Created
December 3, 2017 18:39
-
-
Save erstaples/a59541be24aef9e3393a1b24c5e0b670 to your computer and use it in GitHub Desktop.
Logs from command: `kops create cluster --zones=us-west-2b --name test.k8s.example.io --networking canal --yes -v 10`
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
I1203 10:31:23.390517 35890 s3context.go:159] Found bucket "clusters.k8s.example.io" in region "us-east-1" | |
I1203 10:31:23.390580 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/config" | |
I1203 10:31:23.494008 35890 channel.go:91] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/" | |
I1203 10:31:23.494105 35890 channel.go:96] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable" | |
I1203 10:31:23.494124 35890 context.go:132] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable | |
I1203 10:31:23.770132 35890 channel.go:105] Channel contents: spec: | |
images: | |
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 ) | |
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.4.0 <1.5.0" | |
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.5.0 <1.6.0" | |
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.6.0 <1.7.0" | |
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.7.0" | |
- providerID: gce | |
name: "cos-cloud/cos-stable-60-9592-90-0" | |
cluster: | |
kubernetesVersion: v1.5.7 | |
networking: | |
kubenet: {} | |
kubernetesVersions: | |
- range: ">=1.7.0" | |
recommendedVersion: 1.7.10 | |
requiredVersion: 1.7.0 | |
- range: ">=1.6.0" | |
recommendedVersion: 1.6.11 | |
requiredVersion: 1.6.0 | |
- range: ">=1.5.0" | |
recommendedVersion: 1.5.8 | |
requiredVersion: 1.5.1 | |
- range: "<1.5.0" | |
recommendedVersion: 1.4.12 | |
requiredVersion: 1.4.2 | |
kopsVersions: | |
- range: ">=1.7.0-alpha.1" | |
recommendedVersion: 1.7.1 | |
#requiredVersion: 1.7.0 | |
kubernetesVersion: 1.7.10 | |
- range: ">=1.6.0-alpha.1" | |
#recommendedVersion: 1.6.0 | |
#requiredVersion: 1.6.0 | |
kubernetesVersion: 1.6.11 | |
- range: ">=1.5.0-alpha1" | |
recommendedVersion: 1.5.1 | |
#requiredVersion: 1.5.1 | |
kubernetesVersion: 1.5.8 | |
- range: "<1.5.0" | |
recommendedVersion: 1.4.4 | |
#requiredVersion: 1.4.4 | |
kubernetesVersion: 1.4.12 | |
I1203 10:31:23.770409 35890 create_cluster.go:371] networking mode=canal => {"kubenet":{}} | |
I1203 10:31:23.770458 35890 create_cluster.go:659] Inferred --cloud=aws from zone "us-west-2b" | |
I1203 10:31:23.770573 35890 create_cluster.go:845] Using SSH public key: /Users/eric/.ssh/id_rsa.pub | |
I1203 10:31:23.770619 35890 aws_utils.go:38] Querying EC2 for all valid regions | |
I1203 10:31:24.217401 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2" | |
I1203 10:31:24.217652 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1203 10:31:24.533169 35890 subnets.go:183] Assigned CIDR 172.20.32.0/19 to subnet us-west-2b | |
I1203 10:31:24.534864 35890 populate_cluster_spec.go:369] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11 | |
I1203 10:31:24.534884 35890 populate_cluster_spec.go:376] Defaulted ServiceClusterIPRange to 100.64.0.0/13 | |
I1203 10:31:24.534899 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2" | |
I1203 10:31:24.535029 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1203 10:31:24.572532 35890 subnets.go:48] All subnets have CIDRs; skipping asssignment logic | |
I1203 10:31:24.572588 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2" | |
I1203 10:31:24.572705 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1203 10:31:24.609524 35890 utils.go:121] Querying for all DNS zones to find match for "test.k8s.example.io" | |
I1203 10:31:24.609649 35890 route53.go:50] AWS request: route53 ListHostedZones | |
I1203 10:31:25.120189 35890 utils.go:152] Found matching hosted zone ".example.io", but it was "Private" and we require "Public" | |
I1203 10:31:25.120234 35890 populate_cluster_spec.go:249] Defaulting DNS zone to: Z3STZN85S7ZJGL | |
I1203 10:31:25.120257 35890 tagbuilder.go:102] tags: [_aws _k8s_1_6 _networking_cni] | |
I1203 10:31:25.120332 35890 tree_walker.go:97] visit "config/_aws" | |
I1203 10:31:25.120353 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/_aws" | |
I1203 10:31:25.120363 35890 tree_walker.go:97] visit "config/_aws/defaults.options" | |
I1203 10:31:25.120482 35890 tree_walker.go:97] visit "config/_gce" | |
I1203 10:31:25.120510 35890 tree_walker.go:120] Skipping directory "config/_gce" as tag "_gce" not present | |
I1203 10:31:25.120519 35890 tree_walker.go:97] visit "config/components" | |
I1203 10:31:25.120533 35890 tree_walker.go:97] visit "config/components/docker" | |
I1203 10:31:25.120550 35890 tree_walker.go:97] visit "config/components/docker/_e2e_storage_test_environment" | |
I1203 10:31:25.120565 35890 tree_walker.go:120] Skipping directory "config/components/docker/_e2e_storage_test_environment" as tag "_e2e_storage_test_environment" not present | |
I1203 10:31:25.120577 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni" | |
I1203 10:31:25.120589 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/docker/_networking_cni" | |
I1203 10:31:25.120599 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni/cni.options" | |
I1203 10:31:25.120678 35890 tree_walker.go:97] visit "config/components/docker/_networking_kubenet" | |
I1203 10:31:25.120705 35890 tree_walker.go:120] Skipping directory "config/components/docker/_networking_kubenet" as tag "_networking_kubenet" not present | |
I1203 10:31:25.120722 35890 tree_walker.go:97] visit "config/components/docker/docker.options" | |
I1203 10:31:25.120915 35890 tree_walker.go:97] visit "config/components/kube-apiserver" | |
I1203 10:31:25.120962 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_gce" | |
I1203 10:31:25.120979 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_gce" as tag "_gce" not present | |
I1203 10:31:25.120988 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6" | |
I1203 10:31:25.120999 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_k8s_1_6" | |
I1203 10:31:25.121009 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6/kube-apiserver.options" | |
I1203 10:31:25.121099 35890 tree_walker.go:97] visit "config/components/kube-apiserver/kube-apiserver.options" | |
I1203 10:31:25.121228 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_vsphere" | |
I1203 10:31:25.121250 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_vsphere" as tag "_vsphere" not present | |
I1203 10:31:25.121259 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws" | |
I1203 10:31:25.121270 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_aws" | |
I1203 10:31:25.121280 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws/kube-apiserver.aws.options" | |
I1203 10:31:25.121370 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_3" | |
I1203 10:31:25.121397 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_3" as tag "_k8s_1_3" not present | |
I1203 10:31:25.121406 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_4" | |
I1203 10:31:25.121429 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_4" as tag "_k8s_1_4" not present | |
I1203 10:31:25.121449 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_5" | |
I1203 10:31:25.121462 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_5" as tag "_k8s_1_5" not present | |
I1203 10:31:25.121631 35890 options_loader.go:101] executing template components/docker/docker.options (tags=[]) | |
I1203 10:31:25.121759 35890 options_loader.go:101] executing template components/kube-apiserver/kube-apiserver.options (tags=[]) | |
I1203 10:31:25.121975 35890 options_loader.go:101] executing template _aws/defaults.options (tags=[_aws]) | |
I1203 10:31:25.122034 35890 options_loader.go:101] executing template components/docker/_networking_cni/cni.options (tags=[_networking_cni]) | |
I1203 10:31:25.122081 35890 options_loader.go:101] executing template components/kube-apiserver/_aws/kube-apiserver.aws.options (tags=[_aws]) | |
I1203 10:31:25.122126 35890 options_loader.go:101] executing template components/kube-apiserver/_k8s_1_6/kube-apiserver.options (tags=[_k8s_1_6]) | |
I1203 10:31:25.122227 35890 options_loader.go:128] executing builder *components.DefaultsOptionsBuilder | |
I1203 10:31:25.122241 35890 options_loader.go:128] executing builder *components.KubeAPIServerOptionsBuilder | |
I1203 10:31:25.122263 35890 apiserver.go:100] Enabling apiserver insecure port, for healthchecks (issue #43784) | |
I1203 10:31:25.122270 35890 options_loader.go:128] executing builder *components.DockerOptionsBuilder | |
I1203 10:31:25.122285 35890 options_loader.go:128] executing builder *components.NetworkingOptionsBuilder | |
I1203 10:31:25.122294 35890 options_loader.go:128] executing builder *components.KubeDnsOptionsBuilder | |
I1203 10:31:25.122308 35890 options_loader.go:128] executing builder *components.KubeletOptionsBuilder | |
I1203 10:31:25.122331 35890 kubelet.go:139] Cloud Provider: aws | |
I1203 10:31:25.122343 35890 options_loader.go:128] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1203 10:31:25.122354 35890 kubecontrollermanager.go:74] Kubernetes version "1.7.10" supports AttachDetachReconcileSyncPeriod; will configure | |
I1203 10:31:25.122372 35890 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s | |
I1203 10:31:25.122385 35890 options_loader.go:128] executing builder *components.KubeSchedulerOptionsBuilder | |
I1203 10:31:25.122392 35890 options_loader.go:128] executing builder *components.KubeProxyOptionsBuilder | |
I1203 10:31:25.122842 35890 options_loader.go:101] executing template components/docker/docker.options (tags=[]) | |
I1203 10:31:25.122928 35890 options_loader.go:101] executing template components/kube-apiserver/kube-apiserver.options (tags=[]) | |
I1203 10:31:25.123053 35890 options_loader.go:101] executing template _aws/defaults.options (tags=[_aws]) | |
I1203 10:31:25.123099 35890 options_loader.go:101] executing template components/docker/_networking_cni/cni.options (tags=[_networking_cni]) | |
I1203 10:31:25.123136 35890 options_loader.go:101] executing template components/kube-apiserver/_aws/kube-apiserver.aws.options (tags=[_aws]) | |
I1203 10:31:25.123172 35890 options_loader.go:101] executing template components/kube-apiserver/_k8s_1_6/kube-apiserver.options (tags=[_k8s_1_6]) | |
I1203 10:31:25.123240 35890 options_loader.go:128] executing builder *components.DefaultsOptionsBuilder | |
I1203 10:31:25.123250 35890 options_loader.go:128] executing builder *components.KubeAPIServerOptionsBuilder | |
I1203 10:31:25.123256 35890 apiserver.go:100] Enabling apiserver insecure port, for healthchecks (issue #43784) | |
I1203 10:31:25.123261 35890 options_loader.go:128] executing builder *components.DockerOptionsBuilder | |
I1203 10:31:25.123268 35890 options_loader.go:128] executing builder *components.NetworkingOptionsBuilder | |
I1203 10:31:25.123274 35890 options_loader.go:128] executing builder *components.KubeDnsOptionsBuilder | |
I1203 10:31:25.123283 35890 options_loader.go:128] executing builder *components.KubeletOptionsBuilder | |
I1203 10:31:25.123291 35890 kubelet.go:139] Cloud Provider: aws | |
I1203 10:31:25.123297 35890 options_loader.go:128] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1203 10:31:25.123305 35890 kubecontrollermanager.go:74] Kubernetes version "1.7.10" supports AttachDetachReconcileSyncPeriod; will configure | |
I1203 10:31:25.123314 35890 options_loader.go:128] executing builder *components.KubeSchedulerOptionsBuilder | |
I1203 10:31:25.123319 35890 options_loader.go:128] executing builder *components.KubeProxyOptionsBuilder | |
I1203 10:31:25.123757 35890 spec_builder.go:68] options: { | |
"channel": "stable", | |
"configBase": "s3://clusters.k8s.example.io/test.k8s.example.io", | |
"cloudProvider": "aws", | |
"kubernetesVersion": "1.7.10", | |
"subnets": [ | |
{ | |
"name": "us-west-2b", | |
"zone": "us-west-2b", | |
"cidr": "172.20.32.0/19", | |
"type": "Public" | |
} | |
], | |
"masterPublicName": "api.test.k8s.example.io", | |
"masterInternalName": "api.internal.test.k8s.example.io", | |
"networkCIDR": "172.20.0.0/16", | |
"topology": { | |
"masters": "public", | |
"nodes": "public", | |
"dns": { | |
"type": "Public" | |
} | |
}, | |
"secretStore": "s3://clusters.k8s.example.io/test.k8s.example.io/secrets", | |
"keyStore": "s3://clusters.k8s.example.io/test.k8s.example.io/pki", | |
"configStore": "s3://clusters.k8s.example.io/test.k8s.example.io", | |
"dnsZone": "Z3STZN85S7ZJGL", | |
"clusterDNSDomain": "cluster.local", | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"sshAccess": [ | |
"0.0.0.0/0" | |
], | |
"kubernetesApiAccess": [ | |
"0.0.0.0/0" | |
], | |
"etcdClusters": [ | |
{ | |
"name": "main", | |
"etcdMembers": [ | |
{ | |
"name": "b", | |
"instanceGroup": "master-us-west-2b" | |
} | |
] | |
}, | |
{ | |
"name": "events", | |
"etcdMembers": [ | |
{ | |
"name": "b", | |
"instanceGroup": "master-us-west-2b" | |
} | |
] | |
} | |
], | |
"docker": { | |
"bridge": "", | |
"logLevel": "warn", | |
"ipTables": false, | |
"ipMasq": false, | |
"logDriver": "json-file", | |
"logOpt": [ | |
"max-size=10m", | |
"max-file=5" | |
], | |
"storage": "overlay,aufs", | |
"version": "1.12.6" | |
}, | |
"kubeDNS": { | |
"image": "gcr.io/google_containers/kubedns-amd64:1.3", | |
"replicas": 2, | |
"domain": "cluster.local", | |
"serverIP": "100.64.0.10" | |
}, | |
"kubeAPIServer": { | |
"image": "gcr.io/google_containers/kube-apiserver:v1.7.10", | |
"logLevel": 2, | |
"cloudProvider": "aws", | |
"securePort": 443, | |
"insecurePort": 8080, | |
"address": "127.0.0.1", | |
"etcdServers": [ | |
"http://127.0.0.1:4001" | |
], | |
"etcdServersOverrides": [ | |
"/events#http://127.0.0.1:4002" | |
], | |
"admissionControl": [ | |
"NamespaceLifecycle", | |
"LimitRanger", | |
"ServiceAccount", | |
"PersistentVolumeLabel", | |
"DefaultStorageClass", | |
"DefaultTolerationSeconds", | |
"ResourceQuota" | |
], | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"allowPrivileged": true, | |
"apiServerCount": 1, | |
"anonymousAuth": false, | |
"kubeletPreferredAddressTypes": [ | |
"InternalIP", | |
"Hostname", | |
"ExternalIP" | |
], | |
"storageBackend": "etcd2", | |
"authorizationMode": "AlwaysAllow" | |
}, | |
"kubeControllerManager": { | |
"logLevel": 2, | |
"image": "gcr.io/google_containers/kube-controller-manager:v1.7.10", | |
"cloudProvider": "aws", | |
"clusterName": "test.k8s.example.io", | |
"clusterCIDR": "100.96.0.0/11", | |
"allocateNodeCIDRs": true, | |
"configureCloudRoutes": false, | |
"leaderElection": { | |
"leaderElect": true | |
}, | |
"attachDetachReconcileSyncPeriod": "1m0s", | |
"useServiceAccountCredentials": true | |
}, | |
"kubeScheduler": { | |
"logLevel": 2, | |
"image": "gcr.io/google_containers/kube-scheduler:v1.7.10", | |
"leaderElection": { | |
"leaderElect": true | |
} | |
}, | |
"kubeProxy": { | |
"image": "gcr.io/google_containers/kube-proxy:v1.7.10", | |
"cpuRequest": "100m", | |
"logLevel": 2, | |
"clusterCIDR": "100.96.0.0/11", | |
"hostnameOverride": "@aws" | |
}, | |
"kubelet": { | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"requireKubeconfig": true, | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "gcr.io/google_containers/pause-amd64:3.0", | |
"allowPrivileged": true, | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "cni", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%" | |
}, | |
"masterKubelet": { | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"requireKubeconfig": true, | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "gcr.io/google_containers/pause-amd64:3.0", | |
"allowPrivileged": true, | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "cni", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"registerSchedulable": false, | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%" | |
}, | |
"networking": { | |
"canal": {} | |
}, | |
"api": { | |
"dns": {} | |
}, | |
"authorization": { | |
"alwaysAllow": {} | |
} | |
} | |
I1203 10:31:25.124396 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2" | |
I1203 10:31:25.124503 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1203 10:31:25.155934 35890 aws_cloud.go:811] checking if instance type "m3.medium" is supported in region "us-west-2" | |
I1203 10:31:25.156298 35890 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings | |
I1203 10:31:25.352129 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.4.0 <1.5.0 | |
I1203 10:31:25.352171 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.5.0 <1.6.0 | |
I1203 10:31:25.352182 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.6.0 <1.7.0 | |
I1203 10:31:25.352247 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2" | |
I1203 10:31:25.352366 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1203 10:31:25.407197 35890 aws_cloud.go:811] checking if instance type "t2.medium" is supported in region "us-west-2" | |
I1203 10:31:25.407431 35890 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings | |
I1203 10:31:25.521946 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.4.0 <1.5.0 | |
I1203 10:31:25.521982 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.5.0 <1.6.0 | |
I1203 10:31:25.521993 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.6.0 <1.7.0 | |
I1203 10:31:25.524306 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/config" | |
I1203 10:31:25.620554 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/config" | |
I1203 10:31:25.620593 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/config" SSE="AES256" ACL="" BodyLen=890 | |
I1203 10:31:25.726758 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b" | |
I1203 10:31:25.820120 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b" | |
I1203 10:31:25.820158 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/instancegroup/master-us-west-2b" SSE="AES256" ACL="" BodyLen=286 | |
I1203 10:31:25.931957 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes" | |
I1203 10:31:26.025318 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes" | |
I1203 10:31:26.025357 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/instancegroup/nodes" SSE="AES256" ACL="" BodyLen=272 | |
I1203 10:31:26.129824 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/cluster.spec" | |
I1203 10:31:26.129854 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/cluster.spec" SSE="AES256" ACL="" BodyLen=4216 | |
I1203 10:31:26.365545 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/ssh/public/admin/d3b39e5386580260a5503ed2b7228ec0" | |
I1203 10:31:26.365584 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/ssh/public/admin/d3b39e5386580260a5503ed2b7228ec0" SSE="AES256" ACL="" BodyLen=746 | |
I1203 10:31:26.474217 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/config" | |
I1203 10:31:26.576034 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/instancegroup/" | |
I1203 10:31:26.706312 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup: [s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes] | |
I1203 10:31:26.706357 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b" | |
I1203 10:31:26.838203 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes" | |
I1203 10:31:26.996374 35890 channel.go:91] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/" | |
I1203 10:31:26.996418 35890 channel.go:96] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable" | |
I1203 10:31:26.996432 35890 context.go:132] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable | |
I1203 10:31:27.012363 35890 channel.go:105] Channel contents: spec: | |
images: | |
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 ) | |
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.4.0 <1.5.0" | |
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.5.0 <1.6.0" | |
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.6.0 <1.7.0" | |
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.7.0" | |
- providerID: gce | |
name: "cos-cloud/cos-stable-60-9592-90-0" | |
cluster: | |
kubernetesVersion: v1.5.7 | |
networking: | |
kubenet: {} | |
kubernetesVersions: | |
- range: ">=1.7.0" | |
recommendedVersion: 1.7.10 | |
requiredVersion: 1.7.0 | |
- range: ">=1.6.0" | |
recommendedVersion: 1.6.11 | |
requiredVersion: 1.6.0 | |
- range: ">=1.5.0" | |
recommendedVersion: 1.5.8 | |
requiredVersion: 1.5.1 | |
- range: "<1.5.0" | |
recommendedVersion: 1.4.12 | |
requiredVersion: 1.4.2 | |
kopsVersions: | |
- range: ">=1.7.0-alpha.1" | |
recommendedVersion: 1.7.1 | |
#requiredVersion: 1.7.0 | |
kubernetesVersion: 1.7.10 | |
- range: ">=1.6.0-alpha.1" | |
#recommendedVersion: 1.6.0 | |
#requiredVersion: 1.6.0 | |
kubernetesVersion: 1.6.11 | |
- range: ">=1.5.0-alpha1" | |
recommendedVersion: 1.5.1 | |
#requiredVersion: 1.5.1 | |
kubernetesVersion: 1.5.8 | |
- range: "<1.5.0" | |
recommendedVersion: 1.4.4 | |
#requiredVersion: 1.4.4 | |
kubernetesVersion: 1.4.12 | |
I1203 10:31:27.012662 35890 populate_cluster_spec.go:369] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11 | |
I1203 10:31:27.012680 35890 populate_cluster_spec.go:376] Defaulted ServiceClusterIPRange to 100.64.0.0/13 | |
I1203 10:31:27.012696 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2" | |
I1203 10:31:27.012830 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1203 10:31:27.058376 35890 subnets.go:48] All subnets have CIDRs; skipping asssignment logic | |
I1203 10:31:27.058431 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2" | |
I1203 10:31:27.058548 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1203 10:31:27.096846 35890 utils.go:121] Querying for all DNS zones to find match for "test.k8s.example.io" | |
I1203 10:31:27.096961 35890 route53.go:50] AWS request: route53 ListHostedZones | |
I1203 10:31:27.224832 35890 utils.go:152] Found matching hosted zone ".example.io", but it was "Private" and we require "Public" | |
I1203 10:31:27.224873 35890 populate_cluster_spec.go:249] Defaulting DNS zone to: Z3STZN85S7ZJGL | |
I1203 10:31:27.224893 35890 tagbuilder.go:102] tags: [_aws _k8s_1_6 _networking_cni] | |
I1203 10:31:27.224941 35890 tree_walker.go:97] visit "config/_aws" | |
I1203 10:31:27.224957 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/_aws" | |
I1203 10:31:27.224966 35890 tree_walker.go:97] visit "config/_aws/defaults.options" | |
I1203 10:31:27.225056 35890 tree_walker.go:97] visit "config/_gce" | |
I1203 10:31:27.225079 35890 tree_walker.go:120] Skipping directory "config/_gce" as tag "_gce" not present | |
I1203 10:31:27.225088 35890 tree_walker.go:97] visit "config/components" | |
I1203 10:31:27.225102 35890 tree_walker.go:97] visit "config/components/docker" | |
I1203 10:31:27.225119 35890 tree_walker.go:97] visit "config/components/docker/_e2e_storage_test_environment" | |
I1203 10:31:27.225134 35890 tree_walker.go:120] Skipping directory "config/components/docker/_e2e_storage_test_environment" as tag "_e2e_storage_test_environment" not present | |
I1203 10:31:27.225144 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni" | |
I1203 10:31:27.225155 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/docker/_networking_cni" | |
I1203 10:31:27.225165 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni/cni.options" | |
I1203 10:31:27.225263 35890 tree_walker.go:97] visit "config/components/docker/_networking_kubenet" | |
I1203 10:31:27.225287 35890 tree_walker.go:120] Skipping directory "config/components/docker/_networking_kubenet" as tag "_networking_kubenet" not present | |
I1203 10:31:27.225296 35890 tree_walker.go:97] visit "config/components/docker/docker.options" | |
I1203 10:31:27.225377 35890 tree_walker.go:97] visit "config/components/kube-apiserver" | |
I1203 10:31:27.225412 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_4" | |
I1203 10:31:27.225428 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_4" as tag "_k8s_1_4" not present | |
I1203 10:31:27.225437 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_5" | |
I1203 10:31:27.225449 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_5" as tag "_k8s_1_5" not present | |
I1203 10:31:27.225458 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_vsphere" | |
I1203 10:31:27.225473 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_vsphere" as tag "_vsphere" not present | |
I1203 10:31:27.225482 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws" | |
I1203 10:31:27.225493 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_aws" | |
I1203 10:31:27.225504 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws/kube-apiserver.aws.options" | |
I1203 10:31:27.225574 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_3" | |
I1203 10:31:27.225592 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_3" as tag "_k8s_1_3" not present | |
I1203 10:31:27.225602 35890 tree_walker.go:97] visit "config/components/kube-apiserver/kube-apiserver.options" | |
I1203 10:31:27.225735 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_gce" | |
I1203 10:31:27.225770 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_gce" as tag "_gce" not present | |
I1203 10:31:27.225781 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6" | |
I1203 10:31:27.225793 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_k8s_1_6" | |
I1203 10:31:27.225804 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6/kube-apiserver.options" | |
I1203 10:31:27.226043 35890 options_loader.go:101] executing template components/docker/docker.options (tags=[]) | |
I1203 10:31:27.226159 35890 options_loader.go:101] executing template components/kube-apiserver/kube-apiserver.options (tags=[]) | |
I1203 10:31:27.226317 35890 options_loader.go:101] executing template _aws/defaults.options (tags=[_aws]) | |
I1203 10:31:27.226367 35890 options_loader.go:101] executing template components/docker/_networking_cni/cni.options (tags=[_networking_cni]) | |
I1203 10:31:27.226408 35890 options_loader.go:101] executing template components/kube-apiserver/_aws/kube-apiserver.aws.options (tags=[_aws]) | |
I1203 10:31:27.226448 35890 options_loader.go:101] executing template components/kube-apiserver/_k8s_1_6/kube-apiserver.options (tags=[_k8s_1_6]) | |
I1203 10:31:27.226556 35890 options_loader.go:128] executing builder *components.DefaultsOptionsBuilder | |
I1203 10:31:27.226570 35890 options_loader.go:128] executing builder *components.KubeAPIServerOptionsBuilder | |
I1203 10:31:27.226582 35890 apiserver.go:100] Enabling apiserver insecure port, for healthchecks (issue #43784) | |
I1203 10:31:27.226588 35890 options_loader.go:128] executing builder *components.DockerOptionsBuilder | |
I1203 10:31:27.226600 35890 options_loader.go:128] executing builder *components.NetworkingOptionsBuilder | |
I1203 10:31:27.226610 35890 options_loader.go:128] executing builder *components.KubeDnsOptionsBuilder | |
I1203 10:31:27.226621 35890 options_loader.go:128] executing builder *components.KubeletOptionsBuilder | |
I1203 10:31:27.226634 35890 kubelet.go:139] Cloud Provider: aws | |
I1203 10:31:27.226643 35890 options_loader.go:128] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1203 10:31:27.226655 35890 kubecontrollermanager.go:74] Kubernetes version "1.7.10" supports AttachDetachReconcileSyncPeriod; will configure | |
I1203 10:31:27.226665 35890 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s | |
I1203 10:31:27.226675 35890 options_loader.go:128] executing builder *components.KubeSchedulerOptionsBuilder | |
I1203 10:31:27.226685 35890 options_loader.go:128] executing builder *components.KubeProxyOptionsBuilder | |
I1203 10:31:27.227094 35890 options_loader.go:101] executing template components/docker/docker.options (tags=[]) | |
I1203 10:31:27.227193 35890 options_loader.go:101] executing template components/kube-apiserver/kube-apiserver.options (tags=[]) | |
I1203 10:31:27.227332 35890 options_loader.go:101] executing template _aws/defaults.options (tags=[_aws]) | |
I1203 10:31:27.227378 35890 options_loader.go:101] executing template components/docker/_networking_cni/cni.options (tags=[_networking_cni]) | |
I1203 10:31:27.227430 35890 options_loader.go:101] executing template components/kube-apiserver/_aws/kube-apiserver.aws.options (tags=[_aws]) | |
I1203 10:31:27.227509 35890 options_loader.go:101] executing template components/kube-apiserver/_k8s_1_6/kube-apiserver.options (tags=[_k8s_1_6]) | |
I1203 10:31:27.227603 35890 options_loader.go:128] executing builder *components.DefaultsOptionsBuilder | |
I1203 10:31:27.227613 35890 options_loader.go:128] executing builder *components.KubeAPIServerOptionsBuilder | |
I1203 10:31:27.227623 35890 apiserver.go:100] Enabling apiserver insecure port, for healthchecks (issue #43784) | |
I1203 10:31:27.227630 35890 options_loader.go:128] executing builder *components.DockerOptionsBuilder | |
I1203 10:31:27.227640 35890 options_loader.go:128] executing builder *components.NetworkingOptionsBuilder | |
I1203 10:31:27.227648 35890 options_loader.go:128] executing builder *components.KubeDnsOptionsBuilder | |
I1203 10:31:27.227657 35890 options_loader.go:128] executing builder *components.KubeletOptionsBuilder | |
I1203 10:31:27.227668 35890 kubelet.go:139] Cloud Provider: aws | |
I1203 10:31:27.227677 35890 options_loader.go:128] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1203 10:31:27.227687 35890 kubecontrollermanager.go:74] Kubernetes version "1.7.10" supports AttachDetachReconcileSyncPeriod; will configure | |
I1203 10:31:27.227699 35890 options_loader.go:128] executing builder *components.KubeSchedulerOptionsBuilder | |
I1203 10:31:27.227706 35890 options_loader.go:128] executing builder *components.KubeProxyOptionsBuilder | |
I1203 10:31:27.228147 35890 spec_builder.go:68] options: { | |
"channel": "stable", | |
"configBase": "s3://clusters.k8s.example.io/test.k8s.example.io", | |
"cloudProvider": "aws", | |
"kubernetesVersion": "1.7.10", | |
"subnets": [ | |
{ | |
"name": "us-west-2b", | |
"zone": "us-west-2b", | |
"cidr": "172.20.32.0/19", | |
"type": "Public" | |
} | |
], | |
"masterPublicName": "api.test.k8s.example.io", | |
"masterInternalName": "api.internal.test.k8s.example.io", | |
"networkCIDR": "172.20.0.0/16", | |
"topology": { | |
"masters": "public", | |
"nodes": "public", | |
"dns": { | |
"type": "Public" | |
} | |
}, | |
"secretStore": "s3://clusters.k8s.example.io/test.k8s.example.io/secrets", | |
"keyStore": "s3://clusters.k8s.example.io/test.k8s.example.io/pki", | |
"configStore": "s3://clusters.k8s.example.io/test.k8s.example.io", | |
"dnsZone": "Z3STZN85S7ZJGL", | |
"clusterDNSDomain": "cluster.local", | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"sshAccess": [ | |
"0.0.0.0/0" | |
], | |
"kubernetesApiAccess": [ | |
"0.0.0.0/0" | |
], | |
"etcdClusters": [ | |
{ | |
"name": "main", | |
"etcdMembers": [ | |
{ | |
"name": "b", | |
"instanceGroup": "master-us-west-2b" | |
} | |
] | |
}, | |
{ | |
"name": "events", | |
"etcdMembers": [ | |
{ | |
"name": "b", | |
"instanceGroup": "master-us-west-2b" | |
} | |
] | |
} | |
], | |
"docker": { | |
"bridge": "", | |
"logLevel": "warn", | |
"ipTables": false, | |
"ipMasq": false, | |
"logDriver": "json-file", | |
"logOpt": [ | |
"max-size=10m", | |
"max-file=5" | |
], | |
"storage": "overlay,aufs", | |
"version": "1.12.6" | |
}, | |
"kubeDNS": { | |
"image": "gcr.io/google_containers/kubedns-amd64:1.3", | |
"replicas": 2, | |
"domain": "cluster.local", | |
"serverIP": "100.64.0.10" | |
}, | |
"kubeAPIServer": { | |
"image": "gcr.io/google_containers/kube-apiserver:v1.7.10", | |
"logLevel": 2, | |
"cloudProvider": "aws", | |
"securePort": 443, | |
"insecurePort": 8080, | |
"address": "127.0.0.1", | |
"etcdServers": [ | |
"http://127.0.0.1:4001" | |
], | |
"etcdServersOverrides": [ | |
"/events#http://127.0.0.1:4002" | |
], | |
"admissionControl": [ | |
"NamespaceLifecycle", | |
"LimitRanger", | |
"ServiceAccount", | |
"PersistentVolumeLabel", | |
"DefaultStorageClass", | |
"DefaultTolerationSeconds", | |
"ResourceQuota" | |
], | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"allowPrivileged": true, | |
"apiServerCount": 1, | |
"anonymousAuth": false, | |
"kubeletPreferredAddressTypes": [ | |
"InternalIP", | |
"Hostname", | |
"ExternalIP" | |
], | |
"storageBackend": "etcd2", | |
"authorizationMode": "AlwaysAllow" | |
}, | |
"kubeControllerManager": { | |
"logLevel": 2, | |
"image": "gcr.io/google_containers/kube-controller-manager:v1.7.10", | |
"cloudProvider": "aws", | |
"clusterName": "test.k8s.example.io", | |
"clusterCIDR": "100.96.0.0/11", | |
"allocateNodeCIDRs": true, | |
"configureCloudRoutes": false, | |
"leaderElection": { | |
"leaderElect": true | |
}, | |
"attachDetachReconcileSyncPeriod": "1m0s", | |
"useServiceAccountCredentials": true | |
}, | |
"kubeScheduler": { | |
"logLevel": 2, | |
"image": "gcr.io/google_containers/kube-scheduler:v1.7.10", | |
"leaderElection": { | |
"leaderElect": true | |
} | |
}, | |
"kubeProxy": { | |
"image": "gcr.io/google_containers/kube-proxy:v1.7.10", | |
"cpuRequest": "100m", | |
"logLevel": 2, | |
"clusterCIDR": "100.96.0.0/11", | |
"hostnameOverride": "@aws" | |
}, | |
"kubelet": { | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"requireKubeconfig": true, | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "gcr.io/google_containers/pause-amd64:3.0", | |
"allowPrivileged": true, | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "cni", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%" | |
}, | |
"masterKubelet": { | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"requireKubeconfig": true, | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "gcr.io/google_containers/pause-amd64:3.0", | |
"allowPrivileged": true, | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "cni", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"registerSchedulable": false, | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%" | |
}, | |
"networking": { | |
"canal": {} | |
}, | |
"api": { | |
"dns": {} | |
}, | |
"authorization": { | |
"alwaysAllow": {} | |
} | |
} | |
I1203 10:31:27.228722 35890 channel.go:156] RecommendedVersion="1.7.1", Have="1.7.1". No upgrade needed. | |
I1203 10:31:27.228742 35890 channel.go:184] VersionRecommendationSpec does not specify RequiredVersion | |
I1203 10:31:27.228756 35890 channel.go:136] RecommendedVersion="1.7.10", Have="1.7.10". No upgrade needed. | |
I1203 10:31:27.228764 35890 channel.go:176] RequiredVersion="1.7.0", Have="1.7.10". No upgrade needed. | |
I1203 10:31:27.228823 35890 apply_cluster.go:221] Adding default kubelet release asset: https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubelet | |
I1203 10:31:27.228834 35890 context.go:132] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubelet.sha1 | |
I1203 10:31:27.398940 35890 apply_cluster.go:803] Found hash "4d38bdc8e850c05103348cee2cbffbddce62bcf8" for "https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubelet" | |
I1203 10:31:27.398998 35890 apply_cluster.go:232] Adding default kubectl release asset: https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubectl | |
I1203 10:31:27.399015 35890 context.go:132] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubectl.sha1 | |
I1203 10:31:27.426862 35890 apply_cluster.go:803] Found hash "4c174128ad3657bb09c5b3bd4a05565956b44744" for "https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubectl" | |
I1203 10:31:27.426966 35890 networking.go:120] Adding default CNI asset: https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz | |
I1203 10:31:27.426988 35890 urls.go:40] Using default base url: "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/" | |
I1203 10:31:27.427002 35890 apply_cluster.go:258] Using default utils.tar.gz location: "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/linux/amd64/utils.tar.gz" | |
I1203 10:31:27.427020 35890 context.go:132] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.7.1/linux/amd64/utils.tar.gz.sha1 | |
I1203 10:31:27.870237 35890 apply_cluster.go:803] Found hash "c18ca557507c662e3a072c3475da9bd1bc8a503b" for "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/linux/amd64/utils.tar.gz" | |
I1203 10:31:27.870284 35890 urls.go:64] Using default nodeup location: "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/linux/amd64/nodeup" | |
I1203 10:31:27.870317 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2" | |
I1203 10:31:27.870458 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1203 10:31:27.899543 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/ssh/public/admin/" | |
I1203 10:31:28.006025 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/ssh/public/admin: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/ssh/public/admin/d3b39e5386580260a5503ed2b7228ec0] | |
I1203 10:31:28.006059 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/ssh/public/admin/d3b39e5386580260a5503ed2b7228ec0" | |
I1203 10:31:28.106111 35890 route53.go:50] AWS request: route53 ListHostedZones | |
I1203 10:31:28.221141 35890 dns.go:101] Doing DNS lookup to verify NS records for "k8s.example.io" | |
I1203 10:31:28.342620 35890 dns.go:118] Found NS records for "k8s.example.io": [ns-1466.awsdns-55.org. ns-1922.awsdns-48.co.uk. ns-24.awsdns-03.com. ns-1017.awsdns-63.net.] | |
I1203 10:31:28.342669 35890 tagbuilder.go:102] tags: [_aws _k8s_1_6 _networking_cni] | |
I1203 10:31:28.343044 35890 templates.go:79] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml" | |
I1203 10:31:28.343264 35890 templates.go:79] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml" | |
I1203 10:31:28.343331 35890 templates.go:87] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1203 10:31:28.343470 35890 templates.go:87] loading resource "addons/networking.flannel/k8s-1.6.yaml" | |
I1203 10:31:28.343564 35890 templates.go:87] loading resource "addons/networking.flannel/pre-k8s-1.6.yaml" | |
I1203 10:31:28.343642 35890 templates.go:87] loading resource "addons/networking.kope.io/k8s-1.6.yaml" | |
I1203 10:31:28.343703 35890 templates.go:87] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.343835 35890 templates.go:79] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:28.343928 35890 templates.go:79] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.344159 35890 templates.go:79] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml" | |
I1203 10:31:28.344384 35890 templates.go:79] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" | |
I1203 10:31:28.344501 35890 templates.go:79] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml" | |
I1203 10:31:28.344604 35890 templates.go:79] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml" | |
I1203 10:31:28.344645 35890 templates.go:87] loading resource "addons/core.addons.k8s.io/addon.yaml" | |
I1203 10:31:28.344691 35890 templates.go:87] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1203 10:31:28.344781 35890 templates.go:79] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:28.344846 35890 templates.go:79] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.344896 35890 templates.go:87] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1203 10:31:28.344944 35890 templates.go:87] loading resource "addons/limit-range.addons.k8s.io/addon.yaml" | |
I1203 10:31:28.345058 35890 templates.go:79] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml" | |
I1203 10:31:28.345144 35890 templates.go:87] loading resource "addons/authentication.kope.io/k8s-1.6.yaml" | |
I1203 10:31:28.345348 35890 templates.go:79] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:28.345528 35890 templates.go:79] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.345605 35890 tree_walker.go:97] visit "config/_aws" | |
I1203 10:31:28.345623 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/_aws" | |
I1203 10:31:28.345634 35890 tree_walker.go:97] visit "config/_aws/defaults.options" | |
I1203 10:31:28.345645 35890 tree_walker.go:97] visit "config/_gce" | |
I1203 10:31:28.345657 35890 tree_walker.go:120] Skipping directory "config/_gce" as tag "_gce" not present | |
I1203 10:31:28.345666 35890 tree_walker.go:97] visit "config/components" | |
I1203 10:31:28.345679 35890 tree_walker.go:97] visit "config/components/docker" | |
I1203 10:31:28.345696 35890 tree_walker.go:97] visit "config/components/docker/docker.options" | |
I1203 10:31:28.345707 35890 tree_walker.go:97] visit "config/components/docker/_e2e_storage_test_environment" | |
I1203 10:31:28.345722 35890 tree_walker.go:120] Skipping directory "config/components/docker/_e2e_storage_test_environment" as tag "_e2e_storage_test_environment" not present | |
I1203 10:31:28.345732 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni" | |
I1203 10:31:28.345744 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/docker/_networking_cni" | |
I1203 10:31:28.345754 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni/cni.options" | |
I1203 10:31:28.345767 35890 tree_walker.go:97] visit "config/components/docker/_networking_kubenet" | |
I1203 10:31:28.345780 35890 tree_walker.go:120] Skipping directory "config/components/docker/_networking_kubenet" as tag "_networking_kubenet" not present | |
I1203 10:31:28.345790 35890 tree_walker.go:97] visit "config/components/kube-apiserver" | |
I1203 10:31:28.345810 35890 tree_walker.go:97] visit "config/components/kube-apiserver/kube-apiserver.options" | |
I1203 10:31:28.345823 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_gce" | |
I1203 10:31:28.345843 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_gce" as tag "_gce" not present | |
I1203 10:31:28.345856 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6" | |
I1203 10:31:28.345869 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_k8s_1_6" | |
I1203 10:31:28.345879 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6/kube-apiserver.options" | |
I1203 10:31:28.345892 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_4" | |
I1203 10:31:28.345905 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_4" as tag "_k8s_1_4" not present | |
I1203 10:31:28.345914 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_5" | |
I1203 10:31:28.345926 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_5" as tag "_k8s_1_5" not present | |
I1203 10:31:28.345935 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_vsphere" | |
I1203 10:31:28.345947 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_vsphere" as tag "_vsphere" not present | |
I1203 10:31:28.345955 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws" | |
I1203 10:31:28.345973 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_aws" | |
I1203 10:31:28.345986 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws/kube-apiserver.aws.options" | |
I1203 10:31:28.346000 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_3" | |
I1203 10:31:28.346012 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_3" as tag "_k8s_1_3" not present | |
I1203 10:31:28.346024 35890 tree_walker.go:97] visit "cloudup/resources" | |
I1203 10:31:28.346036 35890 tree_walker.go:97] visit "cloudup/resources/addons" | |
I1203 10:31:28.346062 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kope.io" | |
I1203 10:31:28.346078 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kope.io/k8s-1.6.yaml" | |
I1203 10:31:28.346199 35890 loader.go:319] loading resource "addons/networking.kope.io/k8s-1.6.yaml" | |
I1203 10:31:28.346214 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.346278 35890 loader.go:319] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.346288 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org" | |
I1203 10:31:28.346304 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.6.yaml.template" | |
I1203 10:31:28.346483 35890 loader.go:311] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml" | |
I1203 10:31:28.346498 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org/pre-k8s-1.6.yaml.template" | |
I1203 10:31:28.346654 35890 loader.go:311] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml" | |
I1203 10:31:28.346670 35890 tree_walker.go:97] visit "cloudup/resources/addons/storage-aws.addons.k8s.io" | |
I1203 10:31:28.346682 35890 tree_walker.go:97] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1203 10:31:28.346733 35890 loader.go:319] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1203 10:31:28.346741 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.flannel" | |
I1203 10:31:28.346753 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.flannel/k8s-1.6.yaml" | |
I1203 10:31:28.346827 35890 loader.go:319] loading resource "addons/networking.flannel/k8s-1.6.yaml" | |
I1203 10:31:28.346835 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.flannel/pre-k8s-1.6.yaml" | |
I1203 10:31:28.346908 35890 loader.go:319] loading resource "addons/networking.flannel/pre-k8s-1.6.yaml" | |
I1203 10:31:28.346917 35890 tree_walker.go:97] visit "cloudup/resources/addons/dns-controller.addons.k8s.io" | |
I1203 10:31:28.346930 35890 tree_walker.go:97] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml.template" | |
I1203 10:31:28.346999 35890 loader.go:311] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:28.347012 35890 tree_walker.go:97] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1203 10:31:28.347061 35890 loader.go:311] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.347074 35890 tree_walker.go:97] visit "cloudup/resources/addons/external-dns.addons.k8s.io" | |
I1203 10:31:28.347086 35890 tree_walker.go:97] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.6.yaml.template" | |
I1203 10:31:28.347174 35890 loader.go:311] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:28.347184 35890 tree_walker.go:97] visit "cloudup/resources/addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1203 10:31:28.347238 35890 loader.go:311] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.347247 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org.canal" | |
I1203 10:31:28.347260 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.6.yaml.template" | |
I1203 10:31:28.347417 35890 loader.go:311] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml" | |
I1203 10:31:28.347431 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml.template" | |
I1203 10:31:28.347564 35890 loader.go:311] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" | |
I1203 10:31:28.347578 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.weave" | |
I1203 10:31:28.347592 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.weave/k8s-1.6.yaml.template" | |
I1203 10:31:28.347673 35890 loader.go:311] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml" | |
I1203 10:31:28.347690 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.weave/pre-k8s-1.6.yaml.template" | |
I1203 10:31:28.347768 35890 loader.go:311] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml" | |
I1203 10:31:28.347776 35890 tree_walker.go:97] visit "cloudup/resources/addons/core.addons.k8s.io" | |
I1203 10:31:28.347788 35890 tree_walker.go:97] visit "cloudup/resources/addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1203 10:31:28.347823 35890 loader.go:319] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1203 10:31:28.347830 35890 tree_walker.go:97] visit "cloudup/resources/addons/core.addons.k8s.io/addon.yaml" | |
I1203 10:31:28.347865 35890 loader.go:319] loading resource "addons/core.addons.k8s.io/addon.yaml" | |
I1203 10:31:28.347872 35890 tree_walker.go:97] visit "cloudup/resources/addons/kube-dns.addons.k8s.io" | |
I1203 10:31:28.347884 35890 tree_walker.go:97] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml.template" | |
I1203 10:31:28.348041 35890 loader.go:311] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:28.348055 35890 tree_walker.go:97] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1203 10:31:28.348188 35890 loader.go:311] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:28.348203 35890 tree_walker.go:97] visit "cloudup/resources/addons/limit-range.addons.k8s.io" | |
I1203 10:31:28.348215 35890 tree_walker.go:97] visit "cloudup/resources/addons/limit-range.addons.k8s.io/addon.yaml" | |
I1203 10:31:28.348251 35890 loader.go:319] loading resource "addons/limit-range.addons.k8s.io/addon.yaml" | |
I1203 10:31:28.348261 35890 tree_walker.go:97] visit "cloudup/resources/addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1203 10:31:28.348308 35890 loader.go:319] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1203 10:31:28.348318 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kuberouter" | |
I1203 10:31:28.348330 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.6.yaml.template" | |
I1203 10:31:28.348418 35890 loader.go:311] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml" | |
I1203 10:31:28.348431 35890 tree_walker.go:97] visit "cloudup/resources/addons/authentication.kope.io" | |
I1203 10:31:28.348442 35890 tree_walker.go:97] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.6.yaml" | |
I1203 10:31:28.348507 35890 loader.go:319] loading resource "addons/authentication.kope.io/k8s-1.6.yaml" | |
I1203 10:31:28.352483 35890 images.go:56] Consider image for re-mapping: "quay.io/calico/node:v1.2.1" | |
I1203 10:31:28.352509 35890 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.privileged: %!s(bool=true) | |
I1203 10:31:28.352517 35890 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[0].readOnly: %!s(bool=true) | |
I1203 10:31:28.352523 35890 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[1].readOnly: %!s(bool=false) | |
I1203 10:31:28.352531 35890 images.go:56] Consider image for re-mapping: "quay.io/calico/cni:v1.8.3" | |
I1203 10:31:28.352545 35890 images.go:56] Consider image for re-mapping: "quay.io/coreos/flannel:v0.7.1" | |
I1203 10:31:28.352551 35890 visitor.go:34] string value at spec.template.spec.containers.[2].securityContext.privileged: %!s(bool=true) | |
I1203 10:31:28.352560 35890 visitor.go:34] string value at spec.template.spec.hostNetwork: %!s(bool=true) | |
I1203 10:31:28.355652 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2-r2" | |
I1203 10:31:28.356047 35890 visitor.go:39] float64 value at spec.strategy.rollingUpdate.maxUnavailable: %!s(float64=0) | |
I1203 10:31:28.356068 35890 visitor.go:34] string value at spec.template.spec.volumes.[0].configMap.optional: %!s(bool=true) | |
I1203 10:31:28.356075 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.5" | |
I1203 10:31:28.356081 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: %!s(float64=5) | |
I1203 10:31:28.356086 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: %!s(float64=10054) | |
I1203 10:31:28.356090 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: %!s(float64=60) | |
I1203 10:31:28.356095 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: %!s(float64=1) | |
I1203 10:31:28.356099 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: %!s(float64=5) | |
I1203 10:31:28.356103 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: %!s(float64=10053) | |
I1203 10:31:28.356107 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: %!s(float64=10053) | |
I1203 10:31:28.356112 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: %!s(float64=10055) | |
I1203 10:31:28.356116 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: %!s(float64=8081) | |
I1203 10:31:28.356120 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: %!s(float64=3) | |
I1203 10:31:28.356145 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: %!s(float64=5) | |
I1203 10:31:28.356153 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: %!s(float64=1) | |
I1203 10:31:28.356157 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: %!s(float64=5) | |
I1203 10:31:28.356162 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: %!s(float64=5) | |
I1203 10:31:28.356166 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: %!s(float64=10054) | |
I1203 10:31:28.356170 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: %!s(float64=60) | |
I1203 10:31:28.356174 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: %!s(float64=53) | |
I1203 10:31:28.356178 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: %!s(float64=53) | |
I1203 10:31:28.356187 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.5" | |
I1203 10:31:28.356195 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.5" | |
I1203 10:31:28.356200 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: %!s(float64=10054) | |
I1203 10:31:28.356204 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: %!s(float64=60) | |
I1203 10:31:28.356208 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: %!s(float64=1) | |
I1203 10:31:28.356211 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: %!s(float64=5) | |
I1203 10:31:28.356215 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: %!s(float64=5) | |
I1203 10:31:28.356219 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: %!s(float64=10054) | |
I1203 10:31:28.357075 35890 visitor.go:39] float64 value at spec.ports.[0].port: %!s(float64=53) | |
I1203 10:31:28.357085 35890 visitor.go:39] float64 value at spec.ports.[1].port: %!s(float64=53) | |
I1203 10:31:28.357824 35890 visitor.go:39] float64 value at spec.replicas: %!s(float64=1) | |
I1203 10:31:28.357839 35890 images.go:56] Consider image for re-mapping: "kope/dns-controller:1.7.1" | |
I1203 10:31:28.357845 35890 visitor.go:34] string value at spec.template.spec.hostNetwork: %!s(bool=true) | |
I1203 10:31:28.358954 35890 images.go:56] Consider image for re-mapping: "quay.io/calico/node:v1.2.1" | |
I1203 10:31:28.358965 35890 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.privileged: %!s(bool=true) | |
I1203 10:31:28.358970 35890 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[0].readOnly: %!s(bool=true) | |
I1203 10:31:28.358974 35890 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[1].readOnly: %!s(bool=false) | |
I1203 10:31:28.358982 35890 images.go:56] Consider image for re-mapping: "quay.io/calico/cni:v1.8.3" | |
I1203 10:31:28.358993 35890 images.go:56] Consider image for re-mapping: "quay.io/coreos/flannel:v0.7.1" | |
I1203 10:31:28.358997 35890 visitor.go:34] string value at spec.template.spec.containers.[2].securityContext.privileged: %!s(bool=true) | |
I1203 10:31:28.359000 35890 visitor.go:34] string value at spec.template.spec.hostNetwork: %!s(bool=true) | |
I1203 10:31:28.360331 35890 visitor.go:39] float64 value at spec.replicas: %!s(float64=1) | |
I1203 10:31:28.360343 35890 visitor.go:34] string value at spec.template.spec.hostNetwork: %!s(bool=true) | |
I1203 10:31:28.360351 35890 images.go:56] Consider image for re-mapping: "kope/dns-controller:1.7.1" | |
I1203 10:31:28.362302 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.0.0" | |
I1203 10:31:28.362605 35890 visitor.go:39] float64 value at spec.strategy.rollingUpdate.maxUnavailable: %!s(float64=0) | |
I1203 10:31:28.362618 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: %!s(float64=8081) | |
I1203 10:31:28.362622 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: %!s(float64=3) | |
I1203 10:31:28.362625 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: %!s(float64=5) | |
I1203 10:31:28.362632 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/kubedns-amd64:1.9" | |
I1203 10:31:28.362637 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: %!s(float64=5) | |
I1203 10:31:28.362641 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: %!s(float64=8080) | |
I1203 10:31:28.362644 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: %!s(float64=60) | |
I1203 10:31:28.362648 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: %!s(float64=1) | |
I1203 10:31:28.362651 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: %!s(float64=5) | |
I1203 10:31:28.362656 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: %!s(float64=10053) | |
I1203 10:31:28.362659 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: %!s(float64=10053) | |
I1203 10:31:28.362674 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: %!s(float64=10055) | |
I1203 10:31:28.362680 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.14.5" | |
I1203 10:31:28.362705 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: %!s(float64=5) | |
I1203 10:31:28.362711 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: %!s(float64=8080) | |
I1203 10:31:28.362716 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: %!s(float64=60) | |
I1203 10:31:28.362719 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: %!s(float64=1) | |
I1203 10:31:28.362723 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: %!s(float64=5) | |
I1203 10:31:28.362727 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: %!s(float64=53) | |
I1203 10:31:28.362732 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: %!s(float64=53) | |
I1203 10:31:28.362736 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/dnsmasq-metrics-amd64:1.0" | |
I1203 10:31:28.362741 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: %!s(float64=5) | |
I1203 10:31:28.362745 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: %!s(float64=5) | |
I1203 10:31:28.362748 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: %!s(float64=10054) | |
I1203 10:31:28.362753 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: %!s(float64=60) | |
I1203 10:31:28.362756 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: %!s(float64=1) | |
I1203 10:31:28.362760 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: %!s(float64=10054) | |
I1203 10:31:28.362766 35890 visitor.go:39] float64 value at spec.template.spec.containers.[3].ports.[0].containerPort: %!s(float64=8080) | |
I1203 10:31:28.362773 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/exechealthz-amd64:1.2" | |
I1203 10:31:28.363597 35890 visitor.go:39] float64 value at spec.ports.[0].port: %!s(float64=53) | |
I1203 10:31:28.363606 35890 visitor.go:39] float64 value at spec.ports.[1].port: %!s(float64=53) | |
I1203 10:31:28.365681 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/cluster.spec" | |
I1203 10:31:28.365696 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/cluster.spec" SSE="AES256" ACL="" BodyLen=4232 | |
I1203 10:31:28.513609 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b" | |
I1203 10:31:28.625621 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b" | |
I1203 10:31:28.625662 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/instancegroup/master-us-west-2b" SSE="AES256" ACL="" BodyLen=346 | |
I1203 10:31:28.786818 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes" | |
I1203 10:31:28.927105 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes" | |
I1203 10:31:28.927144 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/instancegroup/nodes" SSE="AES256" ACL="" BodyLen=332 | |
I1203 10:31:29.029224 35890 topological_sort.go:62] Dependencies: | |
I1203 10:31:29.029251 35890 topological_sort.go:64] InternetGateway/test.k8s.example.io: [VPC/test.k8s.example.io] | |
I1203 10:31:29.029262 35890 topological_sort.go:64] IAMInstanceProfileRole/masters.test.k8s.example.io: [IAMInstanceProfile/masters.test.k8s.example.io IAMRole/masters.test.k8s.example.io] | |
I1203 10:31:29.029271 35890 topological_sort.go:64] SecurityGroupRule/master-egress: [SecurityGroup/masters.test.k8s.example.io] | |
I1203 10:31:29.029278 35890 topological_sort.go:64] test.k8s.example.io-addons-dns-controller.addons.k8s.io-pre-k8s-1.6: [] | |
I1203 10:31:29.029284 35890 topological_sort.go:64] Keypair/kube-controller-manager: [] | |
I1203 10:31:29.029290 35890 topological_sort.go:64] DHCPOptions/test.k8s.example.io: [] | |
I1203 10:31:29.029297 35890 topological_sort.go:64] SecurityGroupRule/node-to-master-tcp-4003-65535: [SecurityGroup/masters.test.k8s.example.io SecurityGroup/nodes.test.k8s.example.io] | |
I1203 10:31:29.029303 35890 topological_sort.go:64] VPC/test.k8s.example.io: [] | |
I1203 10:31:29.029309 35890 topological_sort.go:64] AutoscalingGroup/nodes.test.k8s.example.io: [Subnet/us-west-2b.test.k8s.example.io LaunchConfiguration/nodes.test.k8s.example.io] | |
I1203 10:31:29.029316 35890 topological_sort.go:64] test.k8s.example.io-addons-kube-dns.addons.k8s.io-k8s-1.6: [] | |
I1203 10:31:29.029322 35890 topological_sort.go:64] Secret/kube: [] | |
I1203 10:31:29.029328 35890 topological_sort.go:64] Secret/system:logging: [] | |
I1203 10:31:29.029334 35890 topological_sort.go:64] SecurityGroupRule/ssh-external-to-master-0.0.0.0/0: [SecurityGroup/masters.test.k8s.example.io] | |
I1203 10:31:29.029340 35890 topological_sort.go:64] IAMRolePolicy/masters.test.k8s.example.io: [IAMRole/masters.test.k8s.example.io DNSZone/Z3STZN85S7ZJGL] | |
I1203 10:31:29.029438 35890 topological_sort.go:64] Route/0.0.0.0/0: [RouteTable/test.k8s.example.io InternetGateway/test.k8s.example.io] | |
I1203 10:31:29.029454 35890 topological_sort.go:64] Keypair/kubelet: [] | |
I1203 10:31:29.029460 35890 topological_sort.go:64] SecurityGroupRule/all-node-to-node: [SecurityGroup/nodes.test.k8s.example.io SecurityGroup/nodes.test.k8s.example.io] | |
I1203 10:31:29.029467 35890 topological_sort.go:64] Secret/system:dns: [] | |
I1203 10:31:29.029473 35890 topological_sort.go:64] LaunchConfiguration/nodes.test.k8s.example.io: [SSHKey/kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0 SecurityGroup/nodes.test.k8s.example.io IAMInstanceProfile/nodes.test.k8s.example.io] | |
I1203 10:31:29.029483 35890 topological_sort.go:64] Secret/system:controller_manager: [] | |
I1203 10:31:29.029506 35890 topological_sort.go:64] Keypair/kube-scheduler: [] | |
I1203 10:31:29.029513 35890 topological_sort.go:64] VPCDHCPOptionsAssociation/test.k8s.example.io: [VPC/test.k8s.example.io DHCPOptions/test.k8s.example.io] | |
I1203 10:31:29.029521 35890 topological_sort.go:64] RouteTable/test.k8s.example.io: [VPC/test.k8s.example.io] | |
I1203 10:31:29.029527 35890 topological_sort.go:64] IAMRole/masters.test.k8s.example.io: [] | |
I1203 10:31:29.029533 35890 topological_sort.go:64] test.k8s.example.io-addons-kube-dns.addons.k8s.io-pre-k8s-1.6: [] | |
I1203 10:31:29.029539 35890 topological_sort.go:64] SecurityGroupRule/ssh-external-to-node-0.0.0.0/0: [SecurityGroup/nodes.test.k8s.example.io] | |
I1203 10:31:29.029546 35890 topological_sort.go:64] LaunchConfiguration/master-us-west-2b.masters.test.k8s.example.io: [SSHKey/kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0 SecurityGroup/masters.test.k8s.example.io IAMInstanceProfile/masters.test.k8s.example.io] | |
I1203 10:31:29.029633 35890 topological_sort.go:64] IAMRole/nodes.test.k8s.example.io: [] | |
I1203 10:31:29.029653 35890 topological_sort.go:64] SecurityGroupRule/https-external-to-master-0.0.0.0/0: [SecurityGroup/masters.test.k8s.example.io] | |
I1203 10:31:29.029659 35890 topological_sort.go:64] test.k8s.example.io-addons-bootstrap: [] | |
I1203 10:31:29.029664 35890 topological_sort.go:64] IAMRolePolicy/additional.masters.test.k8s.example.io: [IAMRole/masters.test.k8s.example.io] | |
I1203 10:31:29.029668 35890 topological_sort.go:64] IAMRolePolicy/additional.nodes.test.k8s.example.io: [IAMRole/nodes.test.k8s.example.io] | |
I1203 10:31:29.029673 35890 topological_sort.go:64] Keypair/kops: [] | |
I1203 10:31:29.029678 35890 topological_sort.go:64] Secret/admin: [] | |
I1203 10:31:29.029682 35890 topological_sort.go:64] SecurityGroup/masters.test.k8s.example.io: [VPC/test.k8s.example.io] | |
I1203 10:31:29.029751 35890 topological_sort.go:64] SecurityGroup/nodes.test.k8s.example.io: [VPC/test.k8s.example.io] | |
I1203 10:31:29.029765 35890 topological_sort.go:64] Keypair/master: [] | |
I1203 10:31:29.029770 35890 topological_sort.go:64] SecurityGroupRule/all-master-to-master: [SecurityGroup/masters.test.k8s.example.io SecurityGroup/masters.test.k8s.example.io] | |
I1203 10:31:29.029777 35890 topological_sort.go:64] DNSZone/Z3STZN85S7ZJGL: [] | |
I1203 10:31:29.029782 35890 topological_sort.go:64] Keypair/kubecfg: [] | |
I1203 10:31:29.029786 35890 topological_sort.go:64] test.k8s.example.io-addons-dns-controller.addons.k8s.io-k8s-1.6: [] | |
I1203 10:31:29.029791 35890 topological_sort.go:64] SecurityGroupRule/all-master-to-node: [SecurityGroup/nodes.test.k8s.example.io SecurityGroup/masters.test.k8s.example.io] | |
I1203 10:31:29.029801 35890 topological_sort.go:64] EBSVolume/b.etcd-main.test.k8s.example.io: [] | |
I1203 10:31:29.029805 35890 topological_sort.go:64] Secret/kubelet: [] | |
I1203 10:31:29.029839 35890 topological_sort.go:64] test.k8s.example.io-addons-storage-aws.addons.k8s.io: [] | |
I1203 10:31:29.029856 35890 topological_sort.go:64] SecurityGroupRule/node-egress: [SecurityGroup/nodes.test.k8s.example.io] | |
I1203 10:31:29.029875 35890 topological_sort.go:64] Secret/kube-proxy: [] | |
I1203 10:31:29.029882 35890 topological_sort.go:64] test.k8s.example.io-addons-limit-range.addons.k8s.io: [] | |
I1203 10:31:29.029889 35890 topological_sort.go:64] test.k8s.example.io-addons-networking.projectcalico.org.canal-pre-k8s-1.6: [] | |
I1203 10:31:29.029893 35890 topological_sort.go:64] EBSVolume/b.etcd-events.test.k8s.example.io: [] | |
I1203 10:31:29.029898 35890 topological_sort.go:64] SSHKey/kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0:[] | |
I1203 10:31:29.029904 35890 topological_sort.go:64] Keypair/kube-proxy: [] | |
I1203 10:31:29.029909 35890 topological_sort.go:64] SecurityGroupRule/node-to-master-udp-1-65535: [SecurityGroup/masters.test.k8s.example.io SecurityGroup/nodes.test.k8s.example.io] | |
I1203 10:31:29.029915 35890 topological_sort.go:64] IAMInstanceProfileRole/nodes.test.k8s.example.io: [IAMInstanceProfile/nodes.test.k8s.example.io IAMRole/nodes.test.k8s.example.io] | |
I1203 10:31:29.029920 35890 topological_sort.go:64] test.k8s.example.io-addons-core.addons.k8s.io: [] | |
I1203 10:31:29.029925 35890 topological_sort.go:64] Subnet/us-west-2b.test.k8s.example.io: [VPC/test.k8s.example.io] | |
I1203 10:31:29.029930 35890 topological_sort.go:64] IAMInstanceProfile/nodes.test.k8s.example.io: [] | |
I1203 10:31:29.029934 35890 topological_sort.go:64] test.k8s.example.io-addons-networking.projectcalico.org.canal-k8s-1.6: [] | |
I1203 10:31:29.029939 35890 topological_sort.go:64] AutoscalingGroup/master-us-west-2b.masters.test.k8s.example.io: [Subnet/us-west-2b.test.k8s.example.io LaunchConfiguration/master-us-west-2b.masters.test.k8s.example.io] | |
I1203 10:31:29.029989 35890 topological_sort.go:64] IAMRolePolicy/nodes.test.k8s.example.io: [IAMRole/nodes.test.k8s.example.io DNSZone/Z3STZN85S7ZJGL] | |
I1203 10:31:29.030001 35890 topological_sort.go:64] Secret/system:scheduler: [] | |
I1203 10:31:29.030006 35890 topological_sort.go:64] Secret/system:monitoring: [] | |
I1203 10:31:29.030011 35890 topological_sort.go:64] SecurityGroupRule/node-to-master-tcp-1-4000: [SecurityGroup/masters.test.k8s.example.io SecurityGroup/nodes.test.k8s.example.io] | |
I1203 10:31:29.030016 35890 topological_sort.go:64] IAMInstanceProfile/masters.test.k8s.example.io: [] | |
I1203 10:31:29.030021 35890 topological_sort.go:64] RouteTableAssociation/us-west-2b.test.k8s.example.io: [RouteTable/test.k8s.example.io Subnet/us-west-2b.test.k8s.example.io] | |
I1203 10:31:29.030110 35890 executor.go:91] Tasks: 0 done / 65 total; 36 can run | |
I1203 10:31:29.030514 35890 executor.go:157] Executing task "IAMInstanceProfile/masters.test.k8s.example.io": *awstasks.IAMInstanceProfile {"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":null} | |
I1203 10:31:29.030347 35890 executor.go:157] Executing task "IAMInstanceProfile/nodes.test.k8s.example.io": *awstasks.IAMInstanceProfile {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":null} | |
I1203 10:31:29.030505 35890 executor.go:157] Executing task "EBSVolume/b.etcd-events.test.k8s.example.io": *awstasks.EBSVolume {"Name":"b.etcd-events.test.k8s.example.io","Lifecycle":"Sync","ID":null,"AvailabilityZone":"us-west-2b","VolumeType":"gp2","SizeGB":20,"KmsKeyId":null,"Encrypted":false,"Tags":{"k8s.io/etcd/events":"b/b","k8s.io/role/master":"1"}} | |
I1203 10:31:29.030459 35890 executor.go:157] Executing task "Keypair/kubecfg": *fitasks.Keypair {"Name":"kubecfg","Lifecycle":"Sync","subject":"o=system:masters,cn=kubecfg","type":"client","alternateNames":null,"alternateNameTasks":null} | |
I1203 10:31:29.030305 35890 executor.go:157] Executing task "Keypair/kubelet": *fitasks.Keypair {"Name":"kubelet","Lifecycle":"Sync","subject":"o=system:nodes,cn=kubelet","type":"client","alternateNames":null,"alternateNameTasks":null} | |
I1203 10:31:29.030372 35890 executor.go:157] Executing task "Keypair/kops": *fitasks.Keypair {"Name":"kops","Lifecycle":"Sync","subject":"o=system:masters,cn=kops","type":"client","alternateNames":null,"alternateNameTasks":null} | |
I1203 10:31:29.030352 35890 executor.go:157] Executing task "EBSVolume/b.etcd-main.test.k8s.example.io": *awstasks.EBSVolume {"Name":"b.etcd-main.test.k8s.example.io","Lifecycle":"Sync","ID":null,"AvailabilityZone":"us-west-2b","VolumeType":"gp2","SizeGB":20,"KmsKeyId":null,"Encrypted":false,"Tags":{"k8s.io/etcd/main":"b/b","k8s.io/role/master":"1"}} | |
I1203 10:31:29.030389 35890 executor.go:157] Executing task "Keypair/kube-controller-manager": *fitasks.Keypair {"Name":"kube-controller-manager","Lifecycle":"Sync","subject":"cn=system:kube-controller-manager","type":"client","alternateNames":null,"alternateNameTasks":null} | |
I1203 10:31:29.030385 35890 executor.go:157] Executing task "DNSZone/Z3STZN85S7ZJGL": *awstasks.DNSZone {"Name":"Z3STZN85S7ZJGL","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z3STZN85S7ZJGL","Private":null,"PrivateVPC":null} | |
I1203 10:31:29.030502 35890 executor.go:157] Executing task "Keypair/kube-proxy": *fitasks.Keypair {"Name":"kube-proxy","Lifecycle":"Sync","subject":"cn=system:kube-proxy","type":"client","alternateNames":null,"alternateNameTasks":null} | |
I1203 10:31:29.030235 35890 executor.go:157] Executing task "Keypair/master": *fitasks.Keypair {"Name":"master","Lifecycle":"Sync","subject":"cn=kubernetes-master","type":"server","alternateNames":["kubernetes","kubernetes.default","kubernetes.default.svc","kubernetes.default.svc.cluster.local","api.test.k8s.example.io","api.internal.test.k8s.example.io","100.64.0.1","127.0.0.1"],"alternateNameTasks":null} | |
I1203 10:31:29.030596 35890 executor.go:157] Executing task "VPC/test.k8s.example.io": *awstasks.VPC {"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}} | |
I1203 10:31:29.031182 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-controller-manager/" | |
I1203 10:31:29.030175 35890 executor.go:157] Executing task "Keypair/kube-scheduler": *fitasks.Keypair {"Name":"kube-scheduler","Lifecycle":"Sync","subject":"cn=system:kube-scheduler","type":"client","alternateNames":null,"alternateNameTasks":null} | |
I1203 10:31:29.031318 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-scheduler/" | |
I1203 10:31:29.032092 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1203 10:31:29.032278 35890 request_logger.go:45] AWS request: ec2/DescribeVpcs | |
I1203 10:31:29.032986 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-proxy/" | |
I1203 10:31:29.032281 35890 request_logger.go:45] AWS request: ec2/DescribeVolumes | |
I1203 10:31:29.030455 35890 executor.go:157] Executing task "DHCPOptions/test.k8s.example.io": *awstasks.DHCPOptions {"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":null,"DomainName":"us-west-2.compute.internal","DomainNameServers":"AmazonProvidedDNS"} | |
I1203 10:31:29.032419 35890 request_logger.go:45] AWS request: ec2/DescribeVolumes | |
I1203 10:31:29.032434 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubecfg/" | |
I1203 10:31:29.033477 35890 request_logger.go:45] AWS request: route53/GetHostedZone | |
I1203 10:31:29.033492 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1203 10:31:29.030207 35890 executor.go:157] Executing task "Secret/system:dns": *fitasks.Secret {"Name":"system:dns","Lifecycle":"Sync"} | |
I1203 10:31:29.030300 35890 executor.go:157] Executing task "Secret/system:scheduler": *fitasks.Secret {"Name":"system:scheduler","Lifecycle":"Sync"} | |
I1203 10:31:29.030413 35890 executor.go:157] Executing task "Secret/kube-proxy": *fitasks.Secret {"Name":"kube-proxy","Lifecycle":"Sync"} | |
I1203 10:31:29.032613 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/master/" | |
I1203 10:31:29.030527 35890 executor.go:157] Executing task "Secret/kube": *fitasks.Secret {"Name":"kube","Lifecycle":"Sync"} | |
I1203 10:31:29.030487 35890 executor.go:157] Executing task "Secret/system:monitoring": *fitasks.Secret {"Name":"system:monitoring","Lifecycle":"Sync"} | |
I1203 10:31:29.033695 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler" | |
I1203 10:31:29.033719 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring" | |
I1203 10:31:29.030178 35890 executor.go:157] Executing task "test.k8s.example.io-addons-core.addons.k8s.io": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-core.addons.k8s.io","Lifecycle":"Sync","Location":"addons/core.addons.k8s.io/v1.4.0.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.033978 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1203 10:31:29.030557 35890 executor.go:157] Executing task "Secret/system:logging": *fitasks.Secret {"Name":"system:logging","Lifecycle":"Sync"} | |
I1203 10:31:29.032566 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubelet/" | |
I1203 10:31:29.034121 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging" | |
I1203 10:31:29.032622 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kops/" | |
I1203 10:31:29.034165 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy" | |
I1203 10:31:29.030371 35890 executor.go:157] Executing task "IAMRole/nodes.test.k8s.example.io": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"} | |
I1203 10:31:29.033456 35890 request_logger.go:45] AWS request: ec2/DescribeDhcpOptions | |
I1203 10:31:29.030355 35890 executor.go:157] Executing task "Secret/system:controller_manager": *fitasks.Secret {"Name":"system:controller_manager","Lifecycle":"Sync"} | |
I1203 10:31:29.030314 35890 executor.go:157] Executing task "Secret/kubelet": *fitasks.Secret {"Name":"kubelet","Lifecycle":"Sync"} | |
I1203 10:31:29.030235 35890 executor.go:157] Executing task "Secret/admin": *fitasks.Secret {"Name":"admin","Lifecycle":"Sync"} | |
I1203 10:31:29.030430 35890 executor.go:157] Executing task "test.k8s.example.io-addons-kube-dns.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-kube-dns.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.030544 35890 executor.go:157] Executing task "test.k8s.example.io-addons-limit-range.addons.k8s.io": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-limit-range.addons.k8s.io","Lifecycle":"Sync","Location":"addons/limit-range.addons.k8s.io/v1.5.0.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.034449 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager" | |
I1203 10:31:29.034458 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:29.030568 35890 executor.go:157] Executing task "test.k8s.example.io-addons-dns-controller.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-dns-controller.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.030289 35890 executor.go:157] Executing task "test.k8s.example.io-addons-bootstrap": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-bootstrap","Lifecycle":"Sync","Location":"addons/bootstrap-channel.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.034575 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:29.030544 35890 executor.go:157] Executing task "IAMRole/masters.test.k8s.example.io": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"masters.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"} | |
I1203 10:31:29.034638 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet" | |
I1203 10:31:29.034738 35890 request_logger.go:45] AWS request: iam/GetRole | |
I1203 10:31:29.034433 35890 request_logger.go:45] AWS request: iam/GetRole | |
I1203 10:31:29.034586 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/bootstrap-channel.yaml" | |
I1203 10:31:29.034473 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1203 10:31:29.034831 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin" | |
I1203 10:31:29.034866 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns" | |
I1203 10:31:29.030319 35890 executor.go:157] Executing task "test.k8s.example.io-addons-dns-controller.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-dns-controller.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.035003 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:29.030173 35890 executor.go:157] Executing task "SSHKey/kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0": *awstasks.SSHKey {"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":null} | |
I1203 10:31:29.030342 35890 executor.go:157] Executing task "test.k8s.example.io-addons-networking.projectcalico.org.canal-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-networking.projectcalico.org.canal-k8s-1.6","Lifecycle":"Sync","Location":"addons/networking.projectcalico.org.canal/k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.035227 35890 sshkey.go:210] Computed SSH key fingerprint as "22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39" | |
I1203 10:31:29.030285 35890 executor.go:157] Executing task "test.k8s.example.io-addons-storage-aws.addons.k8s.io": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-storage-aws.addons.k8s.io","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.6.0.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.035247 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/networking.projectcalico.org.canal/k8s-1.6.yaml" | |
I1203 10:31:29.035275 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1203 10:31:29.030331 35890 executor.go:157] Executing task "test.k8s.example.io-addons-kube-dns.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-kube-dns.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.035413 35890 request_logger.go:45] AWS request: ec2/DescribeKeyPairs | |
I1203 10:31:29.035425 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:29.030225 35890 executor.go:157] Executing task "test.k8s.example.io-addons-networking.projectcalico.org.canal-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-networking.projectcalico.org.canal-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}} | |
I1203 10:31:29.035100 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube" | |
I1203 10:31:29.035517 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" | |
I1203 10:31:29.094600 35890 vpc.go:154] Creating VPC with CIDR: "172.20.0.0/16" | |
I1203 10:31:29.094787 35890 request_logger.go:45] AWS request: ec2/CreateVpc | |
I1203 10:31:29.142056 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-controller-manager: [] | |
I1203 10:31:29.142117 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-controller-manager/" | |
I1203 10:31:29.196176 35890 ebsvolume.go:134] Creating PersistentVolume with Name:"b.etcd-events.test.k8s.example.io" | |
I1203 10:31:29.196449 35890 request_logger.go:45] AWS request: ec2/CreateVolume | |
I1203 10:31:29.217007 35890 dhcp_options.go:133] Creating DHCPOptions with Name:"test.k8s.example.io" | |
I1203 10:31:29.217188 35890 request_logger.go:45] AWS request: ec2/CreateDhcpOptions | |
I1203 10:31:29.225882 35890 sshkey.go:226] Creating SSHKey with Name:"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0" | |
I1203 10:31:29.226101 35890 request_logger.go:45] AWS request: ec2/ImportKeyPair | |
I1203 10:31:29.246240 35890 ebsvolume.go:134] Creating PersistentVolume with Name:"b.etcd-main.test.k8s.example.io" | |
I1203 10:31:29.246542 35890 request_logger.go:45] AWS request: ec2/CreateVolume | |
I1203 10:31:29.265866 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-scheduler: [] | |
I1203 10:31:29.265957 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-scheduler/" | |
I1203 10:31:29.300338 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:29.320867 35890 request_logger.go:45] AWS request: ec2/ModifyVpcAttribute | |
I1203 10:31:29.342912 35890 aws_cloud.go:407] adding tags to "dopt-b55b73d3": map[Name:test.k8s.example.io KubernetesCluster:test.k8s.example.io] | |
I1203 10:31:29.343087 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:29.369862 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-proxy: [] | |
I1203 10:31:29.369945 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-proxy/" | |
I1203 10:31:29.370363 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:29.419944 35890 aws_cloud.go:407] adding tags to "vol-047b542314a60d879": map[Name:b.etcd-events.test.k8s.example.io KubernetesCluster:test.k8s.example.io k8s.io/etcd/events:b/b k8s.io/role/master:1] | |
I1203 10:31:29.420189 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:29.443839 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns" | |
I1203 10:31:29.445696 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy" | |
I1203 10:31:29.449617 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin" | |
I1203 10:31:29.449659 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:29.449690 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=5047 | |
I1203 10:31:29.449754 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1203 10:31:29.449774 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" SSE="AES256" ACL="" BodyLen=458 | |
I1203 10:31:29.449825 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring" | |
I1203 10:31:29.450763 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler" | |
I1203 10:31:29.450852 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:29.450881 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=6392 | |
I1203 10:31:29.456669 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubelet: [] | |
I1203 10:31:29.456700 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubelet/" | |
I1203 10:31:29.471702 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1203 10:31:29.471734 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/limit-range.addons.k8s.io/v1.5.0.yaml" SSE="AES256" ACL="" BodyLen=150 | |
I1203 10:31:29.472737 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kops: [] | |
I1203 10:31:29.472780 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kops/" | |
I1203 10:31:29.473887 35890 request_logger.go:45] AWS request: ec2/ModifyVpcAttribute | |
I1203 10:31:29.487709 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/master: [] | |
I1203 10:31:29.487742 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/master/" | |
I1203 10:31:29.503823 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:29.510292 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg: [] | |
I1203 10:31:29.510336 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubecfg/" | |
I1203 10:31:29.516978 35890 iaminstanceprofile.go:107] Creating IAMInstanceProfile with Name:"masters.test.k8s.example.io" | |
I1203 10:31:29.517132 35890 request_logger.go:45] AWS request: iam/CreateInstanceProfile | |
I1203 10:31:29.520585 35890 iamrole.go:143] Creating IAMRole with Name:"nodes.test.k8s.example.io" | |
I1203 10:31:29.520757 35890 request_logger.go:45] AWS request: iam/CreateRole | |
I1203 10:31:29.524714 35890 iamrole.go:143] Creating IAMRole with Name:"masters.test.k8s.example.io" | |
I1203 10:31:29.524795 35890 request_logger.go:45] AWS request: iam/CreateRole | |
I1203 10:31:29.529110 35890 iaminstanceprofile.go:107] Creating IAMInstanceProfile with Name:"nodes.test.k8s.example.io" | |
I1203 10:31:29.529183 35890 request_logger.go:45] AWS request: iam/CreateInstanceProfile | |
I1203 10:31:29.540771 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging" | |
I1203 10:31:29.543331 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/bootstrap-channel.yaml" | |
I1203 10:31:29.543378 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/bootstrap-channel.yaml" SSE="AES256" ACL="" BodyLen=1887 | |
I1203 10:31:29.544632 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1203 10:31:29.544667 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=1078 | |
I1203 10:31:29.546228 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet" | |
I1203 10:31:29.547566 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1203 10:31:29.547603 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=2136 | |
I1203 10:31:29.547924 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager" | |
I1203 10:31:29.549321 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/networking.projectcalico.org.canal/k8s-1.6.yaml" | |
I1203 10:31:29.549351 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/networking.projectcalico.org.canal/k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=6165 | |
I1203 10:31:29.551054 35890 aws_cloud.go:407] adding tags to "vol-02fab5cd2d1effbf3": map[KubernetesCluster:test.k8s.example.io k8s.io/etcd/main:b/b k8s.io/role/master:1 Name:b.etcd-main.test.k8s.example.io] | |
I1203 10:31:29.551228 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:29.556877 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube" | |
I1203 10:31:29.575024 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" | |
I1203 10:31:29.575058 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=4363 | |
I1203 10:31:29.575383 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1203 10:31:29.575411 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/core.addons.k8s.io/v1.4.0.yaml" SSE="AES256" ACL="" BodyLen=61 | |
I1203 10:31:29.629249 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-scheduler: [] | |
I1203 10:31:29.629391 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns" | |
I1203 10:31:29.629489 35890 keypair.go:169] Creating PKI keypair "kube-scheduler" | |
I1203 10:31:29.629496 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:29.629532 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-scheduler/" | |
I1203 10:31:29.636422 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1203 10:31:29.649002 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1203 10:31:29.662038 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubelet: [] | |
I1203 10:31:29.662208 35890 keypair.go:169] Creating PKI keypair "kubelet" | |
I1203 10:31:29.662255 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubelet/" | |
I1203 10:31:29.675895 35890 aws_cloud.go:407] adding tags to "vpc-94435af2": map[KubernetesCluster:test.k8s.example.io Name:test.k8s.example.io kubernetes.io/cluster/test.k8s.example.io:owned] | |
I1203 10:31:29.676075 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:29.708473 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kops: [] | |
I1203 10:31:29.708666 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/master: [] | |
I1203 10:31:29.708706 35890 keypair.go:169] Creating PKI keypair "kops" | |
I1203 10:31:29.708756 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kops/" | |
I1203 10:31:29.708791 35890 keypair.go:169] Creating PKI keypair "master" | |
I1203 10:31:29.708820 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/master/" | |
I1203 10:31:29.739118 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg: [] | |
I1203 10:31:29.739285 35890 keypair.go:169] Creating PKI keypair "kubecfg" | |
I1203 10:31:29.739321 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubecfg/" | |
I1203 10:31:29.745948 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-controller-manager: [] | |
I1203 10:31:29.746088 35890 keypair.go:169] Creating PKI keypair "kube-controller-manager" | |
I1203 10:31:29.746114 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-controller-manager/" | |
I1203 10:31:29.750816 35890 iaminstanceprofile.go:137] Found IAM instance profile "masters.test.k8s.example.io" | |
I1203 10:31:29.780042 35890 iaminstanceprofile.go:137] Found IAM instance profile "nodes.test.k8s.example.io" | |
I1203 10:31:29.810445 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns" | |
I1203 10:31:29.810485 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:dns" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:29.855930 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-scheduler: [] | |
I1203 10:31:29.855984 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-scheduler/" | |
I1203 10:31:29.880237 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/master: [] | |
I1203 10:31:29.880269 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/master/" | |
I1203 10:31:29.882368 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubelet: [] | |
I1203 10:31:29.882395 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubelet/" | |
I1203 10:31:29.885534 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-controller-manager: [] | |
I1203 10:31:29.885555 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-controller-manager/" | |
I1203 10:31:29.910261 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kops: [] | |
I1203 10:31:29.910303 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kops/" | |
I1203 10:31:29.912015 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg: [] | |
I1203 10:31:29.912055 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubecfg/" | |
I1203 10:31:29.942381 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns" | |
I1203 10:31:29.942431 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy" | |
I1203 10:31:29.970377 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-scheduler: [] | |
I1203 10:31:30.015380 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubelet: [] | |
I1203 10:31:30.015406 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/master: [] | |
I1203 10:31:30.015967 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kops: [] | |
I1203 10:31:30.018434 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg: [] | |
I1203 10:31:30.033982 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-controller-manager: [] | |
I1203 10:31:30.049434 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy" | |
I1203 10:31:30.049460 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/kube-proxy" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:30.149982 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-proxy: [] | |
I1203 10:31:30.150076 35890 keypair.go:169] Creating PKI keypair "kube-proxy" | |
I1203 10:31:30.150093 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-proxy/" | |
I1203 10:31:30.170298 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy" | |
I1203 10:31:30.170614 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring" | |
I1203 10:31:30.218728 35890 vfs_castore.go:422] Issuing new certificate: "kops" | |
I1203 10:31:30.218789 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/ca/" | |
I1203 10:31:30.250745 35890 vfs_castore.go:422] Issuing new certificate: "master" | |
I1203 10:31:30.306540 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring" | |
I1203 10:31:30.306574 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:monitoring" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:30.322187 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-proxy: [] | |
I1203 10:31:30.322234 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-proxy/" | |
I1203 10:31:30.397907 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca: [] | |
I1203 10:31:30.424763 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring" | |
I1203 10:31:30.424779 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler" | |
I1203 10:31:30.429982 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-proxy: [] | |
I1203 10:31:30.512627 35890 vfs_castore.go:422] Issuing new certificate: "kube-controller-manager" | |
I1203 10:31:30.596734 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler" | |
I1203 10:31:30.596767 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:scheduler" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:30.634791 35890 vfs_castore.go:422] Issuing new certificate: "kubecfg" | |
I1203 10:31:30.705282 35890 vfs_castore.go:422] Issuing new certificate: "kube-scheduler" | |
I1203 10:31:30.709580 35890 vfs_castore.go:422] Issuing new certificate: "kubelet" | |
I1203 10:31:30.729207 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler" | |
I1203 10:31:30.729241 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin" | |
I1203 10:31:30.832537 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin" | |
I1203 10:31:30.832561 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/admin" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:30.938759 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin" | |
I1203 10:31:30.938788 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging" | |
I1203 10:31:30.944808 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key" | |
I1203 10:31:30.944839 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key" SSE="AES256" ACL="" BodyLen=1679 | |
I1203 10:31:31.039490 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging" | |
I1203 10:31:31.039519 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:logging" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:31.045049 35890 vfs_castore.go:422] Issuing new certificate: "kube-proxy" | |
I1203 10:31:31.147855 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/ca/" | |
I1203 10:31:31.163295 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging" | |
I1203 10:31:31.163328 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet" | |
I1203 10:31:31.266813 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key] | |
I1203 10:31:31.266853 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key" | |
I1203 10:31:31.356128 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet" | |
I1203 10:31:31.356168 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/kubelet" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:31.370285 35890 ca.go:395] Parsing pem block: "RSA PRIVATE KEY" | |
I1203 10:31:31.370722 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt" | |
I1203 10:31:31.370741 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt" SSE="AES256" ACL="" BodyLen=1046 | |
I1203 10:31:31.466102 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet" | |
I1203 10:31:31.466123 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager" | |
I1203 10:31:31.474940 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/ca/" | |
I1203 10:31:31.584263 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt] | |
I1203 10:31:31.584299 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt" | |
I1203 10:31:31.584762 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager" | |
I1203 10:31:31.584793 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:controller_manager" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:31.685978 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:31.691089 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-controller-manager/6495390240644720569490410739.key" | |
I1203 10:31:31.691119 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kube-controller-manager/6495390240644720569490410739.key" SSE="AES256" ACL="" BodyLen=1675 | |
I1203 10:31:31.693242 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/master/6495390239520972701276977581.key" | |
I1203 10:31:31.693269 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/master/6495390239520972701276977581.key" SSE="AES256" ACL="" BodyLen=1679 | |
I1203 10:31:31.693412 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg/6495390241170448363893406246.key" | |
I1203 10:31:31.693429 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubelet/6495390241491692548329293100.key" | |
I1203 10:31:31.693454 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kubelet/6495390241491692548329293100.key" SSE="AES256" ACL="" BodyLen=1679 | |
I1203 10:31:31.693435 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kubecfg/6495390241170448363893406246.key" SSE="AES256" ACL="" BodyLen=1675 | |
I1203 10:31:31.693757 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kops/6495390239383399988241973783.key" | |
I1203 10:31:31.693777 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kops/6495390239383399988241973783.key" SSE="AES256" ACL="" BodyLen=1679 | |
I1203 10:31:31.694313 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-proxy/6495390242932509451645604935.key" | |
I1203 10:31:31.694338 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kube-proxy/6495390242932509451645604935.key" SSE="AES256" ACL="" BodyLen=1675 | |
I1203 10:31:31.694337 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-scheduler/6495390241473216285367084156.key" | |
I1203 10:31:31.694359 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kube-scheduler/6495390241473216285367084156.key" SSE="AES256" ACL="" BodyLen=1679 | |
I1203 10:31:31.800772 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/master/6495390239520972701276977581.crt" | |
I1203 10:31:31.800810 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/master/6495390239520972701276977581.crt" SSE="AES256" ACL="" BodyLen=1334 | |
I1203 10:31:31.824536 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-controller-manager/6495390240644720569490410739.crt" | |
I1203 10:31:31.824567 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kube-controller-manager/6495390240644720569490410739.crt" SSE="AES256" ACL="" BodyLen=1090 | |
I1203 10:31:31.909744 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubelet/6495390241491692548329293100.crt" | |
I1203 10:31:31.909783 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kubelet/6495390241491692548329293100.crt" SSE="AES256" ACL="" BodyLen=1090 | |
I1203 10:31:31.966292 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt" | |
I1203 10:31:31.966330 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt" SSE="AES256" ACL="" BodyLen=1094 | |
I1203 10:31:32.032001 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager" | |
I1203 10:31:32.032022 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube" | |
I1203 10:31:32.032021 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kops/6495390239383399988241973783.crt" | |
I1203 10:31:32.032154 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kops/6495390239383399988241973783.crt" SSE="AES256" ACL="" BodyLen=1090 | |
I1203 10:31:32.082103 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-scheduler/6495390241473216285367084156.crt" | |
I1203 10:31:32.082125 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kube-scheduler/6495390241473216285367084156.crt" SSE="AES256" ACL="" BodyLen=1078 | |
I1203 10:31:32.092038 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-proxy/6495390242932509451645604935.crt" | |
I1203 10:31:32.092070 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kube-proxy/6495390242932509451645604935.crt" SSE="AES256" ACL="" BodyLen=1074 | |
I1203 10:31:32.092952 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/master/6495390239520972701276977581.crt" | |
I1203 10:31:32.109714 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-controller-manager/6495390240644720569490410739.crt" | |
I1203 10:31:32.167474 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt" | |
I1203 10:31:32.169244 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubelet/6495390241491692548329293100.crt" | |
I1203 10:31:32.190857 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube" | |
I1203 10:31:32.190892 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/kube" SSE="AES256" ACL="" BodyLen=55 | |
I1203 10:31:32.203591 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kops/6495390239383399988241973783.crt" | |
I1203 10:31:32.236773 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-proxy/6495390242932509451645604935.crt" | |
I1203 10:31:32.269291 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:32.269460 35890 keypair.go:191] created certificate &{{[] [] [] [] [] [] [] kubernetes-master [{2.5.4.3 kubernetes-master}] []} false 0xc421054500 0xc420bc98d0} | |
I1203 10:31:32.271897 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:32.272042 35890 keypair.go:191] created certificate &{{[] [] [] [] [] [] [] system:kube-controller-manager [{2.5.4.3 system:kube-controller-manager}] []} false 0xc4214c1900 0xc4210c8910} | |
I1203 10:31:32.288240 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-scheduler/6495390241473216285367084156.crt" | |
I1203 10:31:32.289408 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:32.289555 35890 keypair.go:191] created certificate &{{[] [system:masters] [] [] [] [] [] kubecfg [{2.5.4.10 system:masters} {2.5.4.3 kubecfg}] []} false 0xc421004000 0xc4210c8e80} | |
I1203 10:31:32.295978 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:32.296138 35890 keypair.go:191] created certificate &{{[] [system:nodes] [] [] [] [] [] kubelet [{2.5.4.10 system:nodes} {2.5.4.3 kubelet}] []} false 0xc4211c8500 0xc420caefd0} | |
I1203 10:31:32.300553 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube" | |
I1203 10:31:32.309214 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:32.309364 35890 keypair.go:191] created certificate &{{[] [system:masters] [] [] [] [] [] kops [{2.5.4.10 system:masters} {2.5.4.3 kops}] []} false 0xc421004f00 0xc420cb0680} | |
I1203 10:31:32.339543 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:32.339692 35890 keypair.go:191] created certificate &{{[] [] [] [] [] [] [] system:kube-proxy [{2.5.4.3 system:kube-proxy}] []} false 0xc421005400 0xc420cb0a20} | |
I1203 10:31:32.412695 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:32.412807 35890 keypair.go:191] created certificate &{{[] [] [] [] [] [] [] system:kube-scheduler [{2.5.4.3 system:kube-scheduler}] []} false 0xc42121c000 0xc42020b6d0} | |
I1203 10:31:32.412857 35890 executor.go:91] Tasks: 36 done / 65 total; 12 can run | |
I1203 10:31:32.412894 35890 executor.go:157] Executing task "VPCDHCPOptionsAssociation/test.k8s.example.io": *awstasks.VPCDHCPOptionsAssociation {"Name":"test.k8s.example.io","Lifecycle":"Sync","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"DHCPOptions":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"dopt-b55b73d3","DomainName":"us-west-2.compute.internal","DomainNameServers":"AmazonProvidedDNS"}} | |
I1203 10:31:32.412992 35890 executor.go:157] Executing task "IAMRolePolicy/additional.nodes.test.k8s.example.io": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.nodes.test.k8s.example.io","Role":{"ID":"AROAIFNA4X2WHNFBXGKPS","Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Name":"","Resource":""}} | |
I1203 10:31:32.413012 35890 executor.go:157] Executing task "IAMRolePolicy/additional.masters.test.k8s.example.io": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.masters.test.k8s.example.io","Role":{"ID":"AROAJ6VV455WIHSQMC3F4","Lifecycle":"Sync","Name":"masters.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Name":"","Resource":""}} | |
I1203 10:31:32.413157 35890 aws_cloud.go:556] Calling DescribeVPC for VPC "vpc-94435af2" | |
I1203 10:31:32.412937 35890 executor.go:157] Executing task "InternetGateway/test.k8s.example.io": *awstasks.InternetGateway {"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":null,"VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"Shared":false} | |
I1203 10:31:32.412901 35890 executor.go:157] Executing task "IAMInstanceProfileRole/masters.test.k8s.example.io": *awstasks.IAMInstanceProfileRole {"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","InstanceProfile":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJHOL6F7GKSEPBF634"},"Role":{"ID":"AROAJ6VV455WIHSQMC3F4","Lifecycle":"Sync","Name":"masters.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}} | |
I1203 10:31:32.412950 35890 executor.go:157] Executing task "SecurityGroup/masters.test.k8s.example.io": *awstasks.SecurityGroup {"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null} | |
I1203 10:31:32.413312 35890 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1203 10:31:32.413366 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1203 10:31:32.412970 35890 executor.go:157] Executing task "SecurityGroup/nodes.test.k8s.example.io": *awstasks.SecurityGroup {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null} | |
I1203 10:31:32.413313 35890 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1203 10:31:32.413537 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:32.412987 35890 executor.go:157] Executing task "RouteTable/test.k8s.example.io": *awstasks.RouteTable {"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":null,"VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}} | |
I1203 10:31:32.413399 35890 request_logger.go:45] AWS request: ec2/DescribeInternetGateways | |
I1203 10:31:32.412911 35890 executor.go:157] Executing task "IAMRolePolicy/nodes.test.k8s.example.io": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","Role":{"ID":"AROAIFNA4X2WHNFBXGKPS","Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"test.k8s.example.io","creationTimestamp":"2017-12-03T18:31:25Z"},"spec":{"channel":"stable","configBase":"s3://clusters.k8s.example.io/test.k8s.example.io","cloudProvider":"aws","kubernetesVersion":"1.7.10","subnets":[{"name":"us-west-2b","zone":"us-west-2b","cidr":"172.20.32.0/19","type":"Public"}],"masterPublicName":"api.test.k8s.example.io","masterInternalName":"api.internal.test.k8s.example.io","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://clusters.k8s.example.io/test.k8s.example.io/secrets","keyStore":"s3://clusters.k8s.example.io/test.k8s.example.io/pki","configStore":"s3://clusters.k8s.example.io/test.k8s.example.io","dnsZone":"Z3STZN85S7ZJGL","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","etcdMembers":[{"name":"b","instanceGroup":"master-us-west-2b"}]},{"name":"events","etcdMembers":[{"name":"b","instanceGroup":"master-us-west-2b"}]}],"docker":{"bridge":"","logLevel":"warn","ipTables":false,"ipMasq":false,"logDriver":"json-file","logOpt":["max-size=10m","max-file=5"],"storage":"overlay,aufs","version":"1.12.6"},"kubeDNS":{"image":"gcr.io/google_containers/kubedns-amd64:1.3","replicas":2,"domain":"cluster.local","serverIP":"100.64.0.10"},"kubeAPIServer":{"image":"gcr.io/google_containers/kube-apiserver:v1.7.10","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"address":"127.0.0.1","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"admissionControl":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd2","authorizationMode":"AlwaysAllow"},"kubeControllerManager":{"logLevel":2,"image":"gcr.io/google_containers/kube-controller-manager:v1.7.10","cloudProvider":"aws","clusterName":"test.k8s.example.io","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"gcr.io/google_containers/kube-scheduler:v1.7.10","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"gcr.io/google_containers/kube-proxy:v1.7.10","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"kubeconfigPath":"/var/lib/kubelet/kubeconfig","requireKubeconfig":true,"logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"masterKubelet":{"kubeconfigPath":"/var/lib/kubelet/kubeconfig","requireKubeconfig":true,"logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"networking":{"canal":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}}}},"Role":"Node","Region":"us-west-2","HostedZoneID":""},"DNSZone":{"Name":"Z3STZN85S7ZJGL","Lifecycle":"Sync","DNSName":"k8s.example.io","ZoneID":"Z3STZN85S7ZJGL","Private":null,"PrivateVPC":null}}} | |
I1203 10:31:32.413301 35890 request_logger.go:45] AWS request: ec2/DescribeVpcs | |
I1203 10:31:32.412946 35890 executor.go:157] Executing task "IAMInstanceProfileRole/nodes.test.k8s.example.io": *awstasks.IAMInstanceProfileRole {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","InstanceProfile":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJLWAGCDBPKNVBVYTY"},"Role":{"ID":"AROAIFNA4X2WHNFBXGKPS","Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}} | |
I1203 10:31:32.413029 35890 executor.go:157] Executing task "Subnet/us-west-2b.test.k8s.example.io": *awstasks.Subnet {"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":null,"VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"AvailabilityZone":"us-west-2b","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"us-west-2b.test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}} | |
I1203 10:31:32.414016 35890 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1203 10:31:32.413645 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:32.412923 35890 executor.go:157] Executing task "IAMRolePolicy/masters.test.k8s.example.io": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"masters.test.k8s.example.io","Role":{"ID":"AROAJ6VV455WIHSQMC3F4","Lifecycle":"Sync","Name":"masters.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"test.k8s.example.io","creationTimestamp":"2017-12-03T18:31:25Z"},"spec":{"channel":"stable","configBase":"s3://clusters.k8s.example.io/test.k8s.example.io","cloudProvider":"aws","kubernetesVersion":"1.7.10","subnets":[{"name":"us-west-2b","zone":"us-west-2b","cidr":"172.20.32.0/19","type":"Public"}],"masterPublicName":"api.test.k8s.example.io","masterInternalName":"api.internal.test.k8s.example.io","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://clusters.k8s.example.io/test.k8s.example.io/secrets","keyStore":"s3://clusters.k8s.example.io/test.k8s.example.io/pki","configStore":"s3://clusters.k8s.example.io/test.k8s.example.io","dnsZone":"Z3STZN85S7ZJGL","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","etcdMembers":[{"name":"b","instanceGroup":"master-us-west-2b"}]},{"name":"events","etcdMembers":[{"name":"b","instanceGroup":"master-us-west-2b"}]}],"docker":{"bridge":"","logLevel":"warn","ipTables":false,"ipMasq":false,"logDriver":"json-file","logOpt":["max-size=10m","max-file=5"],"storage":"overlay,aufs","version":"1.12.6"},"kubeDNS":{"image":"gcr.io/google_containers/kubedns-amd64:1.3","replicas":2,"domain":"cluster.local","serverIP":"100.64.0.10"},"kubeAPIServer":{"image":"gcr.io/google_containers/kube-apiserver:v1.7.10","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"address":"127.0.0.1","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"admissionControl":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd2","authorizationMode":"AlwaysAllow"},"kubeControllerManager":{"logLevel":2,"image":"gcr.io/google_containers/kube-controller-manager:v1.7.10","cloudProvider":"aws","clusterName":"test.k8s.example.io","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"gcr.io/google_containers/kube-scheduler:v1.7.10","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"gcr.io/google_containers/kube-proxy:v1.7.10","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"kubeconfigPath":"/var/lib/kubelet/kubeconfig","requireKubeconfig":true,"logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"masterKubelet":{"kubeconfigPath":"/var/lib/kubelet/kubeconfig","requireKubeconfig":true,"logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"networking":{"canal":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}}}},"Role":"Master","Region":"us-west-2","HostedZoneID":""},"DNSZone":{"Name":"Z3STZN85S7ZJGL","Lifecycle":"Sync","DNSName":"k8s.example.io","ZoneID":"Z3STZN85S7ZJGL","Private":null,"PrivateVPC":null}}} | |
I1203 10:31:32.413731 35890 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1203 10:31:32.414084 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1203 10:31:32.414150 35890 request_logger.go:45] AWS request: ec2/DescribeSubnets | |
I1203 10:31:32.414458 35890 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1203 10:31:32.474820 35890 internetgateway.go:137] Creating InternetGateway | |
I1203 10:31:32.475077 35890 request_logger.go:45] AWS request: ec2/CreateInternetGateway | |
I1203 10:31:32.528819 35890 request_logger.go:45] AWS request: iam/AddRoleToInstanceProfile | |
I1203 10:31:32.543810 35890 securitygroup.go:167] Creating SecurityGroup with Name:"masters.test.k8s.example.io" VPC:"vpc-94435af2" | |
I1203 10:31:32.543977 35890 request_logger.go:45] AWS request: ec2/CreateSecurityGroup | |
I1203 10:31:32.548327 35890 securitygroup.go:167] Creating SecurityGroup with Name:"nodes.test.k8s.example.io" VPC:"vpc-94435af2" | |
I1203 10:31:32.548436 35890 request_logger.go:45] AWS request: ec2/CreateSecurityGroup | |
I1203 10:31:32.576550 35890 changes.go:80] Field changed "DHCPOptions" actual="{<nil> <nil> 0xc420aea928 <nil> <nil>}" expected="{0xc4211d1c80 0xc42040ac90 0xc420531ca8 0xc4211d1ca0 0xc4211d1c90}" | |
I1203 10:31:32.576679 35890 vpc_dhcpoptions_association.go:89] calling EC2 AssociateDhcpOptions | |
I1203 10:31:32.576826 35890 request_logger.go:45] AWS request: ec2/AssociateDhcpOptions | |
I1203 10:31:32.598827 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:32.600743 35890 routetable.go:119] Creating RouteTable with VPC: "vpc-94435af2" | |
I1203 10:31:32.600973 35890 request_logger.go:45] AWS request: ec2/CreateRouteTable | |
I1203 10:31:32.602626 35890 subnet.go:167] Creating Subnet with CIDR: "172.20.32.0/19" | |
I1203 10:31:32.603219 35890 request_logger.go:45] AWS request: ec2/CreateSubnet | |
I1203 10:31:32.609190 35890 internetgateway.go:150] Creating InternetGatewayAttachment | |
I1203 10:31:32.609284 35890 request_logger.go:45] AWS request: ec2/AttachInternetGateway | |
I1203 10:31:32.645977 35890 aws_cloud.go:407] adding tags to "sg-615f8d1d": map[Name:masters.test.k8s.example.io KubernetesCluster:test.k8s.example.io] | |
I1203 10:31:32.646317 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:32.661790 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/pki/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.661825 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.661838 35890 iam_builder.go:221] Found root location "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.662193 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/pki/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.662212 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.662223 35890 iam_builder.go:221] Found root location "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.662316 35890 iamrolepolicy.go:146] Creating IAMRolePolicy | |
I1203 10:31:32.662335 35890 iamrolepolicy.go:174] PutRolePolicy RoleName=nodes.test.k8s.example.io PolicyName=nodes.test.k8s.example.io: { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ec2:Describe*" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ecr:GetAuthorizationToken", | |
"ecr:BatchCheckLayerAvailability", | |
"ecr:GetDownloadUrlForLayer", | |
"ecr:GetRepositoryPolicy", | |
"ecr:DescribeRepositories", | |
"ecr:ListImages", | |
"ecr:BatchGetImage" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:ChangeResourceRecordSets", | |
"route53:ListResourceRecordSets", | |
"route53:GetHostedZone" | |
], | |
"Resource": [ | |
"arn:aws:route53:::hostedzone/Z3STZN85S7ZJGL" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:GetChange" | |
], | |
"Resource": [ | |
"arn:aws:route53:::change/*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:ListHostedZones" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:*" | |
], | |
"Resource": [ | |
"arn:aws:s3:::clusters.k8s.example.io/test.k8s.example.io", | |
"arn:aws:s3:::clusters.k8s.example.io/test.k8s.example.io/*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:GetBucketLocation", | |
"s3:ListBucket" | |
], | |
"Resource": [ | |
"arn:aws:s3:::clusters.k8s.example.io" | |
] | |
} | |
] | |
} | |
I1203 10:31:32.662609 35890 request_logger.go:45] AWS request: iam/PutRolePolicy | |
I1203 10:31:32.677575 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:32.699654 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:32.721544 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:32.747348 35890 aws_cloud.go:407] adding tags to "igw-87a144e1": map[Name:test.k8s.example.io KubernetesCluster:test.k8s.example.io] | |
I1203 10:31:32.747554 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:32.764346 35890 aws_cloud.go:407] adding tags to "sg-e45d8f98": map[KubernetesCluster:test.k8s.example.io Name:nodes.test.k8s.example.io] | |
I1203 10:31:32.764530 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:32.782282 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/pki/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.782319 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.782335 35890 iam_builder.go:221] Found root location "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.782457 35890 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1203 10:31:32.782488 35890 request_logger.go:45] AWS request: iam/AddRoleToInstanceProfile | |
I1203 10:31:32.782520 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/pki/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.782539 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.782556 35890 iam_builder.go:221] Found root location "s3://clusters.k8s.example.io/test.k8s.example.io/" | |
I1203 10:31:32.782707 35890 iamrolepolicy.go:146] Creating IAMRolePolicy | |
I1203 10:31:32.782727 35890 iamrolepolicy.go:174] PutRolePolicy RoleName=masters.test.k8s.example.io PolicyName=masters.test.k8s.example.io: { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ecr:GetAuthorizationToken", | |
"ecr:BatchCheckLayerAvailability", | |
"ecr:GetDownloadUrlForLayer", | |
"ecr:GetRepositoryPolicy", | |
"ecr:DescribeRepositories", | |
"ecr:ListImages", | |
"ecr:BatchGetImage" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ec2:*" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"elasticloadbalancing:*" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"autoscaling:DescribeAutoScalingGroups", | |
"autoscaling:DescribeAutoScalingInstances", | |
"autoscaling:SetDesiredCapacity", | |
"autoscaling:TerminateInstanceInAutoScalingGroup" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:ChangeResourceRecordSets", | |
"route53:ListResourceRecordSets", | |
"route53:GetHostedZone" | |
], | |
"Resource": [ | |
"arn:aws:route53:::hostedzone/Z3STZN85S7ZJGL" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:GetChange" | |
], | |
"Resource": [ | |
"arn:aws:route53:::change/*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:ListHostedZones" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:*" | |
], | |
"Resource": [ | |
"arn:aws:s3:::clusters.k8s.example.io/test.k8s.example.io", | |
"arn:aws:s3:::clusters.k8s.example.io/test.k8s.example.io/*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:GetBucketLocation", | |
"s3:ListBucket" | |
], | |
"Resource": [ | |
"arn:aws:s3:::clusters.k8s.example.io" | |
] | |
} | |
] | |
} | |
I1203 10:31:32.783027 35890 request_logger.go:45] AWS request: iam/PutRolePolicy | |
I1203 10:31:32.818907 35890 aws_cloud.go:407] adding tags to "subnet-924206da": map[Name:us-west-2b.test.k8s.example.io kubernetes.io/cluster/test.k8s.example.io:owned KubernetesCluster:test.k8s.example.io] | |
I1203 10:31:32.819121 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:32.835672 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.059918 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.071323 35890 aws_cloud.go:407] adding tags to "rtb-2b042052": map[KubernetesCluster:test.k8s.example.io Name:test.k8s.example.io] | |
I1203 10:31:33.071484 35890 request_logger.go:45] AWS request: ec2/CreateTags | |
I1203 10:31:33.702023 35890 executor.go:91] Tasks: 48 done / 65 total; 15 can run | |
I1203 10:31:33.702081 35890 executor.go:157] Executing task "SecurityGroupRule/node-egress": *awstasks.SecurityGroupRule {"Name":"node-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true} | |
I1203 10:31:33.702235 35890 executor.go:157] Executing task "SecurityGroupRule/master-egress": *awstasks.SecurityGroupRule {"Name":"master-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true} | |
I1203 10:31:33.702187 35890 executor.go:157] Executing task "SecurityGroupRule/all-master-to-master": *awstasks.SecurityGroupRule {"Name":"all-master-to-master","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"Egress":null} | |
I1203 10:31:33.702379 35890 executor.go:157] Executing task "SecurityGroupRule/all-master-to-node": *awstasks.SecurityGroupRule {"Name":"all-master-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"Egress":null} | |
I1203 10:31:33.702756 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.702144 35890 executor.go:157] Executing task "SecurityGroupRule/ssh-external-to-node-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-node-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null} | |
I1203 10:31:33.702263 35890 executor.go:157] Executing task "SecurityGroupRule/node-to-master-udp-1-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-udp-1-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":null,"Protocol":"udp","FromPort":1,"ToPort":65535,"SourceGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"Egress":null} | |
I1203 10:31:33.702173 35890 executor.go:157] Executing task "RouteTableAssociation/us-west-2b.test.k8s.example.io": *awstasks.RouteTableAssociation {"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":null,"RouteTable":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"rtb-2b042052","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}},"Subnet":{"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":"subnet-924206da","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"AvailabilityZone":"us-west-2b","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"us-west-2b.test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}} | |
I1203 10:31:33.702163 35890 executor.go:157] Executing task "SecurityGroupRule/ssh-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null} | |
I1203 10:31:33.702118 35890 executor.go:157] Executing task "SecurityGroupRule/all-node-to-node": *awstasks.SecurityGroupRule {"Name":"all-node-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"Egress":null} | |
I1203 10:31:33.702133 35890 executor.go:157] Executing task "SecurityGroupRule/node-to-master-tcp-1-4000": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-1-4000","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":null,"Protocol":"tcp","FromPort":1,"ToPort":4000,"SourceGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"Egress":null} | |
I1203 10:31:33.703223 35890 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1203 10:31:33.702174 35890 executor.go:157] Executing task "SecurityGroupRule/https-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"https-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":443,"ToPort":443,"SourceGroup":null,"Egress":null} | |
I1203 10:31:33.703294 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.702160 35890 executor.go:157] Executing task "LaunchConfiguration/nodes.test.k8s.example.io": *awstasks.LaunchConfiguration {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","UserData":{"Name":"","Resource":{}},"ImageID":"kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28","InstanceType":"t2.medium","SSHKey":{"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":"22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"},"SecurityGroups":[{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null}],"AssociatePublicIP":true,"IAMInstanceProfile":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJLWAGCDBPKNVBVYTY"},"RootVolumeSize":128,"RootVolumeType":"gp2","RootVolumeOptimization":null,"SpotPrice":"","ID":null,"Tenancy":null} | |
I1203 10:31:33.702211 35890 executor.go:157] Executing task "SecurityGroupRule/node-to-master-tcp-4003-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-4003-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":null,"Protocol":"tcp","FromPort":4003,"ToPort":65535,"SourceGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"Egress":null} | |
I1203 10:31:33.702575 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.702622 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.702198 35890 executor.go:157] Executing task "LaunchConfiguration/master-us-west-2b.masters.test.k8s.example.io": *awstasks.LaunchConfiguration {"Name":"master-us-west-2b.masters.test.k8s.example.io","Lifecycle":"Sync","UserData":{"Name":"","Resource":{}},"ImageID":"kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28","InstanceType":"m3.medium","SSHKey":{"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":"22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"},"SecurityGroups":[{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null}],"AssociatePublicIP":true,"IAMInstanceProfile":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJHOL6F7GKSEPBF634"},"RootVolumeSize":64,"RootVolumeType":"gp2","RootVolumeOptimization":null,"SpotPrice":"","ID":null,"Tenancy":null} | |
I1203 10:31:33.702224 35890 executor.go:157] Executing task "Route/0.0.0.0/0": *awstasks.Route {"Name":"0.0.0.0/0","Lifecycle":"Sync","RouteTable":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"rtb-2b042052","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}},"Instance":null,"CIDR":"0.0.0.0/0","InternetGateway":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"igw-87a144e1","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"Shared":false},"NatGateway":null} | |
I1203 10:31:33.702882 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.703005 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.704005 35890 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1203 10:31:33.703087 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.703176 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.703362 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.704127 35890 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1203 10:31:33.703417 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.703777 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1203 10:31:33.703899 35890 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1203 10:31:33.805673 35890 securitygrouprule.go:277] all-master-to-master: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-615f8d1d) | |
I1203 10:31:33.805788 35890 routetableassociation.go:149] Checking for existing RouteTableAssociation to subnet | |
I1203 10:31:33.805872 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:33.805911 35890 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1203 10:31:33.846517 35890 route.go:174] Creating Route with RouteTable:"rtb-2b042052" CIDR:"0.0.0.0/0" | |
I1203 10:31:33.847019 35890 request_logger.go:45] AWS request: ec2/CreateRoute | |
I1203 10:31:33.848782 35890 securitygrouprule.go:277] ssh-external-to-master-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=22 toPort=22 cidr=0.0.0.0/0) | |
I1203 10:31:33.849198 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:33.856825 35890 securitygrouprule.go:277] node-to-master-tcp-4003-65535: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=4003 toPort=65535 sourceGroup=sg-e45d8f98) | |
I1203 10:31:33.856949 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:33.860371 35890 securitygrouprule.go:277] ssh-external-to-node-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=22 toPort=22 cidr=0.0.0.0/0) | |
I1203 10:31:33.860510 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:33.861741 35890 securitygrouprule.go:277] all-node-to-node: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-e45d8f98) | |
I1203 10:31:33.861848 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:33.874520 35890 securitygrouprule.go:277] all-master-to-node: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-615f8d1d) | |
I1203 10:31:33.874581 35890 securitygrouprule.go:277] node-to-master-udp-1-65535: Calling EC2 AuthorizeSecurityGroupIngress (protocol=udp fromPort=1 toPort=65535 sourceGroup=sg-e45d8f98) | |
I1203 10:31:33.874657 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:33.874679 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:33.905350 35890 securitygrouprule.go:277] node-to-master-tcp-1-4000: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=1 toPort=4000 sourceGroup=sg-e45d8f98) | |
I1203 10:31:33.905623 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:33.907201 35890 routetableassociation.go:172] Creating RouteTableAssociation | |
I1203 10:31:33.907415 35890 request_logger.go:45] AWS request: ec2/AssociateRouteTable | |
I1203 10:31:33.907455 35890 securitygrouprule.go:277] https-external-to-master-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=443 toPort=443 cidr=0.0.0.0/0) | |
I1203 10:31:33.907670 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1203 10:31:34.885841 35890 launchconfiguration.go:241] Creating AutoscalingLaunchConfiguration with Name:"master-us-west-2b.masters.test.k8s.example.io-20171203183134" | |
I1203 10:31:34.885876 35890 aws_cloud.go:587] Calling DescribeImages to resolve name "kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28" | |
I1203 10:31:34.886020 35890 request_logger.go:45] AWS request: ec2/DescribeImages | |
I1203 10:31:34.932034 35890 launchconfiguration.go:241] Creating AutoscalingLaunchConfiguration with Name:"nodes.test.k8s.example.io-20171203183134" | |
I1203 10:31:34.932065 35890 aws_cloud.go:587] Calling DescribeImages to resolve name "kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28" | |
I1203 10:31:34.932205 35890 request_logger.go:45] AWS request: ec2/DescribeImages | |
I1203 10:31:34.960805 35890 aws_cloud.go:632] Resolved image "ami-2fa0ba56" | |
I1203 10:31:34.960836 35890 aws_cloud.go:587] Calling DescribeImages to resolve name "kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28" | |
I1203 10:31:34.960976 35890 request_logger.go:45] AWS request: ec2/DescribeImages | |
I1203 10:31:34.970440 35890 aws_cloud.go:632] Resolved image "ami-2fa0ba56" | |
I1203 10:31:34.970469 35890 aws_cloud.go:587] Calling DescribeImages to resolve name "kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28" | |
I1203 10:31:34.970599 35890 request_logger.go:45] AWS request: ec2/DescribeImages | |
I1203 10:31:35.000779 35890 aws_cloud.go:632] Resolved image "ami-2fa0ba56" | |
I1203 10:31:35.000911 35890 urls.go:85] Using default protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz" | |
I1203 10:31:35.000933 35890 context.go:132] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz.sha1 | |
I1203 10:31:35.006468 35890 aws_cloud.go:632] Resolved image "ami-2fa0ba56" | |
I1203 10:31:35.006544 35890 context.go:132] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz.sha1 | |
I1203 10:31:35.444682 35890 apply_cluster.go:803] Found hash "8f796b29894b0184bff97906d072284c8e579331" for "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz" | |
I1203 10:31:35.445403 35890 apply_cluster.go:803] Found hash "8f796b29894b0184bff97906d072284c8e579331" for "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz" | |
I1203 10:31:35.445885 35890 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration | |
I1203 10:31:35.446310 35890 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration | |
I1203 10:31:35.542448 35890 launchconfiguration.go:326] got an error indicating that the IAM instance profile "nodes.test.k8s.example.io" is not ready: "Invalid IamInstanceProfile: nodes.test.k8s.example.io" | |
I1203 10:31:35.542488 35890 launchconfiguration.go:327] waiting for IAM instance profile "nodes.test.k8s.example.io" to be ready | |
I1203 10:31:35.542516 35890 launchconfiguration.go:326] got an error indicating that the IAM instance profile "masters.test.k8s.example.io" is not ready: "Invalid IamInstanceProfile: masters.test.k8s.example.io" | |
I1203 10:31:35.542540 35890 launchconfiguration.go:327] waiting for IAM instance profile "masters.test.k8s.example.io" to be ready | |
I1203 10:31:45.546127 35890 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration | |
I1203 10:31:45.546146 35890 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration | |
I1203 10:31:45.974557 35890 executor.go:91] Tasks: 63 done / 65 total; 2 can run | |
I1203 10:31:45.974598 35890 executor.go:157] Executing task "AutoscalingGroup/nodes.test.k8s.example.io": *awstasks.AutoscalingGroup {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","MinSize":2,"MaxSize":2,"Subnets":[{"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":"subnet-924206da","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"AvailabilityZone":"us-west-2b","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"us-west-2b.test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}],"Tags":{"k8s.io/role/node":"1"},"LaunchConfiguration":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","UserData":{"Name":"","Resource":{}},"ImageID":"kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28","InstanceType":"t2.medium","SSHKey":{"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":"22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"},"SecurityGroups":[{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null}],"AssociatePublicIP":true,"IAMInstanceProfile":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJLWAGCDBPKNVBVYTY"},"RootVolumeSize":128,"RootVolumeType":"gp2","RootVolumeOptimization":null,"SpotPrice":"","ID":"nodes.test.k8s.example.io-20171203183134","Tenancy":null}} | |
I1203 10:31:45.974613 35890 executor.go:157] Executing task "AutoscalingGroup/master-us-west-2b.masters.test.k8s.example.io": *awstasks.AutoscalingGroup {"Name":"master-us-west-2b.masters.test.k8s.example.io","Lifecycle":"Sync","MinSize":1,"MaxSize":1,"Subnets":[{"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":"subnet-924206da","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"AvailabilityZone":"us-west-2b","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"us-west-2b.test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}],"Tags":{"k8s.io/role/master":"1"},"LaunchConfiguration":{"Name":"master-us-west-2b.masters.test.k8s.example.io","Lifecycle":"Sync","UserData":{"Name":"","Resource":{}},"ImageID":"kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28","InstanceType":"m3.medium","SSHKey":{"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":"22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"},"SecurityGroups":[{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null}],"AssociatePublicIP":true,"IAMInstanceProfile":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJHOL6F7GKSEPBF634"},"RootVolumeSize":64,"RootVolumeType":"gp2","RootVolumeOptimization":null,"SpotPrice":"","ID":"master-us-west-2b.masters.test.k8s.example.io-20171203183134","Tenancy":null}} | |
I1203 10:31:45.975065 35890 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups | |
I1203 10:31:45.982677 35890 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups | |
I1203 10:31:46.029020 35890 autoscalinggroup.go:179] Creating autoscaling Group with Name:"nodes.test.k8s.example.io" | |
I1203 10:31:46.029170 35890 request_logger.go:45] AWS request: autoscaling/CreateAutoScalingGroup | |
I1203 10:31:46.035773 35890 autoscalinggroup.go:179] Creating autoscaling Group with Name:"master-us-west-2b.masters.test.k8s.example.io" | |
I1203 10:31:46.035962 35890 request_logger.go:45] AWS request: autoscaling/CreateAutoScalingGroup | |
I1203 10:31:46.456025 35890 executor.go:91] Tasks: 65 done / 65 total; 0 can run | |
I1203 10:31:46.456081 35890 dns.go:152] Pre-creating DNS records | |
I1203 10:31:46.456206 35890 route53.go:50] AWS request: route53 ListHostedZones | |
I1203 10:31:46.877815 35890 route53.go:50] AWS request: route53 ListResourceRecordSets | |
I1203 10:31:47.014750 35890 dns.go:228] Pre-creating DNS record api.test.k8s.example.io. => 203.0.113.123 | |
I1203 10:31:47.014776 35890 dns.go:228] Pre-creating DNS record api.internal.test.k8s.example.io. => 203.0.113.123 | |
I1203 10:31:47.014784 35890 dns.go:228] Pre-creating DNS record etcd-b.internal.test.k8s.example.io. => 203.0.113.123 | |
I1203 10:31:47.014791 35890 dns.go:228] Pre-creating DNS record etcd-events-b.internal.test.k8s.example.io. => 203.0.113.123 | |
I1203 10:31:47.014812 35890 rrchangeset.go:106] Route53 Changeset: | |
CREATE A api.test.k8s.example.io. | |
CREATE A api.internal.test.k8s.example.io. | |
CREATE A etcd-b.internal.test.k8s.example.io. | |
CREATE A etcd-events-b.internal.test.k8s.example.io. | |
I1203 10:31:47.015051 35890 route53.go:50] AWS request: route53 ChangeResourceRecordSets | |
I1203 10:31:47.224780 35890 dns.go:239] Pre-created DNS names: [api.test.k8s.example.io. api.internal.test.k8s.example.io. etcd-b.internal.test.k8s.example.io. etcd-events-b.internal.test.k8s.example.io.] | |
I1203 10:31:47.224816 35890 context.go:79] deleting temp dir: "/var/folders/0n/pvjw4yqx4l19lm2yddktp2400000gp/T/deploy989791546" | |
I1203 10:31:47.226324 35890 kubectl.go:130] Running command: kubectl config view --output json | |
I1203 10:31:47.343585 35890 kubectl.go:82] config = "{\n \"kind\": \"Config\",\n \"apiVersion\": \"v1\",\n \"preferences\": {},\n \"clusters\": [\n {\n \"name\": \"minikube\",\n \"cluster\": {\n \"server\": \"https://192.168.99.100:8443\",\n \"certificate-authority\": \"/Users/eric/.minikube/ca.crt\"\n }\n },\n {\n \"name\": \"spc4aio7dc\",\n \"cluster\": {\n \"server\": \"https://52.24.106.73:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"spcazu6wir\",\n \"cluster\": {\n \"server\": \"https://34.215.43.81:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"spcgsj0ug3\",\n \"cluster\": {\n \"server\": \"https://34.214.69.241:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"spcwcgbrmw\",\n \"cluster\": {\n \"server\": \"https://34.214.76.249:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"spczl43ats\",\n \"cluster\": {\n \"server\": \"https://54.215.215.41:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n }\n ],\n \"users\": [\n {\n \"name\": \"minikube\",\n \"user\": {\n \"client-certificate\": \"/Users/eric/.minikube/client.crt\",\n \"client-key\": \"/Users/eric/.minikube/client.key\"\n }\n },\n {\n \"name\": \"newprod-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"production-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"stage925-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"staging-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"staging915-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"toast-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n }\n ],\n \"contexts\": [\n {\n \"name\": \"minikube\",\n \"context\": {\n \"cluster\": \"minikube\",\n \"user\": \"minikube\"\n }\n },\n {\n \"name\": \"newprod\",\n \"context\": {\n \"cluster\": \"spcrfihxq9\",\n \"user\": \"newprod-user\"\n }\n },\n {\n \"name\": \"newstaging\",\n \"context\": {\n \"cluster\": \"spcgsj0ug3\",\n \"user\": \"newstaging-user\"\n }\n },\n {\n \"name\": \"production\",\n \"context\": {\n \"cluster\": \"spczl43ats\",\n \"user\": \"production-user\"\n }\n },\n {\n \"name\": \"stage925\",\n \"context\": {\n \"cluster\": \"spc1b8g9vo\",\n \"user\": \"stage925-user\"\n }\n },\n {\n \"name\": \"staging\",\n \"context\": {\n \"cluster\": \"spc1b8g9vo\",\n \"user\": \"staging-user\",\n \"namespace\": \"default\"\n }\n },\n {\n \"name\": \"staging-bak\",\n \"context\": {\n \"cluster\": \"spc1b8g9vo\",\n \"user\": \"staging-user\"\n }\n },\n {\n \"name\": \"staging-test\",\n \"context\": {\n \"cluster\": \"spcazu6wir\",\n \"user\": \"staging-user\"\n }\n },\n {\n \"name\": \"staging915\",\n \"context\": {\n \"cluster\": \"spcwcgbrmw\",\n \"user\": \"staging915-user\"\n }\n },\n {\n \"name\": \"toast\",\n \"context\": {\n \"cluster\": \"spc4aio7dc\",\n \"user\": \"toast-user\"\n }\n }\n ],\n \"current-context\": \"\"\n}" | |
I1203 10:31:47.344245 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubecfg/" | |
I1203 10:31:47.474140 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt] | |
I1203 10:31:47.474176 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt" | |
I1203 10:31:47.576013 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:47.576324 35890 update_cluster.go:247] Exporting kubecfg for cluster | |
I1203 10:31:47.576384 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/ca/" | |
I1203 10:31:47.691987 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt] | |
I1203 10:31:47.692013 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt" | |
I1203 10:31:47.799678 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:47.800059 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/ca/" | |
I1203 10:31:47.943066 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key] | |
I1203 10:31:47.943108 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key" | |
I1203 10:31:48.044868 35890 ca.go:395] Parsing pem block: "RSA PRIVATE KEY" | |
I1203 10:31:48.045279 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubecfg/" | |
I1203 10:31:48.174002 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt] | |
I1203 10:31:48.174031 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt" | |
I1203 10:31:48.311881 35890 ca.go:377] Parsing pem block: "CERTIFICATE" | |
I1203 10:31:48.312077 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubecfg/" | |
I1203 10:31:48.418040 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg/6495390241170448363893406246.key] | |
I1203 10:31:48.418089 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg/6495390241170448363893406246.key" | |
I1203 10:31:48.521313 35890 ca.go:395] Parsing pem block: "RSA PRIVATE KEY" | |
I1203 10:31:48.521714 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube" | |
I1203 10:31:48.625411 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config | |
I1203 10:31:48.628002 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config | |
I1203 10:31:48.630371 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config | |
I1203 10:31:48.632949 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config | |
I1203 10:31:48.642635 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config | |
I1203 10:31:48.650933 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config | |
I1203 10:31:48.660119 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config | |
I1203 10:31:48.669807 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment