27-ce8e34bfff92"} controlplane ~ ➜ controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.nodeInfo.osImage}' Ubuntu 20.04.6 LTS controlplane ~ ➜ controlplane ~ ➜ kubectl get nodes -o jsonpath='{.items[*].status.nodeInfo.osImage}' > /opt/outputs/nodes_os_x43kj56.txt controlplane ~ ➜ controlplane ~ ➜ ls -l /opt/outputs/ total 20 -rw-r--r-- 1 root root 18 Jan 4 08:19 nodes_os_x43kj56.txt -rw-r--r-- 1 root root 12296 Jan 4 07:45 nodes-z3444kd9.json controlplane ~ ➜ cat /opt/outputs/nodes_os_x43kj56.txt Ubuntu 20.04.6 LTS
-
Create a new pod called super-user-pod with image busybox:1.28. Allow the pod to be able to set system_time. Pod should sleep for 4800 seconds.
Answer
## super.yml apiVersion: v1 kind: Pod metadata: creationTimestamp: null labels: run: super-user-pod name: super-user-pod spec: containers: - image: busybox:1.28 name: super-user-pod command: ["sh","-c","sleep 4800"] securityContext: capabilities: add: ["SYS_TIME"] resources: {} dnsPolicy: ClusterFirst restartPolicy: Always status: {}
controlplane ~ ➜ k apply -f super.yml pod/super-user-pod created controlplane ~ ➜ k get po NAME READY STATUS RESTARTS AGE nginx-critical 1/1 Running 0 6m28s nginx-deploy-5c95467974-d27mz 1/1 Running 0 12m redis-storage 1/1 Running 0 28m super-user-pod 1/1 Running 0 3s
-
A pod definition file is created at /root/CKA/use-pv.yaml. Make use of this manifest file and mount the persistent volume called pv-1. Ensure the pod is running and the PV is bound.
-
mountPath: /data
-
persistentVolumeClaim Name: my-pvc
This is the given pod YAML file.
## /root/CKA/use-pv.yaml apiVersion: v1 kind: Pod metadata: creationTimestamp: null labels: run: use-pv name: use-pv spec: containers: - image: nginx name: use-pv resources: {} dnsPolicy: ClusterFirst restartPolicy: Always status: {}
Answer
Check the PV.
controlplane ~ ➜ k get pv NAME CAPACITY ACCESS MODES RECLAIM POLICY STATUS CLAIM STORAGECLASS REASON AGE pv-1 10Mi RWO Retain Available 18s controlplane ~ ➜ k get pvc No resources found in default namespace.
controlplane ~/CKA ➜ k get pv pv-1 -o yaml apiVersion: v1 kind: PersistentVolume metadata: creationTimestamp: "2024-01-05T04:30:26Z" finalizers: - kubernetes.io/pv-protection name: pv-1 resourceVersion: "3753" uid: ad7d65b3-a7d4-4596-bf05-d12d23f4eeba spec: accessModes: - ReadWriteOnce capacity: storage: 10Mi hostPath: path: /opt/data type: "" persistentVolumeReclaimPolicy: Retain volumeMode: Filesystem status: phase: Available
Create the PVC yaml file.
controlplane ~ ➜ cd CKA controlplane ~/CKA ➜ ls -l total 4 -rw-r--r-- 1 root root 235 Jan 5 00:10 use-pv.yaml
## pvc.yml apiVersion: v1 kind: PersistentVolumeClaim metadata: name: my-pvc spec: accessModes: - ReadWriteOnce resources: requests: storage: 10Mi
controlplane ~/CKA ➜ k apply -f pvc.yml persistentvolumeclaim/my-pvc created controlplane ~/CKA ➜ k get pvc NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE my-pvc Bound pv-1 10Mi RWO 8s controlplane ~/CKA ➜ k get pv NAME CAPACITY ACCESS MODES RECLAIM POLICY STATUS CLAIM STORAGECLASS REASON AGE pv-1 10Mi RWO Retain Bound default/my-pvc 2m18s
Modify the pod YAML.
## use-pv.yml apiVersion: v1 kind: Pod metadata: creationTimestamp: null labels: run: use-pv name: use-pv spec: containers: - image: nginx name: use-pv resources: {} volumeMounts: - mountPath: "/data" name: vol volumes: - name: vol persistentVolumeClaim: claimName: my-pvc dnsPolicy: ClusterFirst restartPolicy: Always status: {}
controlplane ~/CKA ➜ k apply -f use-pv.yaml pod/use-pv created controlplane ~/CKA ➜ k get po NAME READY STATUS RESTARTS AGE redis-storage 1/1 Running 0 6m39s super-user-pod 1/1 Running 0 3m39s use-pv 1/1 Running 0 25s controlplane ~/CKA ➜ k describe pod use-pv | grep Volumes: -A 5 Volumes: vol: Type: PersistentVolumeClaim (a reference to a PersistentVolumeClaim in the same namespace) ClaimName: my-pvc ReadOnly: false
-
-
Create a new user called john. Grant him access to the cluster. John should have permission to create, list, get, update and delete pods in the development namespace . The private key exists in the location: /root/CKA/john.key and csr at /root/CKA/john.csr.
Important Note: As of kubernetes 1.19, the CertificateSigningRequest object expects a signerName.
-
CSR: john-developer Status:Approved
-
Role Name: developer, namespace: development, Resource: Pods
-
Access: User 'john' has appropriate permissions
Answer
Follow steps here: https://kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/
controlplane ~ ➜ mkdir user-john controlplane ~ ➜ cd user-john/ controlplane ~/user-john ➜ openssl genrsa -out john.key 2048 Generating RSA private key, 2048 bit long modulus (2 primes) ...+++++ ..........+++++ e is 65537 (0x010001) controlplane ~/user-john ➜ openssl req -new -key john.key -out john.csr -subj "/CN=john" controlplane ~/user-john ➜ ls -l total 8 -rw-r--r-- 1 root root 883 Jan 5 00:28 john.csr -rw------- 1 root root 1675 Jan 5 00:27 john.key
controlplane ~/user-john ➜ cat john.csr | base64 | tr -d "\n" LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQ1ZEQ0NBVHdDQVFBd0R6RU5NQXNHQTFVRUF3d0VhbTlvYmpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRApnZ0VQQURDQ0FRb0NnZ0VCQU9sVUVhMFVoK09lVks3TT
Create the CSR yaml file.
## john-csr.yml --- apiVersion: certificates.k8s.io/v1 kind: CertificateSigningRequest metadata: name: john-developer spec: signerName: kubernetes.io/kube-apiserver-client request: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQ1ZEQ0NBVHdDQVFBd0R6RU5NQXNHQTFVRUF3d0VhbTlvYmpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRApnZ0VQQURDQ0FRb0NnZ0VCQU9sVUVhMFVoK09lVk usages: - digital signature - key encipherment - client auth
controlplane ~/user-john ➜ k apply -f john-csr.yml certificatesigningrequest.certificates.k8s.io/john-developer created controlplane ~/user-john ➜ k get csr NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION csr-pd24m 25m kubernetes.io/kube-apiserver-client-kubelet system:node:controlplane <none> Approved,Issued csr-qsk2x 24m kubernetes.io/kube-apiserver-client-kubelet system:bootstrap:k93sdz <none> Approved,Issued john-developer 6s kubernetes.io/kube-apiserver-client kubernetes-admin <none> Pending controlplane ~/user-john ➜ kubectl certificate approve john-developer certificatesigningrequest.certificates.k8s.io/john-developer approved controlplane ~/user-john ➜ k get csr NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION csr-pd24m 25m kubernetes.io/kube-apiserver-client-kubelet system:node:controlplane <none> Approved,Issued csr-qsk2x 25m kubernetes.io/kube-apiserver-client-kubelet system:bootstrap:k93sdz <none> Approved,Issued john-developer 47s kubernetes.io/kube-apiserver-client kubernetes-admin <none> Approved,Issued
Next, create the role and rolebinding.
## dev-role.yml apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: namespace: development name: developer rules: - apiGroups: [""] # "" indicates the core API group resources: ["pods"] verbs: ["create","get","update","delete","list"]
## dev-rolebinding.yml apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: developer-role-binding namespace: development subjects: - kind: User apiGroup: rbac.authorization.k8s.io roleRef: kind: Role #this must be Role or ClusterRole name: developer # this must match the name of the Role or ClusterRole you wish to bind to apiGroup: rbac.authorization.k8s.io
controlplane ~/user-john ➜ k apply -f dev-role.yml role.rbac.authorization.k8s.io/developer created controlplane ~/user-john ➜ k apply -f dev-rolebinding.yml rolebinding.rbac.authorization.k8s.io/developer-role-binding created controlplane ~/user-john ✖ k get -n development role | grep dev developer 2024-01-05T05:47:57Z controlplane ~/user-john ➜ k get -n development rolebindings.rbac.authorization.k8s.io | grep dev developer-role-binding Role/developer 21s
To verify:
controlplane ~/user-john ➜ kubectl auth can-i update pods --as=john -n development yes
-
-
Create a nginx pod called nginx-resolver using image nginx, expose it internally with a service called nginx-resolver-service. Test that you are able to look up the service and pod names from within the cluster. Use the image: busybox:1.28 for dns lookup. Record results in /root/CKA/nginx.svc and /root/CKA/nginx.pod
Answer
controlplane ~/CKA ➜ k run nginx-resolver --image nginx pod/nginx-resolver created controlplane ~/CKA ✖ k get po NAME READY STATUS RESTARTS AGE nginx-deploy-5c95467974-7l68p 1/1 Running 0 102s nginx-resolver 1/1 Running 0 11s redis-storage 1/1 Running 0 12m super-user-pod 1/1 Running 0 9m57s use-pv 1/1 Running 0 6m43s
Take note of the word "internally", this means that the port type is a ClusterIP.
controlplane ~/user-john ➜ k expose pod nginx-resolver \ --name nginx-resolver-service \ --port 80 \ --target-port 80 \ --type=ClusterIP service/nginx-resolver-service exposed controlplane ~ ➜ k get svc NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 26m nginx-resolver-service ClusterIP 10.106.113.53 <none> 80/TCP 4s
For testing, we'll create another pod.
ontrolplane ~ ➜ k run pod-tester --image busybox:1.28 --restart Never --rm -it -- nslookup nginx-resolver-service If you don't see a command prompt, try pressing enter. warning: couldn't attach to pod/pod-tester, falling back to streaming logs: unable to upgrade connection: container pod-tester not found in pod pod-tester_default Server: 10.96.0.10 Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local Name: nginx-resolver-service Address 1: 10.106.113.53 nginx-resolver-service.default.svc.cluster.local pod "pod-tester" deleted controlplane ~ ➜ k run pod-tester --image busybox:1.28 --restart Never --rm -it -- nslookup nginx-resolver-service > /root/CKA/nginx.svc controlplane ~ ➜ ls -l /root/CKA/nginx.svc -rw-r--r-- 1 root root 217 Jan 5 01:00 /root/CKA/nginx.svc controlplane ~ ➜ cat /root/CKA/nginx.svc Server: 10.96.0.10 Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local Name: nginx-resolver-service Address 1: 10.106.113.53 nginx-resolver-service.default.svc.cluster.local pod "pod-tester" deleted
Try using the pod IP.
controlplane ~ ➜ k get po nginx-resolver -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES nginx-resolver 1/1 Running 0 4m54s 10.244.192.1 node01 <none> <none> ontrolplane ~ ✦ ➜ k run pod-tester --image busybox:1.28 --restart Never --rm -it -- nslookup 10.244.192.1 Server: 10.96.0.10 Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local Name: 10.244.192.1 Address 1: 10.244.192.1 10-244-192-1.nginx-resolver-service.default.svc.cluster.local pod "pod-tester" deleted controlplane ~ ✦ ➜ k run pod-tester --image busybox:1.28 --restart Never --rm -it -- nslookup 10.244.192.1 > /root/CKA/nginx.pod controlplane ~ ✦ ➜ ls -l /root/CKA/nginx.pod -rw-r--r-- 1 root root 219 Jan 5 01:02 /root/CKA/nginx.pod controlplane ~ ✦ ➜ cat /root/CKA/nginx.pod Server: 10.96.0.10 Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local Name: 10.244.192.1 Address 1: 10.244.192.1 10-244-192-1.nginx-resolver-service.default.svc.cluster.local pod "pod-tester" deleted
-
Create a static pod on node01 called nginx-critical with image nginx and make sure that it is recreated/restarted automatically in case of a failure.
Use /etc/kubernetes/manifests as the Static Pod path for example.
Answer
Read carefully again. The static pod needs to be created in node01, not in the controlplane. Generate the YAML first and copy it onto node01.
controlplane ~ ➜ k run nginx-critical --image nginx -o yaml > nginx-critical.yml controlplane ~ ➜ scp nginx-critical.yml node01:/root nginx-critical.yml 100% 1577 2.1MB/s 00:00 controlplane ~ ➜ ssh node01 Last login: Fri Jan 5 01:06:59 2024 from 192.10.251.4 root@node01 ~ ➜ ls -l total 4 -rw-r--r-- 1 root root 1577 Jan 5 01:08 nginx-critical.yml
Then create the required directory.
root@node01 ~ ➜ mkdir -p /etc/kubernetes/manifests root@node01 ~ ➜ cp nginx-critical.yml /etc/kubernetes/manifests/ root@node01 ~ ➜ ls -l /etc/kubernetes/manifests/ total 4 -rw-r--r-- 1 root root 1577 Jan 5 01:09 nginx-critical.yml
Check the statisPdPath. It should be set to manifest directory.
root@node01 ~ ➜ grep -i static /var/lib/kubelet/config.yaml staticPodPath: /etc/kubernetes/manifests
Back at controlplane:
controlplane ~ ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES nginx-critical 1/1 Running 0 7m21s 10.244.192.1 node01 <none> <none>
-
Create a new service account with the name pvviewer. Grant this Service account access to list all PersistentVolumes in the cluster by creating an appropriate cluster role called pvviewer-role and ClusterRoleBinding called pvviewer-role-binding. Next, create a pod called pvviewer with the image: redis and serviceAccount: pvviewer in the default namespace.
Answer
controlplane ~ ➜ k create sa pvviewer --dry-run=client -o yaml > pvviewer.yml controlplane ~ ➜ ls -l total 8 drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA -rw-r--r-- 1 root root 89 Jan 5 05:13 pvviewer.yml -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml controlplane ~ ➜ cat pvviewer.yml apiVersion: v1 kind: ServiceAccount metadata: creationTimestamp: null name: pvviewer
controlplane ~ ➜ k create clusterrole pvviewer-role --verb list --resource="persistentvolumes" $do > pvviewer-role.yml controlplane ~ ➜ ls -l total 12 drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA -rw-r--r-- 1 root root 197 Jan 5 05:15 pvviewer-role.yml -rw-r--r-- 1 root root 89 Jan 5 05:14 pvviewer.yml -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml controlplane ~ ➜ cat pvviewer-role.yml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: creationTimestamp: null name: pvviewer-role rules: - apiGroups: - "" resources: - persistentvolumes verbs: - list
controlplane ~ ➜ k create clusterrolebinding pvviewer-role-binding --clusterrole pvviewer-role --serviceaccount default:pvviewer $do > pvviewer-role-binding.yml controlplane ~ ➜ ls -l total 16 drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA -rw-r--r-- 1 root root 292 Jan 5 05:17 pvviewer-role-binding.yml -rw-r--r-- 1 root root 197 Jan 5 05:15 pvviewer-role.yml -rw-r--r-- 1 root root 89 Jan 5 05:14 pvviewer.yml -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml controlplane ~ ➜ cat pvviewer-role-binding.yml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: creationTimestamp: null name: pvviewer-role-binding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: pvviewer-role subjects: - kind: ServiceAccount name: pvviewer namespace: default
controlplane ~ ➜ k run pvviewer --image redis $do > pvviewer-pod.yml controlplane ~ ➜ ls -l total 20 drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA -rw-r--r-- 1 root root 241 Jan 5 05:18 pvviewer-pod.yml -rw-r--r-- 1 root root 292 Jan 5 05:17 pvviewer-role-binding.yml -rw-r--r-- 1 root root 197 Jan 5 05:15 pvviewer-role.yml -rw-r--r-- 1 root root 89 Jan 5 05:14 pvviewer.yml -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml
Modify the pod YAML and add the service account.
apiVersion: v1 kind: Pod metadata: creationTimestamp: null labels: run: pvviewer name: pvviewer spec: serviceAccountName: pvviewer containers: - image: redis name: pvviewer resources: {} dnsPolicy: ClusterFirst restartPolicy: Always status: {}
controlplane ~ ➜ ls -l total 20 drwxr-xr-x 2 root root 4096 Jan 5 05:11 CKA -rw-r--r-- 1 root root 272 Jan 5 05:20 pvviewer-pod.yml -rw-r--r-- 1 root root 292 Jan 5 05:17 pvviewer-role-binding.yml -rw-r--r-- 1 root root 197 Jan 5 05:15 pvviewer-role.yml -rw-r--r-- 1 root root 89 Jan 5 05:14 pvviewer.yml -rw-rw-rw- 1 root root 0 Dec 13 05:39 sample.yaml controlplane ~ ➜ k apply -f . clusterrolebinding.rbac.authorization.k8s.io/pvviewer-role-binding created clusterrole.rbac.authorization.k8s.io/pvviewer-role created serviceaccount/pvviewer created pod/pvviewer created
controlplane ~ ➜ k get clusterrole | grep pv pvviewer-role 2024-01-05T10:20:58Z system:controller:pv-protection-controller 2024-01-05T09:52:44Z system:controller:pvc-protection-controller 2024-01-05T09:52:44Z controlplane ~ ➜ k get clusterrole | grep pvv pvviewer-role 2024-01-05T10:20:58Z controlplane ~ ➜ k get clusterrolebinding | grep pvv pvviewer-role-binding ClusterRole/pvviewer-role 82s controlplane ~ ➜ k get sa | grep pvv pvviewer 0 90s controlplane ~ ➜ k get po NAME READY STATUS RESTARTS AGE pvviewer 1/1 Running 0 79s controlplane ~ ➜ k describe po pvviewer | grep -i service Service Account: pvviewer
-
List the InternalIP of all nodes of the cluster. Save the result to a file /root/CKA/node_ips. Answer should be in the format:
InternalIP of controlplane<space>InternalIP of node01 (in a single line)
Answer
controlplane ~ ➜ k get no NAME STATUS ROLES AGE VERSION controlplane Ready control-plane 32m v1.27.0 node01 Ready <none> 32m v1.27.0 controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.addresses[*]}' {"address":"192.22.238.9","type":"InternalIP"} {"address":"controlplane","type":"Hostname"} {"address":"192.22.238.12","type":"InternalIP"} {"address":"node01","type":"Hostname"} controlplane ~ ➜ controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.addresses[0]}' {"address":"192.22.238.9","type":"InternalIP"} {"address":"192.22.238.12","type":"InternalIP"} controlplane ~ ➜ controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.addresses[0].address}' 192.22.238.9 192.22.238.12 controlplane ~ ➜ controlplane ~ ➜ k get no -o jsonpath='{.items[*].status.addresses[0].address}' > /root/CKA/node_ips controlplane ~ ➜ ls -la /root/CKA/node_ips -rw-r--r-- 1 root root 26 Jan 5 06:11 /root/CKA/node_ips controlplane ~ ➜ cat /root/CKA/node_ips 192.22.238.9 192.22.238.12
-
Create a pod called multi-pod with two containers.
-
Container 1, name: alpha, image: nginx
-
Container 2: name: beta, image: busybox, command: sleep 4800
Environment Variables:
-
container 1:
- name: alpha
-
Container 2:
- name: beta
Answer
controlplane ~ ➜ k run multi-pod --image nginx $do > multi-pod.yml controlplane ~ ➜ ls -l total 24 drwxr-xr-x 2 root root 4096 Jan 5 06:11 CKA -rw-r--r-- 1 root root 244 Jan 5 06:14 multi-pod.yml
Modify the pod YAML file.
apiVersion: v1 kind: Pod metadata: creationTimestamp: null labels: run: multi-pod name: multi-pod spec: containers: - image: busybox name: beta command: ["sh","-c","sleep 4800"] env: - name: NAME value: beta - image: nginx name: alpha env: - name: NAME value: alpha resources: {} dnsPolicy: ClusterFirst restartPolicy: Always status: {}
controlplane ~ ➜ k apply -f multi-pod.yml pod/multi-pod created controlplane ~ ➜ k get po NAME READY STATUS RESTARTS AGE multi-pod 2/2 Running 0 7s pvviewer 1/1 Running 0 10m
controlplane ~ ➜ k describe po multi-pod | grep Containers -A 40 Containers: beta: Container ID: containerd://c2c4de069fcc7ca32732708ea9865e72956fce2c1f25734a2ab3c30a045e064f Image: busybox Image ID: docker.io/library/busybox@sha256:ba76950ac9eaa407512c9d859cea48114eeff8a6f12ebaa5d32ce79d4a017dd8 Port: <none> Host Port: <none> Command: sh -c sleep 4800 State: Running Started: Fri, 05 Jan 2024 06:19:33 -0500 Ready: True Restart Count: 0 Environment: NAME: beta Mounts: /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-v87xr (ro) alpha: Container ID: containerd://5ed2a20d88c470c61e6a0766230c95e430b8847f4fcbdc1a12bb46e9d3d49c26 Image: nginx Image ID: docker.io/library/nginx@sha256:2bdc49f2f8ae8d8dc50ed00f2ee56d00385c6f8bc8a8b320d0a294d9e3b49026 Port: <none> Host Port: <none> State: Running Started: Fri, 05 Jan 2024 06:19:37 -0500 Ready: True Restart Count: 0 Environment: NAME: alpha Mounts: /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-v87xr (ro)
-
-
Create a Pod called non-root-pod , image: redis:alpine
-
runAsUser: 1000
-
fsGroup: 2000
Answer
controlplane ~ ➜ k run non-root-pod --image redis:alpine $do > non-root-pod.yml
apiVersion: v1 kind: Pod metadata: creationTimestamp: null labels: run: non-root-pod name: non-root-pod spec: securityContext: runAsUser: 1000 fsGroup: 2000 containers: - image: redis:alpine name: non-root-pod resources: {} dnsPolicy: ClusterFirst restartPolicy: Always status: {}
controlplane ~ ➜ k get po NAME READY STATUS RESTARTS AGE multi-pod 2/2 Running 0 3m16s non-root-pod 1/1 Running 0 6s pvviewer 1/1 Running 0 13m
-
-
We have deployed a new pod called np-test-1 and a service called np-test-service. Incoming connections to this service are not working. Troubleshoot and fix it. Create NetworkPolicy, by the name ingress-to-nptest that allows incoming connections to the service over port 80.
Answer
controlplane ~ ➜ k get po NAME READY STATUS RESTARTS AGE multi-pod 2/2 Running 0 3m56s non-root-pod 1/1 Running 0 46s np-test-1 1/1 Running 0 21s pvviewer 1/1 Running 0 14m controlplane ~ ➜ k get svc NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 40m np-test-service ClusterIP 10.106.46.125 <none> 80/TCP 27s
## netpol.yml --- apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: ingress-to-nptest namespace: default spec: podSelector: matchLabels: run: np-test-1 policyTypes: - Ingress ingress: - ports: - protocol: TCP port: 80
controlplane ~ ➜ k apply -f netpol.yml networkpolicy.networking.k8s.io/ingress-to-nptest created controlplane ~ ➜ k get netpol NAME POD-SELECTOR AGE default-deny <none> 4m58s ingress-to-nptest <none> 8s
Verify that the port the open by running a test pod which will telnet to the service via port 80.
controlplane ~ ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES multi-pod 2/2 Running 0 10m 10.244.192.2 node01 <none> <none> non-root-pod 1/1 Running 0 7m15s 10.244.192.3 node01 <none> <none> np-test-1 1/1 Running 0 6m50s 10.244.192.4 node01 <none> <none> pvviewer 1/1 Running 0 20m 10.244.192.1 node01 <none> <none> controlplane ~ ➜ k run test-pod --image busybox --rm -it -- telnet np-test-service 80 If you don't see a command prompt, try pressing enter. Connected to np-test-service Session ended, resume using 'kubectl attach test-pod -c test-pod -i -t' command when the pod is running pod "test-pod" deleted controlplane ~ ➜ k run test-pod --image busybox --rm -it -- telnet 10.244.192.4 80 If you don't see a command prompt, try pressing enter. Connected to 10.244.192.4
-
Taint the worker node node01 to be Unschedulable. Once done, create a pod called dev-redis, image redis:alpine, to ensure workloads are not scheduled to this worker node. Finally, create a new pod called prod-redis and image: redis:alpine with toleration to be scheduled on node01.
- key: env_type
- value: production
- operator: Equal and effect: NoSchedule
Answer
controlplane ~ ➜ k taint node controlplane env_type=production:NoSchedule- node/controlplane untainted controlplane ~ ➜ k taint node node01 env_type=production:NoSchedule node/node01 tainted controlplane ~ ➜ k describe no node01 | grep -i taint Taints: env_type=production:NoSchedule controlplane ~ ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES multi-pod 2/2 Running 0 15m 10.244.192.2 node01 <none> <none> non-root-pod 1/1 Running 0 11m 10.244.192.3 node01 <none> <none> np-test-1 1/1 Running 0 11m 10.244.192.4 node01 <none> <none> pvviewer 1/1 Running 0 25m 10.244.192.1 node01 <none> <none>
Create the dev-redis pod. It should not be scheduled on node01.
controlplane ~ ➜ k run dev-redis --image redis:alpine pod/dev-redis created controlplane ~ ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES dev-redis 0/1 ContainerCreating 0 2s <none> controlplane <none> <none> multi-pod 2/2 Running 0 15m 10.244.192.2 node01 <none> <none> non-root-pod 1/1 Running 0 12m 10.244.192.3 node01 <none> <none> np-test-1 1/1 Running 0 12m 10.244.192.4 node01 <none> <none> pvviewer 1/1 Running 0 26m 10.244.192.1 node01 <none> <none>
Next, create the prod-redis with the specified tolerations. It should be schedules on node01.
controlplane ~ ➜ k run prod-redis --image redis:alpine $do > prod-redis.yml
## prod-redis.yml apiVersion: v1 kind: Pod metadata: creationTimestamp: null labels: run: prod-redis name: prod-redis spec: tolerations: - key: "env_type" operator: "Equal" value: "production" effect: "NoSchedule" containers: - image: redis:alpine name: prod-redis resources: {} dnsPolicy: ClusterFirst restartPolicy: Always status: {}
controlplane ~ ➜ k apply -f prod-redis.yml pod/prod-redis created controlplane ~ ➜ k get po -o wide NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES dev-redis 1/1 Running 0 5m6s 10.244.0.4 controlplane <none> <none> multi-pod 2/2 Running 0 21m 10.244.192.2 node01 <none> <none> non-root-pod 1/1 Running 0 17m 10.244.192.3 node01 <none> <none> np-test-1 1/1 Running 0 17m 10.244.192.4 node01 <none> <none> prod-redis 1/1 Running 0 6s 10.244.192.5 node01 <none> <none> pvviewer 1/1 Running 0 31m 10.244.192.1 node01 <none> <none>
-
Create a pod called hr-pod in hr namespace belonging to the production environment and frontend tier .
- image: redis:alpine
Use appropriate labels and create all the required objects if it does not exist in the system already.
Answer
controlplane ~ ➜ k create ns hr namespace/hr created controlplane ~ ➜ k run hr-pod --image redis:alpine --namespace hr --labels "environment=production,tier=frontend" $do apiVersion: v1 kind: Pod metadata: creationTimestamp: null labels: environment: production tier: frontend name: hr-pod namespace: hr spec: containers: - image: redis:alpine name: hr-pod resources: {} dnsPolicy: ClusterFirst restartPolicy: Always status: {} controlplane ~ ➜ k run hr-pod --image redis:alpine --namespace hr --labels "environment=production,tier=frontend" pod/hr-pod created controlplane ~ ➜ k get po -n hr NAME READY STATUS RESTARTS AGE hr-pod 1/1 Running 0 38s controlplane ~ ➜ k describe -n hr po hr-pod | grep -i image: Image: redis:alpine controlplane ~ ➜ k describe -n hr po hr-pod | grep -i label -A 5 Labels: environment=production tier=frontend
-
A kubeconfig file called super.kubeconfig has been created under /root/CKA. There is something wrong with the configuration. Troubleshoot and fix it.
Answer
controlplane ~ ➜ ls -la CKA total 24 drwxr-xr-x 2 root root 4096 Jan 5 06:45 . drwx------ 1 root root 4096 Jan 5 06:39 .. -rw-r--r-- 1 root root 26 Jan 5 06:11 node_ips -rw------- 1 root root 5636 Jan 5 06:45 super.kubeconfig controlplane ~ ➜ k cluster-info --kubeconfig CKA/super.kubeconfig E0105 06:46:28.819247 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused E0105 06:46:28.819555 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused E0105 06:46:28.820954 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused E0105 06:46:28.822299 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused E0105 06:46:28.823566 20286 memcache.go:265] couldn't get current server API group list: Get "https://controlplane:9999/api?timeout=32s": dial tcp 192.22.238.9:9999: connect: connection refused To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. The connection to the server controlplane:9999 was refused - did you specify the right host or port?
Make sure the port is correct in /root/CKA/super.kubeconfig.
server: https://controlplane:6443
controlplane ~ ➜ kubectl cluster-info --kubeconfig=/root/CKA/super.kubeconfig Kubernetes control plane is running at https://controlplane:6443 CoreDNS is running at https://controlplane:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.