No nodes available to schedule pods when add plugins."io.containerd.grpc.v1.cri".registry.mirrors

Hello! I use microk8s

snap info microk8s

tracking: 1.20/stable

When i add plugins.“io.containerd.grpc.v1.cri”.registry.mirrors to /var/snap/microk8s/current/args/containerd-template.toml

kubectl get all --all-namespaces

NAMESPACE            NAME                                          READY   STATUS    RESTARTS   AGE
kube-system          pod/calico-kube-controllers-847c8c99d-2fq82   0/1     Pending   0          51m
kube-system          pod/coredns-86f78bb79c-886l9                  0/1     Pending   0          48m
kube-system          pod/hostpath-provisioner-5c65fbdb4f-r5lpd     0/1     Pending   0          46m
container-registry   pod/registry-9b57d9df8-sj2zv                  0/1     Pending   0          45m
metallb-system       pod/controller-559b68bfd8-5kcp9               0/1     Pending   0          44m

NAMESPACE            NAME                 TYPE        CLUSTER-IP      EXTERNAL-IP   PORT(S)                  AGE
default              service/kubernetes   ClusterIP   10.152.183.1    <none>        443/TCP                  51m
kube-system          service/kube-dns     ClusterIP   10.152.183.10   <none>        53/UDP,53/TCP,9153/TCP   48m
container-registry   service/registry     NodePort    10.152.183.25   <none>        5000:32000/TCP           45m
 
NAMESPACE        NAME                                               DESIRED   CURRENT   READY   UP-TO-DATE   AVAILABLE   NODE SELECTOR                 AGE
kube-system      daemonset.apps/calico-node                         0         0         0       0            0           kubernetes.io/os=linux        51m
ingress          daemonset.apps/nginx-ingress-microk8s-controller   0         0         0       0            0           <none>                        47m
metallb-system   daemonset.apps/speaker                             0         0         0       0            0           beta.kubernetes.io/os=linux   44m

NAMESPACE            NAME                                      READY   UP-TO-DATE   AVAILABLE   AGE
kube-system          deployment.apps/calico-kube-controllers   0/1     1            0           51m
kube-system          deployment.apps/coredns                   0/1     1            0           48m
kube-system          deployment.apps/hostpath-provisioner      0/1     1            0           46m
container-registry   deployment.apps/registry                  0/1     1            0           45m
metallb-system       deployment.apps/controller                0/1     1            0           44m

NAMESPACE            NAME                                                DESIRED   CURRENT   READY   AGE
kube-system          replicaset.apps/calico-kube-controllers-847c8c99d   1         1         0       51m
kube-system          replicaset.apps/coredns-86f78bb79c                  1         1         0       48m
kube-system          replicaset.apps/hostpath-provisioner-5c65fbdb4f     1         1         0       46m
container-registry   replicaset.apps/registry-9b57d9df8                  1         1         0       45m
metallb-system       replicaset.apps/controller-559b68bfd8               1         1         0       44m

kubectl describe pod -n kube-system pod calico-kube-controllers-847c8c99d-2fq82

Events:
Type Reason Age From Message


Warning FailedScheduling 101s (x54 over 52m) default-scheduler no nodes available to schedule pods
Error from server (NotFound): pods “pod” not found

sudo cat /var/snap/microk8s/current/args/containerd-template.toml

 # Use config version 2 to enable new configuration fields.
 version = 2
 oom_score = 0
 
 [grpc]
   uid = 0
   gid = 0
   max_recv_message_size = 16777216
   max_send_message_size = 16777216
 
 [debug]
   address = ""
   uid = 0
   gid = 0
 
 [metrics]
   address = "127.0.0.1:1338"
   grpc_histogram = false
 
 [cgroup]
   path = ""
 
 
 # The 'plugins."io.containerd.grpc.v1.cri"' table contains all of the server options.
 [plugins."io.containerd.grpc.v1.cri"]
 
   stream_server_address = "127.0.0.1"
   stream_server_port = "0"
   enable_selinux = false
   sandbox_image = "k8s.gcr.io/pause:3.1"
   stats_collect_period = 10
   enable_tls_streaming = false
   max_container_log_line_size = 16384
 
   # 'plugins."io.containerd.grpc.v1.cri".containerd' contains config related to containerd
   [plugins."io.containerd.grpc.v1.cri".containerd]
 
     # snapshotter is the snapshotter used by containerd.
     snapshotter = "${SNAPSHOTTER}"
 
     # no_pivot disables pivot-root (linux only), required when running a container in a RamDisk with runc.
     # This only works for runtime type "io.containerd.runtime.v1.linux".
     no_pivot = false
 
     # default_runtime_name is the default runtime name to use.
     default_runtime_name = "${RUNTIME}"
 
     # 'plugins."io.containerd.grpc.v1.cri".containerd.runtimes' is a map from CRI RuntimeHandler strings, which specify types
     # of runtime configurations, to the matching configurations.
     # In this example, 'runc' is the RuntimeHandler string to match.
     [plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc]
       # runtime_type is the runtime type to use in containerd e.g. io.containerd.runtime.v1.linux
       runtime_type = "io.containerd.runc.v1"
 
     [plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-container-runtime]
       # runtime_type is the runtime type to use in containerd e.g. io.containerd.runtime.v1.linux
       runtime_type = "io.containerd.runc.v1"
 
       [plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-container-runtime.options]
         BinaryName = "nvidia-container-runtime"
 
   # 'plugins."io.containerd.grpc.v1.cri".cni' contains config related to cni
   [plugins."io.containerd.grpc.v1.cri".cni]
     # bin_dir is the directory in which the binaries for the plugin is kept.
     bin_dir = "${SNAP_DATA}/opt/cni/bin"
 
     # conf_dir is the directory in which the admin places a CNI conf.
     conf_dir = "${SNAP_DATA}/args/cni-network"
 
   # 'plugins."io.containerd.grpc.v1.cri".registry' contains config related to the registry
   [plugins."io.containerd.grpc.v1.cri".registry]
 
     # 'plugins."io.containerd.grpc.v1.cri".registry.mirrors' are namespace to mirror mapping for all namespaces.
     [plugins."io.containerd.grpc.v1.cri".registry.mirrors]
       [plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
         endpoint = ["https://registry-1.docker.io", ]
       [plugins."io.containerd.grpc.v1.cri".registry.mirrors."localhost:32000"]
         endpoint = ["http://localhost:32000"]
       [plugins."io.containerd.grpc.v1.cri".registry.mirrors."xx.yy.zz.hh:53680"]
         endpoint = ["http://xx.yy.zz.hh:53680"]

The calico pods are not in Running state. Do you see anything suspicious in the containerd logs?

journalctl -u snap.microk8s.daemon-containerd -f

history

sudo apt-get update
sudo apt-get install snapd -y
sudo snap install microk8s --classic
sudo vi /var/snap/microk8s/current/args/containerd-template.toml
sudo microk8s start
sudo microk8s kubectl get all --all-namespaces
sudo journalctl -u snap.microk8s.daemon-containerd -f -n100
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9166]: /snap/microk8s/2074/bin/containerd: symbol lookup error: /snap/microk8s/2074/bin/containerd: undefined symbol: seccomp_api_set
Mar 28 07:57:39 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Main process exited, code=exited, status=127/n/a
Mar 28 07:57:39 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Failed with result 'exit-code'.
Mar 28 07:57:39 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Service hold-off time over, scheduling restart.
Mar 28 07:57:39 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Scheduled restart job, restart counter is at 4.
Mar 28 07:57:39 ubuntu1804 systemd[1]: Stopped Service for snap application microk8s.daemon-containerd.
Mar 28 07:57:39 ubuntu1804 systemd[1]: Started Service for snap application microk8s.daemon-containerd.
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + '[' -d /sys/kernel/security/apparmor ']'
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: ++ cat /proc/self/attr/current
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + '[' 'snap.microk8s.daemon-containerd (complain)' '!=' unconfined ']'
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + exec aa-exec -p unconfined -- /snap/microk8s/2074/run-containerd-with-args
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + '[' -d /sys/kernel/security/apparmor ']'
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: ++ cat /proc/self/attr/current
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + '[' unconfined '!=' unconfined ']'
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + export PATH=/snap/microk8s/2074/usr/sbin:/snap/microk8s/2074/usr/bin:/snap/microk8s/2074/sbin:/snap/microk8s/2074/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + PATH=/snap/microk8s/2074/usr/sbin:/snap/microk8s/2074/usr/bin:/snap/microk8s/2074/sbin:/snap/microk8s/2074/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: ++ /snap/microk8s/2074/bin/uname -m
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + ARCH=x86_64
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + export LD_LIBRARY_PATH=:/snap/microk8s/2074/lib:/snap/microk8s/2074/usr/lib:/snap/microk8s/2074/lib/x86_64-linux-gnu:/snap/microk8s/2074/usr/lib/x86_64-linux-gnu
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + LD_LIBRARY_PATH=:/snap/microk8s/2074/lib:/snap/microk8s/2074/usr/lib:/snap/microk8s/2074/lib/x86_64-linux-gnu:/snap/microk8s/2074/usr/lib/x86_64-linux-gnu
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + export LD_LIBRARY_PATH=/var/lib/snapd/lib/gl:/var/lib/snapd/lib/gl32:/var/lib/snapd/void::/snap/microk8s/2074/lib:/snap/microk8s/2074/usr/lib:/snap/microk8s/2074/lib/x86_64-linux-gnu:/snap/microk8s/2074/usr/lib/x86_64-linux-gnu
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + LD_LIBRARY_PATH=/var/lib/snapd/lib/gl:/var/lib/snapd/lib/gl32:/var/lib/snapd/void::/snap/microk8s/2074/lib:/snap/microk8s/2074/usr/lib:/snap/microk8s/2074/lib/x86_64-linux-gnu:/snap/microk8s/2074/usr/lib/x86_64-linux-gnu
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + export XDG_RUNTIME_DIR=/var/snap/microk8s/common/run
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + XDG_RUNTIME_DIR=/var/snap/microk8s/common/run
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + mkdir -p /var/snap/microk8s/common/run
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + source /snap/microk8s/2074/actions/common/utils.sh
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + '[' -d /etc/apparmor.d ']'
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + echo 'Using a default profile template'
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: Using a default profile template
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + cp /snap/microk8s/2074/containerd-profile /etc/apparmor.d/cri-containerd.apparmor.d
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + echo 'Reloading AppArmor profiles'
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: Reloading AppArmor profiles
Mar 28 07:57:39 ubuntu1804 microk8s.daemon-containerd[9388]: + service apparmor reload
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + app=containerd
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + '[' -e /var/snap/microk8s/2074/var/lock/gpu ']'
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + RUNTIME=runc
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ snapshotter
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: +++ stat -f -c %T /var/snap/microk8s/common
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ FSTYPE=ext2/ext3
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ '[' ext2/ext3 = zfs ']'
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ echo overlayfs
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + SNAPSHOTTER=overlayfs
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + sed 's@${SNAP}@/snap/microk8s/2074@g;s@${SNAP_DATA}@/var/snap/microk8s/2074@g;s@${SNAPSHOTTER}@overlayfs@g;s@${RUNTIME}@runc@g' /var/snap/microk8s/2074/args/containerd-template.toml
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ is_service_expected_to_start flanneld
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ local service=flanneld
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ '[' -f /var/snap/microk8s/2074/var/lock/no-flanneld ']'
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ echo 0
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + run_flanneld=0
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + '[' 0 == 1 ']'
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ cat /var/snap/microk8s/2074/args/containerd
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + declare -a 'args=(--config ${SNAP_DATA}/args/containerd.toml
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: --root ${SNAP_COMMON}/var/lib/containerd
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: --state ${SNAP_COMMON}/run/containerd
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: --address ${SNAP_COMMON}/run/containerd.sock)'
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + set -a
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + . /var/snap/microk8s/2074/args/containerd-env
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ ulimit -n 65536
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: ++ ulimit -l 16384
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + set +a
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + n=0
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + '[' 0 -ge 20 ']'
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + grep default
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + ip route
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + break
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + export CILIUM_SOCK=/var/snap/microk8s/2074/var/run/cilium/cilium.sock
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + CILIUM_SOCK=/var/snap/microk8s/2074/var/run/cilium/cilium.sock
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: + exec /snap/microk8s/2074/bin/containerd --config /var/snap/microk8s/2074/args/containerd.toml --root /var/snap/microk8s/common/var/lib/containerd --state /var/snap/microk8s/common/run/containerd --address /var/snap/microk8s/common/run/containerd.sock
Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: /snap/microk8s/2074/bin/containerd: symbol lookup error: /snap/microk8s/2074/bin/containerd: undefined symbol: seccomp_api_set
Mar 28 07:57:40 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Main process exited, code=exited, status=127/n/a
Mar 28 07:57:40 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Failed with result 'exit-code'.
Mar 28 07:57:40 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Service hold-off time over, scheduling restart.
Mar 28 07:57:40 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Scheduled restart job, restart counter is at 5.
Mar 28 07:57:40 ubuntu1804 systemd[1]: Stopped Service for snap application microk8s.daemon-containerd.
Mar 28 07:57:40 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Start request repeated too quickly.
Mar 28 07:57:40 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Failed with result 'exit-code'.
Mar 28 07:57:40 ubuntu1804 systemd[1]: Failed to start Service for snap application microk8s.daemon-containerd.

/var/snap/microk8s/current/args/containerd-template.toml

[plugins."io.containerd.grpc.v1.cri".registry.mirrors]
  [plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
    endpoint = ["https://registry-1.docker.io", ]
  [plugins."io.containerd.grpc.v1.cri".registry.mirrors."localhost:32000"]
    endpoint = ["http://localhost:32000"]
  [plugins."io.containerd.grpc.v1.cri".registry.mirrors."45.89.xx.hh:53680"]
    endpoint = ["http://45.89.xx.hh:53680"]

I can see from your logs

Mar 28 07:57:40 ubuntu1804 microk8s.daemon-containerd[9388]: /snap/microk8s/2074/bin/containerd: symbol lookup error: /snap/microk8s/2074/bin/containerd: undefined symbol: seccomp_api_set

Your error could be related to this.

Is there a way to use snap install microk8s --channel 1.20/latest --classic instead?

sudo snap install microk8s --channel 1.20/latest --classic
Warning: Specifying a channel "1.20/latest" is relying on undefined behaviour. Interpreting it as
         "1.20/latest" for now, but this will be an error later.

error: invalid risk in channel name: 1.20/latest

sudo snap install microk8s --channel 1.20/beta --classic

snap info microk8s

installed: v1.20.5 (2094) 218MB classic

Log

Mar 28 10:30:00 ubuntu1804 microk8s.daemon-containerd[21375]: + CILIUM_SOCK=/var/snap/microk8s/2094/var/run/cilium/cilium.sock
Mar 28 10:30:00 ubuntu1804 microk8s.daemon-containerd[21375]: + exec /snap/microk8s/2094/bin/containerd --config /var/snap/microk8s/2094/args/containerd.toml --root /var/snap/microk8s/common/var/lib/containerd --state /var/snap/microk8s/common/run/containerd --address /var/snap/microk8s/common/run/containerd.sock
Mar 28 10:30:00 ubuntu1804 microk8s.daemon-containerd[21375]: /snap/microk8s/2094/bin/containerd: symbol lookup error: /snap/microk8s/2094/bin/containerd: undefined symbol: seccomp_api_set
Mar 28 10:30:00 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Main process exited, code=exited, status=127/n/a
Mar 28 10:30:00 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Failed with result ‘exit-code’.
Mar 28 10:30:00 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Service hold-off time over, scheduling restart.
Mar 28 10:30:00 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Scheduled restart job, restart counter is at 5.
Mar 28 10:30:00 ubuntu1804 systemd[1]: Stopped Service for snap application microk8s.daemon-containerd.
Mar 28 10:30:00 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Start request repeated too quickly.
Mar 28 10:30:00 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Failed with result ‘exit-code’.
Mar 28 10:30:00 ubuntu1804 systemd[1]: Failed to start Service for snap application microk8s.daemon-containerd.

lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 18.04.3 LTS
Release: 18.04
Codename: bionic

sudo apt-cache policy libseccomp2

.libseccomp2:
  Installed: 2.4.1-0ubuntu0.18.04.2
  Candidate: 2.4.3-1ubuntu3.18.04.3
  Version table:
     2.4.3-1ubuntu3.18.04.3 500
        500 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages
        500 http://archive.ubuntu.com/ubuntu bionic-security/main amd64 Packages
 *** 2.4.1-0ubuntu0.18.04.2 100
        100 /var/lib/dpkg/status
     2.3.1-2.1ubuntu4 500
        500 http://archive.ubuntu.com/ubuntu bionic/main amd64 Packages

sudo apt-cache policy containerd

containerd:
  Installed: (none)
  Candidate: 1.3.3-0ubuntu1~18.04.4
  Version table:
     1.3.3-0ubuntu1~18.04.4 500
        500 ubuntu bionic-updates/universe amd64 Packages
     1.2.6-0ubuntu1~18.04.2 500
        500 ubuntu  bionic-security/universe amd64 Packages
     0.2.5-0ubuntu2 500
        500 ubuntu bionic/universe amd64 Packages

Oh im sorry i was thinking its 1.20/stable instead of 1.20/latest

On 1.20/stable same issue

Why is there containerd in the apt?

Containerd not installed in the apt

sudo apt-get update
sudo apt-get install snapd -y
sudo snap install microk8s --classic
sudo vi /var/snap/microk8s/current/args/containerd-template.toml
sudo microk8s start
sudo microk8s kubectl get all --all-namespaces
sudo journalctl -u snap.microk8s.daemon-containerd -f -n100

snap info microk8s

installed: v1.20.4 (2074) 218MB classic

sudo apt-cache policy libseccomp2

libseccomp2:
  Installed: 2.4.3-1ubuntu3.18.04.3
  Candidate: 2.4.3-1ubuntu3.18.04.3
  Version table:
 *** 2.4.3-1ubuntu3.18.04.3 500
        500 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages
        500 http://archive.ubuntu.com/ubuntu bionic-security/main amd64 Packages
        100 /var/lib/dpkg/status
     2.3.1-2.1ubuntu4 500
        500 http://archive.ubuntu.com/ubuntu bionic/main amd64 Packages

sudo journalctl -u snap.microk8s.daemon-containerd -f -n100

Mar 29 03:32:05 ubuntu1804 microk8s.daemon-containerd[12600]: + exec /snap/microk8s/2074/bin/containerd --config /var/snap/microk8s/2074/args/containerd.toml --root /var/snap/microk8s/common/var/lib/containerd --state /var/snap/microk8s/common/run/containerd --address /var/snap/microk8s/common/run/containerd.sock
Mar 29 03:32:05 ubuntu1804 microk8s.daemon-containerd[12600]: /snap/microk8s/2074/bin/containerd: symbol lookup error: /snap/microk8s/2074/bin/containerd: undefined symbol: seccomp_api_set
Mar 29 03:32:05 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Main process exited, code=exited, status=127/n/a
Mar 29 03:32:05 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Failed with result 'exit-code'.
Mar 29 03:32:05 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Service hold-off time over, scheduling restart.
Mar 29 03:32:05 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Scheduled restart job, restart counter is at 5.
Mar 29 03:32:05 ubuntu1804 systemd[1]: Stopped Service for snap application microk8s.daemon-containerd.
Mar 29 03:32:05 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Start request repeated too quickly.
Mar 29 03:32:05 ubuntu1804 systemd[1]: snap.microk8s.daemon-containerd.service: Failed with result 'exit-code'.
Mar 29 03:32:05 ubuntu1804 systemd[1]: Failed to start Service for snap application microk8s.daemon-containerd.

Can you try the solution provided here?

Thanks. I dont try solution.
I create letsencrypt certificate.


here I found opensource Kubernetes deployment, really it was very helpful :slightly_smiling_face: