Created
November 23, 2022 11:06
-
-
Save anjannath/0d70658bd02cacdf66d90e090757240f to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
INFO Kubelet client certificate has expired, renewing it... [will take up to 8 minutes] | |
DEBU retry loop: attempt 0 | |
DEBU Waiting for availability of resource type 'csr' | |
DEBU retry loop: attempt 0 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: Process exited with status 1, output: | |
DEBU The connection to the server api.crc.testing:6443 was refused - did you specify the right host or port? | |
DEBU error: Temporary error: ssh command error: | |
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
err : Process exited with status 1 | |
- sleeping 1s | |
DEBU retry loop: attempt 1 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: Process exited with status 1, output: | |
DEBU The connection to the server api.crc.testing:6443 was refused - did you specify the right host or port? | |
DEBU error: Temporary error: ssh command error: | |
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
err : Process exited with status 1 | |
- sleeping 1s | |
DEBU retry loop: attempt 2 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: Process exited with status 1, output: | |
DEBU The connection to the server api.crc.testing:6443 was refused - did you specify the right host or port? | |
DEBU error: Temporary error: ssh command error: | |
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
err : Process exited with status 1 | |
- sleeping 1s | |
DEBU retry loop: attempt 3 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: Process exited with status 124, output: | |
DEBU | |
DEBU error: Temporary error: ssh command error: | |
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
err : Process exited with status 124 | |
- sleeping 1s | |
DEBU retry loop: attempt 4 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: Process exited with status 124, output: | |
DEBU | |
DEBU error: Temporary error: ssh command error: | |
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
err : Process exited with status 124 | |
- sleeping 1s | |
DEBU retry loop: attempt 5 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: Process exited with status 1, output: | |
DEBU Unable to connect to the server: x509: certificate has expired or is not yet valid: current time 2024-11-23T10:00:35Z is after 2023-11-22T03:47:10Z | |
DEBU error: Temporary error: ssh command error: | |
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
err : Process exited with status 1 | |
- sleeping 1s | |
DEBU retry loop: attempt 6 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: Process exited with status 1, output: | |
DEBU Unable to connect to the server: x509: certificate has expired or is not yet valid: current time 2024-11-23T10:00:36Z is after 2023-11-22T03:47:10Z | |
DEBU error: Temporary error: ssh command error: | |
command : timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
err : Process exited with status 1 | |
- sleeping 1s | |
DEBU retry loop: attempt 7 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION | |
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
DEBU NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION | |
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
DEBU Running SSH command: timeout 5s oc get csr -ojson --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: { | |
"apiVersion": "v1", | |
"items": [ | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:46:05Z", | |
"generateName": "csr-", | |
"name": "csr-7hgz2", | |
"resourceVersion": "1636", | |
"uid": "d3e473f3-6495-4e18-ae5f-7297537a1835" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNxRENDQVpDZ0F3SUJBZ0lSQVBoK3BmZ294bktRdS9LSFpubzlEVXN3RFFZSktvWklodmNOQVFFTEJRQXcKTFRFU01CQUdBMVVFQ3hNSmIzQmxibk5vYVdaME1SY3dGUVlEVlFRREV3NXJkV0psYkdWMExYTnBaMjVsY2pBZQpGdzB5TWpFeE1qSXdNelF4TVRKYUZ3MHlNakV4TWpNd016UXlOVGRhTUVBeEZUQVRCZ05WQkFvVERITjVjM1JsCmJUcHViMlJsY3pFbk1DVUdBMVVFQXhNZWMzbHpkR1Z0T201dlpHVTZZM0pqTFdOc2NEVTJMVzFoYzNSbGNpMHcKTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFN2dyQkhnb28vV3pjaUtqQzEvam5Wdy9qQ1BuZQpJUmxsdjJsb3JUaDlhYjZkMVFWekNkdExQS1RkN25HanFYVVdJdWJ5V0hMWWEvSTZraEljTjliTnhxTjdNSGt3CkRnWURWUjBQQVFIL0JBUURBZ1dnTUJNR0ExVWRKUVFNTUFvR0NDc0dBUVVGQndNQk1Bd0dBMVVkRXdFQi93UUMKTUFBd0h3WURWUjBqQkJnd0ZvQVVxcVRleGlxa1I2S0trUHUvMGE1My90YVpha2d3SXdZRFZSMFJCQnd3R29JUwpZM0pqTFdOc2NEVTJMVzFoYzNSbGNpMHdod1RBcUg0TE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQ09NRnhrCk8xbjFZVTlLRjZoSW1pZVhFMldZSnE3U3A5cDhBcFJFM05McDhBNXRHemM0djZkRzZvMTVjbzhQZnBpUEVLS2QKOVJMdXg5N1VzZ1pDVVlJYVIyVjJPYW9JOGFISjJob1ZJWWRUMFdNYVNhSTJNQWR2RUJXa3pSL0I3UmdISW5nWQp1bDFvSWVTbFJIL1p6N2t5NkZyMlo4dUtjRUhqQ012TmYzV25VY0NONlZQdmJwekFCUzlZSVRlcXVOZXVyd1BUCmdKMW5TOGFsMFVTRlNLRnFXVlBTbEc0WHNMRW00Q2dnTGlMUVVHelJrb3RkN09ZNGxuRXNwNU9rblZlMHJ2TXcKK0ErYmVJNjhEZ3Z2a3RzYnlucW13elJ2TFQzVVBpbkplRjFZakVia2FIdCtVZ0hpUW0xdStncVZVWE5XT1p6agpzVHFGck42aTJOQTJINE5tCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:46:12Z", | |
"lastUpdateTime": "2022-11-22T03:46:12Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:45:38Z", | |
"generateName": "csr-", | |
"name": "csr-bb8pq", | |
"resourceVersion": "1096", | |
"uid": "10c4f47a-011f-488c-bcb4-9b5589c4f056" | |
}, | |
"spec": { | |
"groups": [ | |
"system:serviceaccounts:openshift-machine-config-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client-kubelet", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:45:52Z", | |
"lastUpdateTime": "2022-11-22T03:45:52Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:39:46Z", | |
"generateName": "csr-", | |
"name": "csr-hjzht", | |
"resourceVersion": "24455", | |
"uid": "ab37a5c0-7b5d-4096-b6fa-6469267c93e5" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:42:40Z", | |
"lastUpdateTime": "2022-11-23T04:42:40Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:10:23Z", | |
"generateName": "csr-", | |
"name": "csr-rm2xd", | |
"resourceVersion": "16354", | |
"uid": "dbe6163b-7322-46df-aa1c-a0492170d48e" | |
}, | |
"spec": { | |
"groups": [ | |
"system:serviceaccounts:openshift-machine-config-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client-kubelet", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:11:11Z", | |
"lastUpdateTime": "2022-11-23T04:11:11Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:24:44Z", | |
"generateName": "csr-", | |
"name": "csr-tdn28", | |
"resourceVersion": "24857", | |
"uid": "830874be-effb-4663-8c46-a5f56ca5ccfe" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:44:14Z", | |
"lastUpdateTime": "2022-11-23T04:44:14Z", | |
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)", | |
"reason": "NodeCSRApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:16:35Z", | |
"generateName": "csr-", | |
"name": "csr-xnt4q", | |
"resourceVersion": "24860", | |
"uid": "c4b03ba1-11ad-487d-b4cf-020800d9fc9c" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:44:14Z", | |
"lastUpdateTime": "2022-11-23T04:44:14Z", | |
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)", | |
"reason": "NodeCSRApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:47:01Z", | |
"generateName": "system:openshift:openshift-authenticator-", | |
"labels": { | |
"authentication.openshift.io/csr": "openshift-authenticator" | |
}, | |
"name": "system:openshift:openshift-authenticator-6b999", | |
"resourceVersion": "3438", | |
"uid": "35454b81-aee4-4983-98d6-0750840e3a18" | |
}, | |
"spec": { | |
"extra": { | |
"authentication.kubernetes.io/pod-name": [ | |
"authentication-operator-864b67f576-fb6pc" | |
], | |
"authentication.kubernetes.io/pod-uid": [ | |
"7f7a8011-bd7d-477c-bff7-a770c799bd4f" | |
] | |
}, | |
"groups": [ | |
"system:serviceaccounts", | |
"system:serviceaccounts:openshift-authentication-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client", | |
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:47:01Z", | |
"lastUpdateTime": "2022-11-22T03:47:01Z", | |
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-6b999\"", | |
"reason": "AutoApproved", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:22:55Z", | |
"generateName": "system:openshift:openshift-authenticator-", | |
"labels": { | |
"authentication.openshift.io/csr": "openshift-authenticator" | |
}, | |
"name": "system:openshift:openshift-authenticator-hqstr", | |
"resourceVersion": "19098", | |
"uid": "fd22e0fb-7ce4-4f22-8310-d4c306b8c969" | |
}, | |
"spec": { | |
"extra": { | |
"authentication.kubernetes.io/pod-name": [ | |
"authentication-operator-864b67f576-fb6pc" | |
], | |
"authentication.kubernetes.io/pod-uid": [ | |
"7f7a8011-bd7d-477c-bff7-a770c799bd4f" | |
] | |
}, | |
"groups": [ | |
"system:serviceaccounts", | |
"system:serviceaccounts:openshift-authentication-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client", | |
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:22:55Z", | |
"lastUpdateTime": "2022-11-23T04:22:55Z", | |
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-hqstr\"", | |
"reason": "AutoApproved", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
} | |
], | |
"kind": "List", | |
"metadata": { | |
"resourceVersion": "" | |
} | |
} | |
DEBU error: Temporary error: No Pending CSR with signerName kubernetes.io/kube-apiserver-client-kubelet - sleeping 5s | |
DEBU retry loop: attempt 1 | |
DEBU Waiting for availability of resource type 'csr' | |
DEBU retry loop: attempt 0 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION | |
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-qchpg 3s kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Pending | |
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
DEBU NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION | |
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-qchpg 3s kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Pending | |
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
DEBU Running SSH command: timeout 5s oc get csr -ojson --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: { | |
"apiVersion": "v1", | |
"items": [ | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:46:05Z", | |
"generateName": "csr-", | |
"name": "csr-7hgz2", | |
"resourceVersion": "1636", | |
"uid": "d3e473f3-6495-4e18-ae5f-7297537a1835" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:46:12Z", | |
"lastUpdateTime": "2022-11-22T03:46:12Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:45:38Z", | |
"generateName": "csr-", | |
"name": "csr-bb8pq", | |
"resourceVersion": "1096", | |
"uid": "10c4f47a-011f-488c-bcb4-9b5589c4f056" | |
}, | |
"spec": { | |
"groups": [ | |
"system:serviceaccounts:openshift-machine-config-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client-kubelet", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:45:52Z", | |
"lastUpdateTime": "2022-11-22T03:45:52Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:39:46Z", | |
"generateName": "csr-", | |
"name": "csr-hjzht", | |
"resourceVersion": "24455", | |
"uid": "ab37a5c0-7b5d-4096-b6fa-6469267c93e5" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:42:40Z", | |
"lastUpdateTime": "2022-11-23T04:42:40Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T10:00:49Z", | |
"generateName": "csr-", | |
"name": "csr-qchpg", | |
"resourceVersion": "26052", | |
"uid": "4e18664a-73bc-4c43-a0d7-3057f2758f03" | |
}, | |
"spec": { | |
"groups": [ | |
"system:serviceaccounts:openshift-machine-config-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client-kubelet", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper" | |
}, | |
"status": {} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:10:23Z", | |
"generateName": "csr-", | |
"name": "csr-rm2xd", | |
"resourceVersion": "16354", | |
"uid": "dbe6163b-7322-46df-aa1c-a0492170d48e" | |
}, | |
"spec": { | |
"groups": [ | |
"system:serviceaccounts:openshift-machine-config-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client-kubelet", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:11:11Z", | |
"lastUpdateTime": "2022-11-23T04:11:11Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:24:44Z", | |
"generateName": "csr-", | |
"name": "csr-tdn28", | |
"resourceVersion": "24857", | |
"uid": "830874be-effb-4663-8c46-a5f56ca5ccfe" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQk1EQ0IyQUlCQURCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14SnpBbEJnTlZCQU1USG5ONQpjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5CkF3RUhBMElBQksvRWtVMjA0VVZFZ0dhVzZQcVErZ24xSEE2K2w2eVlyQmFjSVhVaDRSRjM2SW1HL0ZxQ2xOZlgKWFBqZG85Y2pIWmNmcU9SNitXNUloaFdhOWdSRXFxS2dOakEwQmdrcWhraUc5dzBCQ1E0eEp6QWxNQ01HQTFVZApFUVFjTUJxQ0VtTnlZeTFqYkhBMU5pMXRZWE4wWlhJdE1JY0V3S2grQ3pBS0JnZ3Foa2pPUFFRREFnTkhBREJFCkFpQU1jNlV1Wk1vaVNlZXgwMWxudjZRU3orRWpkWm9JT1hmVmp0TWVrQy83alFJZ2QzTlB2VHZxSDJFQW15QUQKQjlUdEk4SFVaL2lSdnZCR1JpajExZU1XS3MwPQotLS0tLUVORCBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0K", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNvRENDQVlpZ0F3SUJBZ0lRTkdvdXJZZ1Z0ZnZEN3hkYUt3RDR6REFOQmdrcWhraUc5dzBCQVFzRkFEQW0KTVNRd0lnWURWUVFEREJ0cmRXSmxMV056Y2kxemFXZHVaWEpmUURFMk5qa3hOelk0TVRrd0hoY05Nakl4TVRJegpNRFF6T1RFMFdoY05Nak14TVRJek1EUXpPVEUwV2pCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14Ckp6QWxCZ05WQkFNVEhuTjVjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUcKU000OUFnRUdDQ3FHU000OUF3RUhBMElBQksvRWtVMjA0VVZFZ0dhVzZQcVErZ24xSEE2K2w2eVlyQmFjSVhVaAo0UkYzNkltRy9GcUNsTmZYWFBqZG85Y2pIWmNmcU9SNitXNUloaFdhOWdSRXFxS2plekI1TUE0R0ExVWREd0VCCi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUI4R0ExVWQKSXdRWU1CYUFGRmNDRS9od1E2VlpEK0d0N3ltcmNRSnZ3ZDZhTUNNR0ExVWRFUVFjTUJxQ0VtTnlZeTFqYkhBMQpOaTF0WVhOMFpYSXRNSWNFd0toK0N6QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFKMisxUmFITmFybCs4UHAxCkxqMmNjQnhxUUhtZnJhUmRBOTNOZ1liVktEQk5wSFhzcGo2TFBNeVVCK3BzZVk1R2FqcEFiMk8zT1dUT3QxUloKOFpUTjFMYzVIQzZZakxIOFFnRGJHUVM4WTRJRVE0UWkwN3hXQ0hUSzlSTTdsVGM3QkNpaHpqYXVCYllDSkVLUwpVcGptY1RoaVVNQ0ZCSUJrMHB4dVJOZnEyK1RRM05pT1ZIWFpJeTVhUmZsM0RaaE9JMGIzckx4T0t3d0w0T2Q5ClBvaUNuUzdRSzIrcm4zM0R1VGdUKzZITWt1Vlhpb3JqNXdDSStGVkhEWHJESWp0bWNRdzBzZ0xSejcreXJNV0gKb1RyeXhuQ0FyQTl2VVl1MGNsM1d0YTUyMWpUaXJ4dkR1M21hSDI5VTlzeTJRVDVwOFVEUGd1TjN3THJRUS82egpBejZEbEE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:44:14Z", | |
"lastUpdateTime": "2022-11-23T04:44:14Z", | |
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)", | |
"reason": "NodeCSRApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:16:35Z", | |
"generateName": "csr-", | |
"name": "csr-xnt4q", | |
"resourceVersion": "24860", | |
"uid": "c4b03ba1-11ad-487d-b4cf-020800d9fc9c" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:44:14Z", | |
"lastUpdateTime": "2022-11-23T04:44:14Z", | |
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)", | |
"reason": "NodeCSRApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:47:01Z", | |
"generateName": "system:openshift:openshift-authenticator-", | |
"labels": { | |
"authentication.openshift.io/csr": "openshift-authenticator" | |
}, | |
"name": "system:openshift:openshift-authenticator-6b999", | |
"resourceVersion": "3438", | |
"uid": "35454b81-aee4-4983-98d6-0750840e3a18" | |
}, | |
"spec": { | |
"extra": { | |
"authentication.kubernetes.io/pod-name": [ | |
"authentication-operator-864b67f576-fb6pc" | |
], | |
"authentication.kubernetes.io/pod-uid": [ | |
"7f7a8011-bd7d-477c-bff7-a770c799bd4f" | |
] | |
}, | |
"groups": [ | |
"system:serviceaccounts", | |
"system:serviceaccounts:openshift-authentication-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client", | |
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:47:01Z", | |
"lastUpdateTime": "2022-11-22T03:47:01Z", | |
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-6b999\"", | |
"reason": "AutoApproved", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:22:55Z", | |
"generateName": "system:openshift:openshift-authenticator-", | |
"labels": { | |
"authentication.openshift.io/csr": "openshift-authenticator" | |
}, | |
"name": "system:openshift:openshift-authenticator-hqstr", | |
"resourceVersion": "19098", | |
"uid": "fd22e0fb-7ce4-4f22-8310-d4c306b8c969" | |
}, | |
"spec": { | |
"extra": { | |
"authentication.kubernetes.io/pod-name": [ | |
"authentication-operator-864b67f576-fb6pc" | |
], | |
"authentication.kubernetes.io/pod-uid": [ | |
"7f7a8011-bd7d-477c-bff7-a770c799bd4f" | |
] | |
}, | |
"groups": [ | |
"system:serviceaccounts", | |
"system:serviceaccounts:openshift-authentication-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client", | |
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator" | |
}, | |
"status": { | |
"certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNqakNDQVhhZ0F3SUJBZ0lSQUpxRWNQdkk3RnpHanl3TEVRK0JsUjR3RFFZSktvWklodmNOQVFFTEJRQXcKSmpFa01DSUdBMVVFQXd3YmEzVmlaUzFqYzNJdGMybG5ibVZ5WDBBeE5qWTVNVGMyT0RFNU1CNFhEVEl5TVRFeQpNekEwTVRjMU5Wb1hEVEl6TVRFeU16QTBNVGMxTlZvd1VqRlFNRTRHQTFVRUF4TkhjM2x6ZEdWdE9uTmxjblpwClkyVmhZMk52ZFc1ME9tOXdaVzV6YUdsbWRDMXZZWFYwYUMxaGNHbHpaWEoyWlhJNmIzQmxibk5vYVdaMExXRjEKZEdobGJuUnBZMkYwYjNJd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQ1JUd2hhYlp6WmJiYgo0RjBLS3JPenJKQ2JRV0xyTlpHREFzZDhZVzk4WnVvNDdsZ1dJaStWNVFIcSsxdGxxaWNkblJCTUxOOTRvMUUyCmJIcjlWZkVubzFZd1ZEQU9CZ05WSFE4QkFmOEVCQU1DQmFBd0V3WURWUjBsQkF3d0NnWUlLd1lCQlFVSEF3SXcKREFZRFZSMFRBUUgvQkFJd0FEQWZCZ05WSFNNRUdEQVdnQlJYQWhQNGNFT2xXUS9ocmU4cHEzRUNiOEhlbWpBTgpCZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFGU2tHdFZDQWo0MkJzR3VQOVlKWEVqR3FsbWFkL0FnblQrR0tZM0ZWCmtlSXpXOUo2Zm5Cd2EwQTRuUjZXbmNQMDc1dVVSbmpFSmpCNzNKU0lxWmZxWGtXZTFya1lZR3VTZWxUdUVSeVYKTWdMMVltb2R6cTd0bDNtMUduMW5nSUN4aUhiWHVTUUdhaWNlSExhTndlaUIzdTFSZVI2SzY2ZUNqbmhnSHFNVQphWllHSGlsYm4rZ0loQk1TWFJGdUxDTnJtMUx3REhGcE45ak1XaVhBUjZoaHhLaXBUWGlzbklEbmttaWdtZzhrCkhUMVlCYjBxYTJqa3NwbTk4OENGclVxR0pXS3EvdjluUzQ2ZVZPQVBraU80MEhCbzFOeHFJeWdTekRUQ1NmdGEKUlBBakcyMDA0N0UxTS8wWkwyckU3M0s0Vm5nZFJURkh4alVUelpLWDNzMTNwUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:22:55Z", | |
"lastUpdateTime": "2022-11-23T04:22:55Z", | |
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-hqstr\"", | |
"reason": "AutoApproved", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
} | |
], | |
"kind": "List", | |
"metadata": { | |
"resourceVersion": "" | |
} | |
} | |
DEBU Approving csr csr-qchpg (signerName: kubernetes.io/kube-apiserver-client-kubelet) | |
DEBU Running SSH command: timeout 30s oc adm certificate approve csr-qchpg --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: certificatesigningrequest.certificates.k8s.io/csr-qchpg approved | |
DEBU Waiting for availability of resource type 'csr' | |
DEBU retry loop: attempt 0 | |
DEBU Running SSH command: timeout 5s oc get csr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION | |
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-qchpg 5s kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved | |
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
DEBU NAME AGE SIGNERNAME REQUESTOR REQUESTEDDURATION CONDITION | |
csr-7hgz2 30h kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-bb8pq 30h kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-hjzht 5h21m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-qchpg 5s kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved | |
csr-rm2xd 5h50m kubernetes.io/kube-apiserver-client-kubelet system:serviceaccount:openshift-machine-config-operator:node-bootstrapper <none> Approved,Issued | |
csr-tdn28 5h36m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
csr-xnt4q 5h44m kubernetes.io/kubelet-serving system:node:crc-clp56-master-0 <none> Approved,Issued | |
system:openshift:openshift-authenticator-6b999 30h kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
system:openshift:openshift-authenticator-hqstr 5h37m kubernetes.io/kube-apiserver-client system:serviceaccount:openshift-authentication-operator:authentication-operator <none> Approved,Issued | |
DEBU Running SSH command: timeout 5s oc get csr -ojson --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: { | |
"apiVersion": "v1", | |
"items": [ | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:46:05Z", | |
"generateName": "csr-", | |
"name": "csr-7hgz2", | |
"resourceVersion": "1636", | |
"uid": "d3e473f3-6495-4e18-ae5f-7297537a1835" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:46:12Z", | |
"lastUpdateTime": "2022-11-22T03:46:12Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:45:38Z", | |
"generateName": "csr-", | |
"name": "csr-bb8pq", | |
"resourceVersion": "1096", | |
"uid": "10c4f47a-011f-488c-bcb4-9b5589c4f056" | |
}, | |
"spec": { | |
"groups": [ | |
"system:serviceaccounts:openshift-machine-config-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client-kubelet", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:45:52Z", | |
"lastUpdateTime": "2022-11-22T03:45:52Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:39:46Z", | |
"generateName": "csr-", | |
"name": "csr-hjzht", | |
"resourceVersion": "24455", | |
"uid": "ab37a5c0-7b5d-4096-b6fa-6469267c93e5" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNvRENDQVlpZ0F3SUJBZ0lRRjlQblQzckFjZ0dkVTZCUURFR0FDakFOQmdrcWhraUc5dzBCQVFzRkFEQW0KTVNRd0lnWURWUVFEREJ0cmRXSmxMV056Y2kxemFXZHVaWEpmUURFMk5qa3hOelk0TVRrd0hoY05Nakl4TVRJegpNRFF6TnpRd1doY05Nak14TVRJek1EUXpOelF3V2pCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14Ckp6QWxCZ05WQkFNVEhuTjVjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUcKU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkJGRk1mSTl1K3NGenNicFFpaFVJMGFPcEJlRTlVRCtlOWpPZkk2YgpUcUJVWXo3MFBrRnQxa1dkWEx1ZGhWSFRydHRHeDdxNk9GM09PWGlqMmNCcEhaK2plekI1TUE0R0ExVWREd0VCCi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUI4R0ExVWQKSXdRWU1CYUFGRmNDRS9od1E2VlpEK0d0N3ltcmNRSnZ3ZDZhTUNNR0ExVWRFUVFjTUJxQ0VtTnlZeTFqYkhBMQpOaTF0WVhOMFpYSXRNSWNFd0toK0N6QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFXSFAwbXdoV1BwZ1hsT3J3Cit3NlhqQ0NsS2p4bWNmR3oyUndQQVVkcUphMXJ5YzcyL0xpWnFlVXR4T3ZERUxSdlVKS1lPRkNibHNHYmxSMUoKV2E0eS80Rk5VdnB1N0t1VE1YRnBMeC9lS0xFTWUxdVJHR1ArSk9HV1c2bWFuWWlwcWlWVURnaDMxRHBHcTRDbQpqRjdaNzBSOExENHhOcmoyRnBXSmRlY0hidHpZR0hoWVJ4RXdDSUJaZHVzbU5NR3gwaFlrY1MydG9ZUXRzUWovCk9jMzZnbDd3SVg0NEVQRkE1bWNxWk9kUVgyY25IdGltMkhhZjVZVmtDTE96cnUveDhYaUF6cW9qRzNkRUE0c1oKcTE4ZmlEcm5heU5LQTJ6Z1haczRwV0M0TWJHSTg3L29ORDVmOVV1OVI4NWtxWTJGT1lDVFl4VzZmMjZrZzZKWApFc1cxQmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:42:40Z", | |
"lastUpdateTime": "2022-11-23T04:42:40Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T10:00:49Z", | |
"generateName": "csr-", | |
"name": "csr-qchpg", | |
"resourceVersion": "26056", | |
"uid": "4e18664a-73bc-4c43-a0d7-3057f2758f03" | |
}, | |
"spec": { | |
"groups": [ | |
"system:serviceaccounts:openshift-machine-config-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client-kubelet", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper" | |
}, | |
"status": { | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T10:00:54Z", | |
"lastUpdateTime": "2022-11-23T10:00:54Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:10:23Z", | |
"generateName": "csr-", | |
"name": "csr-rm2xd", | |
"resourceVersion": "16354", | |
"uid": "dbe6163b-7322-46df-aa1c-a0492170d48e" | |
}, | |
"spec": { | |
"groups": [ | |
"system:serviceaccounts:openshift-machine-config-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client-kubelet", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:11:11Z", | |
"lastUpdateTime": "2022-11-23T04:11:11Z", | |
"message": "This CSR was approved by kubectl certificate approve.", | |
"reason": "KubectlApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:24:44Z", | |
"generateName": "csr-", | |
"name": "csr-tdn28", | |
"resourceVersion": "24857", | |
"uid": "830874be-effb-4663-8c46-a5f56ca5ccfe" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0KTUlJQk1EQ0IyQUlCQURCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14SnpBbEJnTlZCQU1USG5ONQpjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5CkF3RUhBMElBQksvRWtVMjA0VVZFZ0dhVzZQcVErZ24xSEE2K2w2eVlyQmFjSVhVaDRSRjM2SW1HL0ZxQ2xOZlgKWFBqZG85Y2pIWmNmcU9SNitXNUloaFdhOWdSRXFxS2dOakEwQmdrcWhraUc5dzBCQ1E0eEp6QWxNQ01HQTFVZApFUVFjTUJxQ0VtTnlZeTFqYkhBMU5pMXRZWE4wWlhJdE1JY0V3S2grQ3pBS0JnZ3Foa2pPUFFRREFnTkhBREJFCkFpQU1jNlV1Wk1vaVNlZXgwMWxudjZRU3orRWpkWm9JT1hmVmp0TWVrQy83alFJZ2QzTlB2VHZxSDJFQW15QUQKQjlUdEk4SFVaL2lSdnZCR1JpajExZU1XS3MwPQotLS0tLUVORCBDRVJUSUZJQ0FURSBSRVFVRVNULS0tLS0K", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNvRENDQVlpZ0F3SUJBZ0lRTkdvdXJZZ1Z0ZnZEN3hkYUt3RDR6REFOQmdrcWhraUc5dzBCQVFzRkFEQW0KTVNRd0lnWURWUVFEREJ0cmRXSmxMV056Y2kxemFXZHVaWEpmUURFMk5qa3hOelk0TVRrd0hoY05Nakl4TVRJegpNRFF6T1RFMFdoY05Nak14TVRJek1EUXpPVEUwV2pCQU1SVXdFd1lEVlFRS0V3eHplWE4wWlcwNmJtOWtaWE14Ckp6QWxCZ05WQkFNVEhuTjVjM1JsYlRwdWIyUmxPbU55WXkxamJIQTFOaTF0WVhOMFpYSXRNREJaTUJNR0J5cUcKU000OUFnRUdDQ3FHU000OUF3RUhBMElBQksvRWtVMjA0VVZFZ0dhVzZQcVErZ24xSEE2K2w2eVlyQmFjSVhVaAo0UkYzNkltRy9GcUNsTmZYWFBqZG85Y2pIWmNmcU9SNitXNUloaFdhOWdSRXFxS2plekI1TUE0R0ExVWREd0VCCi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUI4R0ExVWQKSXdRWU1CYUFGRmNDRS9od1E2VlpEK0d0N3ltcmNRSnZ3ZDZhTUNNR0ExVWRFUVFjTUJxQ0VtTnlZeTFqYkhBMQpOaTF0WVhOMFpYSXRNSWNFd0toK0N6QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFKMisxUmFITmFybCs4UHAxCkxqMmNjQnhxUUhtZnJhUmRBOTNOZ1liVktEQk5wSFhzcGo2TFBNeVVCK3BzZVk1R2FqcEFiMk8zT1dUT3QxUloKOFpUTjFMYzVIQzZZakxIOFFnRGJHUVM4WTRJRVE0UWkwN3hXQ0hUSzlSTTdsVGM3QkNpaHpqYXVCYllDSkVLUwpVcGptY1RoaVVNQ0ZCSUJrMHB4dVJOZnEyK1RRM05pT1ZIWFpJeTVhUmZsM0RaaE9JMGIzckx4T0t3d0w0T2Q5ClBvaUNuUzdRSzIrcm4zM0R1VGdUKzZITWt1Vlhpb3JqNXdDSStGVkhEWHJESWp0bWNRdzBzZ0xSejcreXJNV0gKb1RyeXhuQ0FyQTl2VVl1MGNsM1d0YTUyMWpUaXJ4dkR1M21hSDI5VTlzeTJRVDVwOFVEUGd1TjN3THJRUS82egpBejZEbEE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:44:14Z", | |
"lastUpdateTime": "2022-11-23T04:44:14Z", | |
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)", | |
"reason": "NodeCSRApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:16:35Z", | |
"generateName": "csr-", | |
"name": "csr-xnt4q", | |
"resourceVersion": "24860", | |
"uid": "c4b03ba1-11ad-487d-b4cf-020800d9fc9c" | |
}, | |
"spec": { | |
"groups": [ | |
"system:nodes", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kubelet-serving", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"server auth" | |
], | |
"username": "system:node:crc-clp56-master-0" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:44:14Z", | |
"lastUpdateTime": "2022-11-23T04:44:14Z", | |
"message": "This CSR was approved by the Node CSR Approver (cluster-machine-approver)", | |
"reason": "NodeCSRApprove", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-22T03:47:01Z", | |
"generateName": "system:openshift:openshift-authenticator-", | |
"labels": { | |
"authentication.openshift.io/csr": "openshift-authenticator" | |
}, | |
"name": "system:openshift:openshift-authenticator-6b999", | |
"resourceVersion": "3438", | |
"uid": "35454b81-aee4-4983-98d6-0750840e3a18" | |
}, | |
"spec": { | |
"extra": { | |
"authentication.kubernetes.io/pod-name": [ | |
"authentication-operator-864b67f576-fb6pc" | |
], | |
"authentication.kubernetes.io/pod-uid": [ | |
"7f7a8011-bd7d-477c-bff7-a770c799bd4f" | |
] | |
}, | |
"groups": [ | |
"system:serviceaccounts", | |
"system:serviceaccounts:openshift-authentication-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client", | |
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-22T03:47:01Z", | |
"lastUpdateTime": "2022-11-22T03:47:01Z", | |
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-6b999\"", | |
"reason": "AutoApproved", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
}, | |
{ | |
"apiVersion": "certificates.k8s.io/v1", | |
"kind": "CertificateSigningRequest", | |
"metadata": { | |
"creationTimestamp": "2022-11-23T04:22:55Z", | |
"generateName": "system:openshift:openshift-authenticator-", | |
"labels": { | |
"authentication.openshift.io/csr": "openshift-authenticator" | |
}, | |
"name": "system:openshift:openshift-authenticator-hqstr", | |
"resourceVersion": "19098", | |
"uid": "fd22e0fb-7ce4-4f22-8310-d4c306b8c969" | |
}, | |
"spec": { | |
"extra": { | |
"authentication.kubernetes.io/pod-name": [ | |
"authentication-operator-864b67f576-fb6pc" | |
], | |
"authentication.kubernetes.io/pod-uid": [ | |
"7f7a8011-bd7d-477c-bff7-a770c799bd4f" | |
] | |
}, | |
"groups": [ | |
"system:serviceaccounts", | |
"system:serviceaccounts:openshift-authentication-operator", | |
"system:authenticated" | |
], | |
"request": "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", | |
"signerName": "kubernetes.io/kube-apiserver-client", | |
"uid": "247b6f0a-f72e-41dc-a71e-7458458f57b5", | |
"usages": [ | |
"digital signature", | |
"key encipherment", | |
"client auth" | |
], | |
"username": "system:serviceaccount:openshift-authentication-operator:authentication-operator" | |
}, | |
"status": { | |
"certificate": "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", | |
"conditions": [ | |
{ | |
"lastTransitionTime": "2022-11-23T04:22:55Z", | |
"lastUpdateTime": "2022-11-23T04:22:55Z", | |
"message": "Auto-approved CSR \"system:openshift:openshift-authenticator-hqstr\"", | |
"reason": "AutoApproved", | |
"status": "True", | |
"type": "Approved" | |
} | |
] | |
} | |
} | |
], | |
"kind": "List", | |
"metadata": { | |
"resourceVersion": "" | |
} | |
} | |
DEBU Deleting csr system:openshift:openshift-authenticator-6b999 (signerName: kubernetes.io/kube-apiserver-client) | |
DEBU Running SSH command: timeout 30s oc delete csr system:openshift:openshift-authenticator-6b999 --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: certificatesigningrequest.certificates.k8s.io "system:openshift:openshift-authenticator-6b999" deleted | |
DEBU Deleting csr system:openshift:openshift-authenticator-hqstr (signerName: kubernetes.io/kube-apiserver-client) | |
DEBU Running SSH command: timeout 30s oc delete csr system:openshift:openshift-authenticator-hqstr --context admin --cluster crc --kubeconfig /opt/kubeconfig | |
DEBU SSH command results: err: <nil>, output: certificatesigningrequest.certificates.k8s.io "system:openshift:openshift-authenticator-hqstr" deleted | |
DEBU retry loop: attempt 0 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 1 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 2 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 3 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 4 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 5 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 6 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 7 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 8 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T04:09:53+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 04:09 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 9 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 10 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 11 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 12 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 13 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 14 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 15 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 16 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 17 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 18 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 19 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 20 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 21 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 22 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 23 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 24 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 25 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 26 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 27 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 28 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 29 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 30 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 31 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 32 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 33 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 34 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 35 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 36 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 37 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 38 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 39 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 40 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 41 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 42 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 43 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 44 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 45 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 46 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 47 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 48 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 49 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 50 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 51 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 52 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 53 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 54 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 55 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 56 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 57 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 58 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU retry loop: attempt 59 | |
DEBU Running SSH command: date --date="$(sudo openssl x509 -in /var/lib/kubelet/pki/kubelet-client-current.pem -noout -enddate | cut -d= -f 2)" --iso-8601=seconds | |
DEBU SSH command results: err: <nil>, output: 2023-11-23T09:56:41+00:00 | |
DEBU Certs have expired, they were valid till: 23 Nov 23 09:56 +0000 | |
DEBU error: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired - sleeping 5s | |
DEBU RetryAfter timeout after 60 tries | |
DEBU Error approving pending kube-apiserver-client-kubelet CSR: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired (x60) | |
DEBU Bundle has been generated 731 days ago | |
Failed to renew TLS certificates: please check if a newer CRC release is available: Temporary error: certificate /var/lib/kubelet/pki/kubelet-client-current.pem still expired (x60) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment