Skip to content

Instantly share code, notes, and snippets.

@erstaples
Created December 3, 2017 18:39
Show Gist options
  • Save erstaples/a59541be24aef9e3393a1b24c5e0b670 to your computer and use it in GitHub Desktop.
Save erstaples/a59541be24aef9e3393a1b24c5e0b670 to your computer and use it in GitHub Desktop.
Logs from command: `kops create cluster --zones=us-west-2b --name test.k8s.example.io --networking canal --yes -v 10`
I1203 10:31:23.390517 35890 s3context.go:159] Found bucket "clusters.k8s.example.io" in region "us-east-1"
I1203 10:31:23.390580 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/config"
I1203 10:31:23.494008 35890 channel.go:91] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/"
I1203 10:31:23.494105 35890 channel.go:96] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable"
I1203 10:31:23.494124 35890 context.go:132] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable
I1203 10:31:23.770132 35890 channel.go:105] Channel contents: spec:
images:
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 )
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.4.0 <1.5.0"
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.5.0 <1.6.0"
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.6.0 <1.7.0"
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.7.0"
- providerID: gce
name: "cos-cloud/cos-stable-60-9592-90-0"
cluster:
kubernetesVersion: v1.5.7
networking:
kubenet: {}
kubernetesVersions:
- range: ">=1.7.0"
recommendedVersion: 1.7.10
requiredVersion: 1.7.0
- range: ">=1.6.0"
recommendedVersion: 1.6.11
requiredVersion: 1.6.0
- range: ">=1.5.0"
recommendedVersion: 1.5.8
requiredVersion: 1.5.1
- range: "<1.5.0"
recommendedVersion: 1.4.12
requiredVersion: 1.4.2
kopsVersions:
- range: ">=1.7.0-alpha.1"
recommendedVersion: 1.7.1
#requiredVersion: 1.7.0
kubernetesVersion: 1.7.10
- range: ">=1.6.0-alpha.1"
#recommendedVersion: 1.6.0
#requiredVersion: 1.6.0
kubernetesVersion: 1.6.11
- range: ">=1.5.0-alpha1"
recommendedVersion: 1.5.1
#requiredVersion: 1.5.1
kubernetesVersion: 1.5.8
- range: "<1.5.0"
recommendedVersion: 1.4.4
#requiredVersion: 1.4.4
kubernetesVersion: 1.4.12
I1203 10:31:23.770409 35890 create_cluster.go:371] networking mode=canal => {"kubenet":{}}
I1203 10:31:23.770458 35890 create_cluster.go:659] Inferred --cloud=aws from zone "us-west-2b"
I1203 10:31:23.770573 35890 create_cluster.go:845] Using SSH public key: /Users/eric/.ssh/id_rsa.pub
I1203 10:31:23.770619 35890 aws_utils.go:38] Querying EC2 for all valid regions
I1203 10:31:24.217401 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2"
I1203 10:31:24.217652 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1203 10:31:24.533169 35890 subnets.go:183] Assigned CIDR 172.20.32.0/19 to subnet us-west-2b
I1203 10:31:24.534864 35890 populate_cluster_spec.go:369] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11
I1203 10:31:24.534884 35890 populate_cluster_spec.go:376] Defaulted ServiceClusterIPRange to 100.64.0.0/13
I1203 10:31:24.534899 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2"
I1203 10:31:24.535029 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1203 10:31:24.572532 35890 subnets.go:48] All subnets have CIDRs; skipping asssignment logic
I1203 10:31:24.572588 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2"
I1203 10:31:24.572705 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1203 10:31:24.609524 35890 utils.go:121] Querying for all DNS zones to find match for "test.k8s.example.io"
I1203 10:31:24.609649 35890 route53.go:50] AWS request: route53 ListHostedZones
I1203 10:31:25.120189 35890 utils.go:152] Found matching hosted zone ".example.io", but it was "Private" and we require "Public"
I1203 10:31:25.120234 35890 populate_cluster_spec.go:249] Defaulting DNS zone to: Z3STZN85S7ZJGL
I1203 10:31:25.120257 35890 tagbuilder.go:102] tags: [_aws _k8s_1_6 _networking_cni]
I1203 10:31:25.120332 35890 tree_walker.go:97] visit "config/_aws"
I1203 10:31:25.120353 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/_aws"
I1203 10:31:25.120363 35890 tree_walker.go:97] visit "config/_aws/defaults.options"
I1203 10:31:25.120482 35890 tree_walker.go:97] visit "config/_gce"
I1203 10:31:25.120510 35890 tree_walker.go:120] Skipping directory "config/_gce" as tag "_gce" not present
I1203 10:31:25.120519 35890 tree_walker.go:97] visit "config/components"
I1203 10:31:25.120533 35890 tree_walker.go:97] visit "config/components/docker"
I1203 10:31:25.120550 35890 tree_walker.go:97] visit "config/components/docker/_e2e_storage_test_environment"
I1203 10:31:25.120565 35890 tree_walker.go:120] Skipping directory "config/components/docker/_e2e_storage_test_environment" as tag "_e2e_storage_test_environment" not present
I1203 10:31:25.120577 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni"
I1203 10:31:25.120589 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/docker/_networking_cni"
I1203 10:31:25.120599 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni/cni.options"
I1203 10:31:25.120678 35890 tree_walker.go:97] visit "config/components/docker/_networking_kubenet"
I1203 10:31:25.120705 35890 tree_walker.go:120] Skipping directory "config/components/docker/_networking_kubenet" as tag "_networking_kubenet" not present
I1203 10:31:25.120722 35890 tree_walker.go:97] visit "config/components/docker/docker.options"
I1203 10:31:25.120915 35890 tree_walker.go:97] visit "config/components/kube-apiserver"
I1203 10:31:25.120962 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_gce"
I1203 10:31:25.120979 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_gce" as tag "_gce" not present
I1203 10:31:25.120988 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6"
I1203 10:31:25.120999 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_k8s_1_6"
I1203 10:31:25.121009 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6/kube-apiserver.options"
I1203 10:31:25.121099 35890 tree_walker.go:97] visit "config/components/kube-apiserver/kube-apiserver.options"
I1203 10:31:25.121228 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_vsphere"
I1203 10:31:25.121250 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_vsphere" as tag "_vsphere" not present
I1203 10:31:25.121259 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws"
I1203 10:31:25.121270 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_aws"
I1203 10:31:25.121280 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws/kube-apiserver.aws.options"
I1203 10:31:25.121370 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_3"
I1203 10:31:25.121397 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_3" as tag "_k8s_1_3" not present
I1203 10:31:25.121406 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_4"
I1203 10:31:25.121429 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_4" as tag "_k8s_1_4" not present
I1203 10:31:25.121449 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_5"
I1203 10:31:25.121462 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_5" as tag "_k8s_1_5" not present
I1203 10:31:25.121631 35890 options_loader.go:101] executing template components/docker/docker.options (tags=[])
I1203 10:31:25.121759 35890 options_loader.go:101] executing template components/kube-apiserver/kube-apiserver.options (tags=[])
I1203 10:31:25.121975 35890 options_loader.go:101] executing template _aws/defaults.options (tags=[_aws])
I1203 10:31:25.122034 35890 options_loader.go:101] executing template components/docker/_networking_cni/cni.options (tags=[_networking_cni])
I1203 10:31:25.122081 35890 options_loader.go:101] executing template components/kube-apiserver/_aws/kube-apiserver.aws.options (tags=[_aws])
I1203 10:31:25.122126 35890 options_loader.go:101] executing template components/kube-apiserver/_k8s_1_6/kube-apiserver.options (tags=[_k8s_1_6])
I1203 10:31:25.122227 35890 options_loader.go:128] executing builder *components.DefaultsOptionsBuilder
I1203 10:31:25.122241 35890 options_loader.go:128] executing builder *components.KubeAPIServerOptionsBuilder
I1203 10:31:25.122263 35890 apiserver.go:100] Enabling apiserver insecure port, for healthchecks (issue #43784)
I1203 10:31:25.122270 35890 options_loader.go:128] executing builder *components.DockerOptionsBuilder
I1203 10:31:25.122285 35890 options_loader.go:128] executing builder *components.NetworkingOptionsBuilder
I1203 10:31:25.122294 35890 options_loader.go:128] executing builder *components.KubeDnsOptionsBuilder
I1203 10:31:25.122308 35890 options_loader.go:128] executing builder *components.KubeletOptionsBuilder
I1203 10:31:25.122331 35890 kubelet.go:139] Cloud Provider: aws
I1203 10:31:25.122343 35890 options_loader.go:128] executing builder *components.KubeControllerManagerOptionsBuilder
I1203 10:31:25.122354 35890 kubecontrollermanager.go:74] Kubernetes version "1.7.10" supports AttachDetachReconcileSyncPeriod; will configure
I1203 10:31:25.122372 35890 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s
I1203 10:31:25.122385 35890 options_loader.go:128] executing builder *components.KubeSchedulerOptionsBuilder
I1203 10:31:25.122392 35890 options_loader.go:128] executing builder *components.KubeProxyOptionsBuilder
I1203 10:31:25.122842 35890 options_loader.go:101] executing template components/docker/docker.options (tags=[])
I1203 10:31:25.122928 35890 options_loader.go:101] executing template components/kube-apiserver/kube-apiserver.options (tags=[])
I1203 10:31:25.123053 35890 options_loader.go:101] executing template _aws/defaults.options (tags=[_aws])
I1203 10:31:25.123099 35890 options_loader.go:101] executing template components/docker/_networking_cni/cni.options (tags=[_networking_cni])
I1203 10:31:25.123136 35890 options_loader.go:101] executing template components/kube-apiserver/_aws/kube-apiserver.aws.options (tags=[_aws])
I1203 10:31:25.123172 35890 options_loader.go:101] executing template components/kube-apiserver/_k8s_1_6/kube-apiserver.options (tags=[_k8s_1_6])
I1203 10:31:25.123240 35890 options_loader.go:128] executing builder *components.DefaultsOptionsBuilder
I1203 10:31:25.123250 35890 options_loader.go:128] executing builder *components.KubeAPIServerOptionsBuilder
I1203 10:31:25.123256 35890 apiserver.go:100] Enabling apiserver insecure port, for healthchecks (issue #43784)
I1203 10:31:25.123261 35890 options_loader.go:128] executing builder *components.DockerOptionsBuilder
I1203 10:31:25.123268 35890 options_loader.go:128] executing builder *components.NetworkingOptionsBuilder
I1203 10:31:25.123274 35890 options_loader.go:128] executing builder *components.KubeDnsOptionsBuilder
I1203 10:31:25.123283 35890 options_loader.go:128] executing builder *components.KubeletOptionsBuilder
I1203 10:31:25.123291 35890 kubelet.go:139] Cloud Provider: aws
I1203 10:31:25.123297 35890 options_loader.go:128] executing builder *components.KubeControllerManagerOptionsBuilder
I1203 10:31:25.123305 35890 kubecontrollermanager.go:74] Kubernetes version "1.7.10" supports AttachDetachReconcileSyncPeriod; will configure
I1203 10:31:25.123314 35890 options_loader.go:128] executing builder *components.KubeSchedulerOptionsBuilder
I1203 10:31:25.123319 35890 options_loader.go:128] executing builder *components.KubeProxyOptionsBuilder
I1203 10:31:25.123757 35890 spec_builder.go:68] options: {
"channel": "stable",
"configBase": "s3://clusters.k8s.example.io/test.k8s.example.io",
"cloudProvider": "aws",
"kubernetesVersion": "1.7.10",
"subnets": [
{
"name": "us-west-2b",
"zone": "us-west-2b",
"cidr": "172.20.32.0/19",
"type": "Public"
}
],
"masterPublicName": "api.test.k8s.example.io",
"masterInternalName": "api.internal.test.k8s.example.io",
"networkCIDR": "172.20.0.0/16",
"topology": {
"masters": "public",
"nodes": "public",
"dns": {
"type": "Public"
}
},
"secretStore": "s3://clusters.k8s.example.io/test.k8s.example.io/secrets",
"keyStore": "s3://clusters.k8s.example.io/test.k8s.example.io/pki",
"configStore": "s3://clusters.k8s.example.io/test.k8s.example.io",
"dnsZone": "Z3STZN85S7ZJGL",
"clusterDNSDomain": "cluster.local",
"serviceClusterIPRange": "100.64.0.0/13",
"nonMasqueradeCIDR": "100.64.0.0/10",
"sshAccess": [
"0.0.0.0/0"
],
"kubernetesApiAccess": [
"0.0.0.0/0"
],
"etcdClusters": [
{
"name": "main",
"etcdMembers": [
{
"name": "b",
"instanceGroup": "master-us-west-2b"
}
]
},
{
"name": "events",
"etcdMembers": [
{
"name": "b",
"instanceGroup": "master-us-west-2b"
}
]
}
],
"docker": {
"bridge": "",
"logLevel": "warn",
"ipTables": false,
"ipMasq": false,
"logDriver": "json-file",
"logOpt": [
"max-size=10m",
"max-file=5"
],
"storage": "overlay,aufs",
"version": "1.12.6"
},
"kubeDNS": {
"image": "gcr.io/google_containers/kubedns-amd64:1.3",
"replicas": 2,
"domain": "cluster.local",
"serverIP": "100.64.0.10"
},
"kubeAPIServer": {
"image": "gcr.io/google_containers/kube-apiserver:v1.7.10",
"logLevel": 2,
"cloudProvider": "aws",
"securePort": 443,
"insecurePort": 8080,
"address": "127.0.0.1",
"etcdServers": [
"http://127.0.0.1:4001"
],
"etcdServersOverrides": [
"/events#http://127.0.0.1:4002"
],
"admissionControl": [
"NamespaceLifecycle",
"LimitRanger",
"ServiceAccount",
"PersistentVolumeLabel",
"DefaultStorageClass",
"DefaultTolerationSeconds",
"ResourceQuota"
],
"serviceClusterIPRange": "100.64.0.0/13",
"allowPrivileged": true,
"apiServerCount": 1,
"anonymousAuth": false,
"kubeletPreferredAddressTypes": [
"InternalIP",
"Hostname",
"ExternalIP"
],
"storageBackend": "etcd2",
"authorizationMode": "AlwaysAllow"
},
"kubeControllerManager": {
"logLevel": 2,
"image": "gcr.io/google_containers/kube-controller-manager:v1.7.10",
"cloudProvider": "aws",
"clusterName": "test.k8s.example.io",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": false,
"leaderElection": {
"leaderElect": true
},
"attachDetachReconcileSyncPeriod": "1m0s",
"useServiceAccountCredentials": true
},
"kubeScheduler": {
"logLevel": 2,
"image": "gcr.io/google_containers/kube-scheduler:v1.7.10",
"leaderElection": {
"leaderElect": true
}
},
"kubeProxy": {
"image": "gcr.io/google_containers/kube-proxy:v1.7.10",
"cpuRequest": "100m",
"logLevel": 2,
"clusterCIDR": "100.96.0.0/11",
"hostnameOverride": "@aws"
},
"kubelet": {
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"requireKubeconfig": true,
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "gcr.io/google_containers/pause-amd64:3.0",
"allowPrivileged": true,
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "cni",
"cloudProvider": "aws",
"cgroupRoot": "/",
"nonMasqueradeCIDR": "100.64.0.0/10",
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"
},
"masterKubelet": {
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"requireKubeconfig": true,
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "gcr.io/google_containers/pause-amd64:3.0",
"allowPrivileged": true,
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "cni",
"cloudProvider": "aws",
"cgroupRoot": "/",
"registerSchedulable": false,
"nonMasqueradeCIDR": "100.64.0.0/10",
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"
},
"networking": {
"canal": {}
},
"api": {
"dns": {}
},
"authorization": {
"alwaysAllow": {}
}
}
I1203 10:31:25.124396 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2"
I1203 10:31:25.124503 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1203 10:31:25.155934 35890 aws_cloud.go:811] checking if instance type "m3.medium" is supported in region "us-west-2"
I1203 10:31:25.156298 35890 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings
I1203 10:31:25.352129 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.4.0 <1.5.0
I1203 10:31:25.352171 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.5.0 <1.6.0
I1203 10:31:25.352182 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.6.0 <1.7.0
I1203 10:31:25.352247 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2"
I1203 10:31:25.352366 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1203 10:31:25.407197 35890 aws_cloud.go:811] checking if instance type "t2.medium" is supported in region "us-west-2"
I1203 10:31:25.407431 35890 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings
I1203 10:31:25.521946 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.4.0 <1.5.0
I1203 10:31:25.521982 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.5.0 <1.6.0
I1203 10:31:25.521993 35890 channel.go:266] Kubernetes version "1.7.10" does not match range: >=1.6.0 <1.7.0
I1203 10:31:25.524306 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/config"
I1203 10:31:25.620554 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/config"
I1203 10:31:25.620593 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/config" SSE="AES256" ACL="" BodyLen=890
I1203 10:31:25.726758 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b"
I1203 10:31:25.820120 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b"
I1203 10:31:25.820158 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/instancegroup/master-us-west-2b" SSE="AES256" ACL="" BodyLen=286
I1203 10:31:25.931957 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes"
I1203 10:31:26.025318 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes"
I1203 10:31:26.025357 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/instancegroup/nodes" SSE="AES256" ACL="" BodyLen=272
I1203 10:31:26.129824 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/cluster.spec"
I1203 10:31:26.129854 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/cluster.spec" SSE="AES256" ACL="" BodyLen=4216
I1203 10:31:26.365545 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/ssh/public/admin/d3b39e5386580260a5503ed2b7228ec0"
I1203 10:31:26.365584 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/ssh/public/admin/d3b39e5386580260a5503ed2b7228ec0" SSE="AES256" ACL="" BodyLen=746
I1203 10:31:26.474217 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/config"
I1203 10:31:26.576034 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/instancegroup/"
I1203 10:31:26.706312 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup: [s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes]
I1203 10:31:26.706357 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b"
I1203 10:31:26.838203 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes"
I1203 10:31:26.996374 35890 channel.go:91] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/"
I1203 10:31:26.996418 35890 channel.go:96] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable"
I1203 10:31:26.996432 35890 context.go:132] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable
I1203 10:31:27.012363 35890 channel.go:105] Channel contents: spec:
images:
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 )
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.4.0 <1.5.0"
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.5.0 <1.6.0"
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.6.0 <1.7.0"
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.7.0"
- providerID: gce
name: "cos-cloud/cos-stable-60-9592-90-0"
cluster:
kubernetesVersion: v1.5.7
networking:
kubenet: {}
kubernetesVersions:
- range: ">=1.7.0"
recommendedVersion: 1.7.10
requiredVersion: 1.7.0
- range: ">=1.6.0"
recommendedVersion: 1.6.11
requiredVersion: 1.6.0
- range: ">=1.5.0"
recommendedVersion: 1.5.8
requiredVersion: 1.5.1
- range: "<1.5.0"
recommendedVersion: 1.4.12
requiredVersion: 1.4.2
kopsVersions:
- range: ">=1.7.0-alpha.1"
recommendedVersion: 1.7.1
#requiredVersion: 1.7.0
kubernetesVersion: 1.7.10
- range: ">=1.6.0-alpha.1"
#recommendedVersion: 1.6.0
#requiredVersion: 1.6.0
kubernetesVersion: 1.6.11
- range: ">=1.5.0-alpha1"
recommendedVersion: 1.5.1
#requiredVersion: 1.5.1
kubernetesVersion: 1.5.8
- range: "<1.5.0"
recommendedVersion: 1.4.4
#requiredVersion: 1.4.4
kubernetesVersion: 1.4.12
I1203 10:31:27.012662 35890 populate_cluster_spec.go:369] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11
I1203 10:31:27.012680 35890 populate_cluster_spec.go:376] Defaulted ServiceClusterIPRange to 100.64.0.0/13
I1203 10:31:27.012696 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2"
I1203 10:31:27.012830 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1203 10:31:27.058376 35890 subnets.go:48] All subnets have CIDRs; skipping asssignment logic
I1203 10:31:27.058431 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2"
I1203 10:31:27.058548 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1203 10:31:27.096846 35890 utils.go:121] Querying for all DNS zones to find match for "test.k8s.example.io"
I1203 10:31:27.096961 35890 route53.go:50] AWS request: route53 ListHostedZones
I1203 10:31:27.224832 35890 utils.go:152] Found matching hosted zone ".example.io", but it was "Private" and we require "Public"
I1203 10:31:27.224873 35890 populate_cluster_spec.go:249] Defaulting DNS zone to: Z3STZN85S7ZJGL
I1203 10:31:27.224893 35890 tagbuilder.go:102] tags: [_aws _k8s_1_6 _networking_cni]
I1203 10:31:27.224941 35890 tree_walker.go:97] visit "config/_aws"
I1203 10:31:27.224957 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/_aws"
I1203 10:31:27.224966 35890 tree_walker.go:97] visit "config/_aws/defaults.options"
I1203 10:31:27.225056 35890 tree_walker.go:97] visit "config/_gce"
I1203 10:31:27.225079 35890 tree_walker.go:120] Skipping directory "config/_gce" as tag "_gce" not present
I1203 10:31:27.225088 35890 tree_walker.go:97] visit "config/components"
I1203 10:31:27.225102 35890 tree_walker.go:97] visit "config/components/docker"
I1203 10:31:27.225119 35890 tree_walker.go:97] visit "config/components/docker/_e2e_storage_test_environment"
I1203 10:31:27.225134 35890 tree_walker.go:120] Skipping directory "config/components/docker/_e2e_storage_test_environment" as tag "_e2e_storage_test_environment" not present
I1203 10:31:27.225144 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni"
I1203 10:31:27.225155 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/docker/_networking_cni"
I1203 10:31:27.225165 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni/cni.options"
I1203 10:31:27.225263 35890 tree_walker.go:97] visit "config/components/docker/_networking_kubenet"
I1203 10:31:27.225287 35890 tree_walker.go:120] Skipping directory "config/components/docker/_networking_kubenet" as tag "_networking_kubenet" not present
I1203 10:31:27.225296 35890 tree_walker.go:97] visit "config/components/docker/docker.options"
I1203 10:31:27.225377 35890 tree_walker.go:97] visit "config/components/kube-apiserver"
I1203 10:31:27.225412 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_4"
I1203 10:31:27.225428 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_4" as tag "_k8s_1_4" not present
I1203 10:31:27.225437 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_5"
I1203 10:31:27.225449 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_5" as tag "_k8s_1_5" not present
I1203 10:31:27.225458 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_vsphere"
I1203 10:31:27.225473 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_vsphere" as tag "_vsphere" not present
I1203 10:31:27.225482 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws"
I1203 10:31:27.225493 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_aws"
I1203 10:31:27.225504 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws/kube-apiserver.aws.options"
I1203 10:31:27.225574 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_3"
I1203 10:31:27.225592 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_3" as tag "_k8s_1_3" not present
I1203 10:31:27.225602 35890 tree_walker.go:97] visit "config/components/kube-apiserver/kube-apiserver.options"
I1203 10:31:27.225735 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_gce"
I1203 10:31:27.225770 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_gce" as tag "_gce" not present
I1203 10:31:27.225781 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6"
I1203 10:31:27.225793 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_k8s_1_6"
I1203 10:31:27.225804 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6/kube-apiserver.options"
I1203 10:31:27.226043 35890 options_loader.go:101] executing template components/docker/docker.options (tags=[])
I1203 10:31:27.226159 35890 options_loader.go:101] executing template components/kube-apiserver/kube-apiserver.options (tags=[])
I1203 10:31:27.226317 35890 options_loader.go:101] executing template _aws/defaults.options (tags=[_aws])
I1203 10:31:27.226367 35890 options_loader.go:101] executing template components/docker/_networking_cni/cni.options (tags=[_networking_cni])
I1203 10:31:27.226408 35890 options_loader.go:101] executing template components/kube-apiserver/_aws/kube-apiserver.aws.options (tags=[_aws])
I1203 10:31:27.226448 35890 options_loader.go:101] executing template components/kube-apiserver/_k8s_1_6/kube-apiserver.options (tags=[_k8s_1_6])
I1203 10:31:27.226556 35890 options_loader.go:128] executing builder *components.DefaultsOptionsBuilder
I1203 10:31:27.226570 35890 options_loader.go:128] executing builder *components.KubeAPIServerOptionsBuilder
I1203 10:31:27.226582 35890 apiserver.go:100] Enabling apiserver insecure port, for healthchecks (issue #43784)
I1203 10:31:27.226588 35890 options_loader.go:128] executing builder *components.DockerOptionsBuilder
I1203 10:31:27.226600 35890 options_loader.go:128] executing builder *components.NetworkingOptionsBuilder
I1203 10:31:27.226610 35890 options_loader.go:128] executing builder *components.KubeDnsOptionsBuilder
I1203 10:31:27.226621 35890 options_loader.go:128] executing builder *components.KubeletOptionsBuilder
I1203 10:31:27.226634 35890 kubelet.go:139] Cloud Provider: aws
I1203 10:31:27.226643 35890 options_loader.go:128] executing builder *components.KubeControllerManagerOptionsBuilder
I1203 10:31:27.226655 35890 kubecontrollermanager.go:74] Kubernetes version "1.7.10" supports AttachDetachReconcileSyncPeriod; will configure
I1203 10:31:27.226665 35890 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s
I1203 10:31:27.226675 35890 options_loader.go:128] executing builder *components.KubeSchedulerOptionsBuilder
I1203 10:31:27.226685 35890 options_loader.go:128] executing builder *components.KubeProxyOptionsBuilder
I1203 10:31:27.227094 35890 options_loader.go:101] executing template components/docker/docker.options (tags=[])
I1203 10:31:27.227193 35890 options_loader.go:101] executing template components/kube-apiserver/kube-apiserver.options (tags=[])
I1203 10:31:27.227332 35890 options_loader.go:101] executing template _aws/defaults.options (tags=[_aws])
I1203 10:31:27.227378 35890 options_loader.go:101] executing template components/docker/_networking_cni/cni.options (tags=[_networking_cni])
I1203 10:31:27.227430 35890 options_loader.go:101] executing template components/kube-apiserver/_aws/kube-apiserver.aws.options (tags=[_aws])
I1203 10:31:27.227509 35890 options_loader.go:101] executing template components/kube-apiserver/_k8s_1_6/kube-apiserver.options (tags=[_k8s_1_6])
I1203 10:31:27.227603 35890 options_loader.go:128] executing builder *components.DefaultsOptionsBuilder
I1203 10:31:27.227613 35890 options_loader.go:128] executing builder *components.KubeAPIServerOptionsBuilder
I1203 10:31:27.227623 35890 apiserver.go:100] Enabling apiserver insecure port, for healthchecks (issue #43784)
I1203 10:31:27.227630 35890 options_loader.go:128] executing builder *components.DockerOptionsBuilder
I1203 10:31:27.227640 35890 options_loader.go:128] executing builder *components.NetworkingOptionsBuilder
I1203 10:31:27.227648 35890 options_loader.go:128] executing builder *components.KubeDnsOptionsBuilder
I1203 10:31:27.227657 35890 options_loader.go:128] executing builder *components.KubeletOptionsBuilder
I1203 10:31:27.227668 35890 kubelet.go:139] Cloud Provider: aws
I1203 10:31:27.227677 35890 options_loader.go:128] executing builder *components.KubeControllerManagerOptionsBuilder
I1203 10:31:27.227687 35890 kubecontrollermanager.go:74] Kubernetes version "1.7.10" supports AttachDetachReconcileSyncPeriod; will configure
I1203 10:31:27.227699 35890 options_loader.go:128] executing builder *components.KubeSchedulerOptionsBuilder
I1203 10:31:27.227706 35890 options_loader.go:128] executing builder *components.KubeProxyOptionsBuilder
I1203 10:31:27.228147 35890 spec_builder.go:68] options: {
"channel": "stable",
"configBase": "s3://clusters.k8s.example.io/test.k8s.example.io",
"cloudProvider": "aws",
"kubernetesVersion": "1.7.10",
"subnets": [
{
"name": "us-west-2b",
"zone": "us-west-2b",
"cidr": "172.20.32.0/19",
"type": "Public"
}
],
"masterPublicName": "api.test.k8s.example.io",
"masterInternalName": "api.internal.test.k8s.example.io",
"networkCIDR": "172.20.0.0/16",
"topology": {
"masters": "public",
"nodes": "public",
"dns": {
"type": "Public"
}
},
"secretStore": "s3://clusters.k8s.example.io/test.k8s.example.io/secrets",
"keyStore": "s3://clusters.k8s.example.io/test.k8s.example.io/pki",
"configStore": "s3://clusters.k8s.example.io/test.k8s.example.io",
"dnsZone": "Z3STZN85S7ZJGL",
"clusterDNSDomain": "cluster.local",
"serviceClusterIPRange": "100.64.0.0/13",
"nonMasqueradeCIDR": "100.64.0.0/10",
"sshAccess": [
"0.0.0.0/0"
],
"kubernetesApiAccess": [
"0.0.0.0/0"
],
"etcdClusters": [
{
"name": "main",
"etcdMembers": [
{
"name": "b",
"instanceGroup": "master-us-west-2b"
}
]
},
{
"name": "events",
"etcdMembers": [
{
"name": "b",
"instanceGroup": "master-us-west-2b"
}
]
}
],
"docker": {
"bridge": "",
"logLevel": "warn",
"ipTables": false,
"ipMasq": false,
"logDriver": "json-file",
"logOpt": [
"max-size=10m",
"max-file=5"
],
"storage": "overlay,aufs",
"version": "1.12.6"
},
"kubeDNS": {
"image": "gcr.io/google_containers/kubedns-amd64:1.3",
"replicas": 2,
"domain": "cluster.local",
"serverIP": "100.64.0.10"
},
"kubeAPIServer": {
"image": "gcr.io/google_containers/kube-apiserver:v1.7.10",
"logLevel": 2,
"cloudProvider": "aws",
"securePort": 443,
"insecurePort": 8080,
"address": "127.0.0.1",
"etcdServers": [
"http://127.0.0.1:4001"
],
"etcdServersOverrides": [
"/events#http://127.0.0.1:4002"
],
"admissionControl": [
"NamespaceLifecycle",
"LimitRanger",
"ServiceAccount",
"PersistentVolumeLabel",
"DefaultStorageClass",
"DefaultTolerationSeconds",
"ResourceQuota"
],
"serviceClusterIPRange": "100.64.0.0/13",
"allowPrivileged": true,
"apiServerCount": 1,
"anonymousAuth": false,
"kubeletPreferredAddressTypes": [
"InternalIP",
"Hostname",
"ExternalIP"
],
"storageBackend": "etcd2",
"authorizationMode": "AlwaysAllow"
},
"kubeControllerManager": {
"logLevel": 2,
"image": "gcr.io/google_containers/kube-controller-manager:v1.7.10",
"cloudProvider": "aws",
"clusterName": "test.k8s.example.io",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": false,
"leaderElection": {
"leaderElect": true
},
"attachDetachReconcileSyncPeriod": "1m0s",
"useServiceAccountCredentials": true
},
"kubeScheduler": {
"logLevel": 2,
"image": "gcr.io/google_containers/kube-scheduler:v1.7.10",
"leaderElection": {
"leaderElect": true
}
},
"kubeProxy": {
"image": "gcr.io/google_containers/kube-proxy:v1.7.10",
"cpuRequest": "100m",
"logLevel": 2,
"clusterCIDR": "100.96.0.0/11",
"hostnameOverride": "@aws"
},
"kubelet": {
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"requireKubeconfig": true,
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "gcr.io/google_containers/pause-amd64:3.0",
"allowPrivileged": true,
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "cni",
"cloudProvider": "aws",
"cgroupRoot": "/",
"nonMasqueradeCIDR": "100.64.0.0/10",
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"
},
"masterKubelet": {
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"requireKubeconfig": true,
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "gcr.io/google_containers/pause-amd64:3.0",
"allowPrivileged": true,
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "cni",
"cloudProvider": "aws",
"cgroupRoot": "/",
"registerSchedulable": false,
"nonMasqueradeCIDR": "100.64.0.0/10",
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"
},
"networking": {
"canal": {}
},
"api": {
"dns": {}
},
"authorization": {
"alwaysAllow": {}
}
}
I1203 10:31:27.228722 35890 channel.go:156] RecommendedVersion="1.7.1", Have="1.7.1". No upgrade needed.
I1203 10:31:27.228742 35890 channel.go:184] VersionRecommendationSpec does not specify RequiredVersion
I1203 10:31:27.228756 35890 channel.go:136] RecommendedVersion="1.7.10", Have="1.7.10". No upgrade needed.
I1203 10:31:27.228764 35890 channel.go:176] RequiredVersion="1.7.0", Have="1.7.10". No upgrade needed.
I1203 10:31:27.228823 35890 apply_cluster.go:221] Adding default kubelet release asset: https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubelet
I1203 10:31:27.228834 35890 context.go:132] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubelet.sha1
I1203 10:31:27.398940 35890 apply_cluster.go:803] Found hash "4d38bdc8e850c05103348cee2cbffbddce62bcf8" for "https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubelet"
I1203 10:31:27.398998 35890 apply_cluster.go:232] Adding default kubectl release asset: https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubectl
I1203 10:31:27.399015 35890 context.go:132] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubectl.sha1
I1203 10:31:27.426862 35890 apply_cluster.go:803] Found hash "4c174128ad3657bb09c5b3bd4a05565956b44744" for "https://storage.googleapis.com/kubernetes-release/release/v1.7.10/bin/linux/amd64/kubectl"
I1203 10:31:27.426966 35890 networking.go:120] Adding default CNI asset: https://storage.googleapis.com/kubernetes-release/network-plugins/cni-0799f5732f2a11b329d9e3d51b9c8f2e3759f2ff.tar.gz
I1203 10:31:27.426988 35890 urls.go:40] Using default base url: "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/"
I1203 10:31:27.427002 35890 apply_cluster.go:258] Using default utils.tar.gz location: "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/linux/amd64/utils.tar.gz"
I1203 10:31:27.427020 35890 context.go:132] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.7.1/linux/amd64/utils.tar.gz.sha1
I1203 10:31:27.870237 35890 apply_cluster.go:803] Found hash "c18ca557507c662e3a072c3475da9bd1bc8a503b" for "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/linux/amd64/utils.tar.gz"
I1203 10:31:27.870284 35890 urls.go:64] Using default nodeup location: "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/linux/amd64/nodeup"
I1203 10:31:27.870317 35890 aws_cloud.go:637] Querying EC2 for all valid zones in region "us-west-2"
I1203 10:31:27.870458 35890 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1203 10:31:27.899543 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/ssh/public/admin/"
I1203 10:31:28.006025 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/ssh/public/admin: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/ssh/public/admin/d3b39e5386580260a5503ed2b7228ec0]
I1203 10:31:28.006059 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/ssh/public/admin/d3b39e5386580260a5503ed2b7228ec0"
I1203 10:31:28.106111 35890 route53.go:50] AWS request: route53 ListHostedZones
I1203 10:31:28.221141 35890 dns.go:101] Doing DNS lookup to verify NS records for "k8s.example.io"
I1203 10:31:28.342620 35890 dns.go:118] Found NS records for "k8s.example.io": [ns-1466.awsdns-55.org. ns-1922.awsdns-48.co.uk. ns-24.awsdns-03.com. ns-1017.awsdns-63.net.]
I1203 10:31:28.342669 35890 tagbuilder.go:102] tags: [_aws _k8s_1_6 _networking_cni]
I1203 10:31:28.343044 35890 templates.go:79] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml"
I1203 10:31:28.343264 35890 templates.go:79] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml"
I1203 10:31:28.343331 35890 templates.go:87] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1203 10:31:28.343470 35890 templates.go:87] loading resource "addons/networking.flannel/k8s-1.6.yaml"
I1203 10:31:28.343564 35890 templates.go:87] loading resource "addons/networking.flannel/pre-k8s-1.6.yaml"
I1203 10:31:28.343642 35890 templates.go:87] loading resource "addons/networking.kope.io/k8s-1.6.yaml"
I1203 10:31:28.343703 35890 templates.go:87] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml"
I1203 10:31:28.343835 35890 templates.go:79] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:28.343928 35890 templates.go:79] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:28.344159 35890 templates.go:79] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml"
I1203 10:31:28.344384 35890 templates.go:79] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml"
I1203 10:31:28.344501 35890 templates.go:79] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml"
I1203 10:31:28.344604 35890 templates.go:79] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml"
I1203 10:31:28.344645 35890 templates.go:87] loading resource "addons/core.addons.k8s.io/addon.yaml"
I1203 10:31:28.344691 35890 templates.go:87] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml"
I1203 10:31:28.344781 35890 templates.go:79] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:28.344846 35890 templates.go:79] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:28.344896 35890 templates.go:87] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1203 10:31:28.344944 35890 templates.go:87] loading resource "addons/limit-range.addons.k8s.io/addon.yaml"
I1203 10:31:28.345058 35890 templates.go:79] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml"
I1203 10:31:28.345144 35890 templates.go:87] loading resource "addons/authentication.kope.io/k8s-1.6.yaml"
I1203 10:31:28.345348 35890 templates.go:79] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:28.345528 35890 templates.go:79] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:28.345605 35890 tree_walker.go:97] visit "config/_aws"
I1203 10:31:28.345623 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/_aws"
I1203 10:31:28.345634 35890 tree_walker.go:97] visit "config/_aws/defaults.options"
I1203 10:31:28.345645 35890 tree_walker.go:97] visit "config/_gce"
I1203 10:31:28.345657 35890 tree_walker.go:120] Skipping directory "config/_gce" as tag "_gce" not present
I1203 10:31:28.345666 35890 tree_walker.go:97] visit "config/components"
I1203 10:31:28.345679 35890 tree_walker.go:97] visit "config/components/docker"
I1203 10:31:28.345696 35890 tree_walker.go:97] visit "config/components/docker/docker.options"
I1203 10:31:28.345707 35890 tree_walker.go:97] visit "config/components/docker/_e2e_storage_test_environment"
I1203 10:31:28.345722 35890 tree_walker.go:120] Skipping directory "config/components/docker/_e2e_storage_test_environment" as tag "_e2e_storage_test_environment" not present
I1203 10:31:28.345732 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni"
I1203 10:31:28.345744 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/docker/_networking_cni"
I1203 10:31:28.345754 35890 tree_walker.go:97] visit "config/components/docker/_networking_cni/cni.options"
I1203 10:31:28.345767 35890 tree_walker.go:97] visit "config/components/docker/_networking_kubenet"
I1203 10:31:28.345780 35890 tree_walker.go:120] Skipping directory "config/components/docker/_networking_kubenet" as tag "_networking_kubenet" not present
I1203 10:31:28.345790 35890 tree_walker.go:97] visit "config/components/kube-apiserver"
I1203 10:31:28.345810 35890 tree_walker.go:97] visit "config/components/kube-apiserver/kube-apiserver.options"
I1203 10:31:28.345823 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_gce"
I1203 10:31:28.345843 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_gce" as tag "_gce" not present
I1203 10:31:28.345856 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6"
I1203 10:31:28.345869 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_k8s_1_6"
I1203 10:31:28.345879 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_6/kube-apiserver.options"
I1203 10:31:28.345892 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_4"
I1203 10:31:28.345905 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_4" as tag "_k8s_1_4" not present
I1203 10:31:28.345914 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_5"
I1203 10:31:28.345926 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_5" as tag "_k8s_1_5" not present
I1203 10:31:28.345935 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_vsphere"
I1203 10:31:28.345947 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_vsphere" as tag "_vsphere" not present
I1203 10:31:28.345955 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws"
I1203 10:31:28.345973 35890 tree_walker.go:124] Descending into directory, as tag is present: "config/components/kube-apiserver/_aws"
I1203 10:31:28.345986 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_aws/kube-apiserver.aws.options"
I1203 10:31:28.346000 35890 tree_walker.go:97] visit "config/components/kube-apiserver/_k8s_1_3"
I1203 10:31:28.346012 35890 tree_walker.go:120] Skipping directory "config/components/kube-apiserver/_k8s_1_3" as tag "_k8s_1_3" not present
I1203 10:31:28.346024 35890 tree_walker.go:97] visit "cloudup/resources"
I1203 10:31:28.346036 35890 tree_walker.go:97] visit "cloudup/resources/addons"
I1203 10:31:28.346062 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kope.io"
I1203 10:31:28.346078 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kope.io/k8s-1.6.yaml"
I1203 10:31:28.346199 35890 loader.go:319] loading resource "addons/networking.kope.io/k8s-1.6.yaml"
I1203 10:31:28.346214 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kope.io/pre-k8s-1.6.yaml"
I1203 10:31:28.346278 35890 loader.go:319] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml"
I1203 10:31:28.346288 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org"
I1203 10:31:28.346304 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.6.yaml.template"
I1203 10:31:28.346483 35890 loader.go:311] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml"
I1203 10:31:28.346498 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org/pre-k8s-1.6.yaml.template"
I1203 10:31:28.346654 35890 loader.go:311] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml"
I1203 10:31:28.346670 35890 tree_walker.go:97] visit "cloudup/resources/addons/storage-aws.addons.k8s.io"
I1203 10:31:28.346682 35890 tree_walker.go:97] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1203 10:31:28.346733 35890 loader.go:319] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1203 10:31:28.346741 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.flannel"
I1203 10:31:28.346753 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.flannel/k8s-1.6.yaml"
I1203 10:31:28.346827 35890 loader.go:319] loading resource "addons/networking.flannel/k8s-1.6.yaml"
I1203 10:31:28.346835 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.flannel/pre-k8s-1.6.yaml"
I1203 10:31:28.346908 35890 loader.go:319] loading resource "addons/networking.flannel/pre-k8s-1.6.yaml"
I1203 10:31:28.346917 35890 tree_walker.go:97] visit "cloudup/resources/addons/dns-controller.addons.k8s.io"
I1203 10:31:28.346930 35890 tree_walker.go:97] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml.template"
I1203 10:31:28.346999 35890 loader.go:311] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:28.347012 35890 tree_walker.go:97] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1203 10:31:28.347061 35890 loader.go:311] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:28.347074 35890 tree_walker.go:97] visit "cloudup/resources/addons/external-dns.addons.k8s.io"
I1203 10:31:28.347086 35890 tree_walker.go:97] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.6.yaml.template"
I1203 10:31:28.347174 35890 loader.go:311] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:28.347184 35890 tree_walker.go:97] visit "cloudup/resources/addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1203 10:31:28.347238 35890 loader.go:311] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:28.347247 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org.canal"
I1203 10:31:28.347260 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.6.yaml.template"
I1203 10:31:28.347417 35890 loader.go:311] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml"
I1203 10:31:28.347431 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml.template"
I1203 10:31:28.347564 35890 loader.go:311] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml"
I1203 10:31:28.347578 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.weave"
I1203 10:31:28.347592 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.weave/k8s-1.6.yaml.template"
I1203 10:31:28.347673 35890 loader.go:311] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml"
I1203 10:31:28.347690 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.weave/pre-k8s-1.6.yaml.template"
I1203 10:31:28.347768 35890 loader.go:311] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml"
I1203 10:31:28.347776 35890 tree_walker.go:97] visit "cloudup/resources/addons/core.addons.k8s.io"
I1203 10:31:28.347788 35890 tree_walker.go:97] visit "cloudup/resources/addons/core.addons.k8s.io/v1.4.0.yaml"
I1203 10:31:28.347823 35890 loader.go:319] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml"
I1203 10:31:28.347830 35890 tree_walker.go:97] visit "cloudup/resources/addons/core.addons.k8s.io/addon.yaml"
I1203 10:31:28.347865 35890 loader.go:319] loading resource "addons/core.addons.k8s.io/addon.yaml"
I1203 10:31:28.347872 35890 tree_walker.go:97] visit "cloudup/resources/addons/kube-dns.addons.k8s.io"
I1203 10:31:28.347884 35890 tree_walker.go:97] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml.template"
I1203 10:31:28.348041 35890 loader.go:311] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:28.348055 35890 tree_walker.go:97] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1203 10:31:28.348188 35890 loader.go:311] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:28.348203 35890 tree_walker.go:97] visit "cloudup/resources/addons/limit-range.addons.k8s.io"
I1203 10:31:28.348215 35890 tree_walker.go:97] visit "cloudup/resources/addons/limit-range.addons.k8s.io/addon.yaml"
I1203 10:31:28.348251 35890 loader.go:319] loading resource "addons/limit-range.addons.k8s.io/addon.yaml"
I1203 10:31:28.348261 35890 tree_walker.go:97] visit "cloudup/resources/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1203 10:31:28.348308 35890 loader.go:319] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1203 10:31:28.348318 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kuberouter"
I1203 10:31:28.348330 35890 tree_walker.go:97] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.6.yaml.template"
I1203 10:31:28.348418 35890 loader.go:311] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml"
I1203 10:31:28.348431 35890 tree_walker.go:97] visit "cloudup/resources/addons/authentication.kope.io"
I1203 10:31:28.348442 35890 tree_walker.go:97] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.6.yaml"
I1203 10:31:28.348507 35890 loader.go:319] loading resource "addons/authentication.kope.io/k8s-1.6.yaml"
I1203 10:31:28.352483 35890 images.go:56] Consider image for re-mapping: "quay.io/calico/node:v1.2.1"
I1203 10:31:28.352509 35890 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.privileged: %!s(bool=true)
I1203 10:31:28.352517 35890 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[0].readOnly: %!s(bool=true)
I1203 10:31:28.352523 35890 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[1].readOnly: %!s(bool=false)
I1203 10:31:28.352531 35890 images.go:56] Consider image for re-mapping: "quay.io/calico/cni:v1.8.3"
I1203 10:31:28.352545 35890 images.go:56] Consider image for re-mapping: "quay.io/coreos/flannel:v0.7.1"
I1203 10:31:28.352551 35890 visitor.go:34] string value at spec.template.spec.containers.[2].securityContext.privileged: %!s(bool=true)
I1203 10:31:28.352560 35890 visitor.go:34] string value at spec.template.spec.hostNetwork: %!s(bool=true)
I1203 10:31:28.355652 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.2-r2"
I1203 10:31:28.356047 35890 visitor.go:39] float64 value at spec.strategy.rollingUpdate.maxUnavailable: %!s(float64=0)
I1203 10:31:28.356068 35890 visitor.go:34] string value at spec.template.spec.volumes.[0].configMap.optional: %!s(bool=true)
I1203 10:31:28.356075 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.5"
I1203 10:31:28.356081 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: %!s(float64=5)
I1203 10:31:28.356086 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: %!s(float64=10054)
I1203 10:31:28.356090 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: %!s(float64=60)
I1203 10:31:28.356095 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: %!s(float64=1)
I1203 10:31:28.356099 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: %!s(float64=5)
I1203 10:31:28.356103 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: %!s(float64=10053)
I1203 10:31:28.356107 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: %!s(float64=10053)
I1203 10:31:28.356112 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: %!s(float64=10055)
I1203 10:31:28.356116 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: %!s(float64=8081)
I1203 10:31:28.356120 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: %!s(float64=3)
I1203 10:31:28.356145 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: %!s(float64=5)
I1203 10:31:28.356153 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: %!s(float64=1)
I1203 10:31:28.356157 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: %!s(float64=5)
I1203 10:31:28.356162 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: %!s(float64=5)
I1203 10:31:28.356166 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: %!s(float64=10054)
I1203 10:31:28.356170 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: %!s(float64=60)
I1203 10:31:28.356174 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: %!s(float64=53)
I1203 10:31:28.356178 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: %!s(float64=53)
I1203 10:31:28.356187 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.5"
I1203 10:31:28.356195 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.5"
I1203 10:31:28.356200 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: %!s(float64=10054)
I1203 10:31:28.356204 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: %!s(float64=60)
I1203 10:31:28.356208 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: %!s(float64=1)
I1203 10:31:28.356211 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: %!s(float64=5)
I1203 10:31:28.356215 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: %!s(float64=5)
I1203 10:31:28.356219 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: %!s(float64=10054)
I1203 10:31:28.357075 35890 visitor.go:39] float64 value at spec.ports.[0].port: %!s(float64=53)
I1203 10:31:28.357085 35890 visitor.go:39] float64 value at spec.ports.[1].port: %!s(float64=53)
I1203 10:31:28.357824 35890 visitor.go:39] float64 value at spec.replicas: %!s(float64=1)
I1203 10:31:28.357839 35890 images.go:56] Consider image for re-mapping: "kope/dns-controller:1.7.1"
I1203 10:31:28.357845 35890 visitor.go:34] string value at spec.template.spec.hostNetwork: %!s(bool=true)
I1203 10:31:28.358954 35890 images.go:56] Consider image for re-mapping: "quay.io/calico/node:v1.2.1"
I1203 10:31:28.358965 35890 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.privileged: %!s(bool=true)
I1203 10:31:28.358970 35890 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[0].readOnly: %!s(bool=true)
I1203 10:31:28.358974 35890 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[1].readOnly: %!s(bool=false)
I1203 10:31:28.358982 35890 images.go:56] Consider image for re-mapping: "quay.io/calico/cni:v1.8.3"
I1203 10:31:28.358993 35890 images.go:56] Consider image for re-mapping: "quay.io/coreos/flannel:v0.7.1"
I1203 10:31:28.358997 35890 visitor.go:34] string value at spec.template.spec.containers.[2].securityContext.privileged: %!s(bool=true)
I1203 10:31:28.359000 35890 visitor.go:34] string value at spec.template.spec.hostNetwork: %!s(bool=true)
I1203 10:31:28.360331 35890 visitor.go:39] float64 value at spec.replicas: %!s(float64=1)
I1203 10:31:28.360343 35890 visitor.go:34] string value at spec.template.spec.hostNetwork: %!s(bool=true)
I1203 10:31:28.360351 35890 images.go:56] Consider image for re-mapping: "kope/dns-controller:1.7.1"
I1203 10:31:28.362302 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.0.0"
I1203 10:31:28.362605 35890 visitor.go:39] float64 value at spec.strategy.rollingUpdate.maxUnavailable: %!s(float64=0)
I1203 10:31:28.362618 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: %!s(float64=8081)
I1203 10:31:28.362622 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: %!s(float64=3)
I1203 10:31:28.362625 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: %!s(float64=5)
I1203 10:31:28.362632 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/kubedns-amd64:1.9"
I1203 10:31:28.362637 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: %!s(float64=5)
I1203 10:31:28.362641 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: %!s(float64=8080)
I1203 10:31:28.362644 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: %!s(float64=60)
I1203 10:31:28.362648 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: %!s(float64=1)
I1203 10:31:28.362651 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: %!s(float64=5)
I1203 10:31:28.362656 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: %!s(float64=10053)
I1203 10:31:28.362659 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: %!s(float64=10053)
I1203 10:31:28.362674 35890 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: %!s(float64=10055)
I1203 10:31:28.362680 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/k8s-dns-dnsmasq-amd64:1.14.5"
I1203 10:31:28.362705 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: %!s(float64=5)
I1203 10:31:28.362711 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: %!s(float64=8080)
I1203 10:31:28.362716 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: %!s(float64=60)
I1203 10:31:28.362719 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: %!s(float64=1)
I1203 10:31:28.362723 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: %!s(float64=5)
I1203 10:31:28.362727 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: %!s(float64=53)
I1203 10:31:28.362732 35890 visitor.go:39] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: %!s(float64=53)
I1203 10:31:28.362736 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/dnsmasq-metrics-amd64:1.0"
I1203 10:31:28.362741 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: %!s(float64=5)
I1203 10:31:28.362745 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: %!s(float64=5)
I1203 10:31:28.362748 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: %!s(float64=10054)
I1203 10:31:28.362753 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: %!s(float64=60)
I1203 10:31:28.362756 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: %!s(float64=1)
I1203 10:31:28.362760 35890 visitor.go:39] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: %!s(float64=10054)
I1203 10:31:28.362766 35890 visitor.go:39] float64 value at spec.template.spec.containers.[3].ports.[0].containerPort: %!s(float64=8080)
I1203 10:31:28.362773 35890 images.go:56] Consider image for re-mapping: "gcr.io/google_containers/exechealthz-amd64:1.2"
I1203 10:31:28.363597 35890 visitor.go:39] float64 value at spec.ports.[0].port: %!s(float64=53)
I1203 10:31:28.363606 35890 visitor.go:39] float64 value at spec.ports.[1].port: %!s(float64=53)
I1203 10:31:28.365681 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/cluster.spec"
I1203 10:31:28.365696 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/cluster.spec" SSE="AES256" ACL="" BodyLen=4232
I1203 10:31:28.513609 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b"
I1203 10:31:28.625621 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/master-us-west-2b"
I1203 10:31:28.625662 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/instancegroup/master-us-west-2b" SSE="AES256" ACL="" BodyLen=346
I1203 10:31:28.786818 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes"
I1203 10:31:28.927105 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/instancegroup/nodes"
I1203 10:31:28.927144 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/instancegroup/nodes" SSE="AES256" ACL="" BodyLen=332
I1203 10:31:29.029224 35890 topological_sort.go:62] Dependencies:
I1203 10:31:29.029251 35890 topological_sort.go:64] InternetGateway/test.k8s.example.io: [VPC/test.k8s.example.io]
I1203 10:31:29.029262 35890 topological_sort.go:64] IAMInstanceProfileRole/masters.test.k8s.example.io: [IAMInstanceProfile/masters.test.k8s.example.io IAMRole/masters.test.k8s.example.io]
I1203 10:31:29.029271 35890 topological_sort.go:64] SecurityGroupRule/master-egress: [SecurityGroup/masters.test.k8s.example.io]
I1203 10:31:29.029278 35890 topological_sort.go:64] test.k8s.example.io-addons-dns-controller.addons.k8s.io-pre-k8s-1.6: []
I1203 10:31:29.029284 35890 topological_sort.go:64] Keypair/kube-controller-manager: []
I1203 10:31:29.029290 35890 topological_sort.go:64] DHCPOptions/test.k8s.example.io: []
I1203 10:31:29.029297 35890 topological_sort.go:64] SecurityGroupRule/node-to-master-tcp-4003-65535: [SecurityGroup/masters.test.k8s.example.io SecurityGroup/nodes.test.k8s.example.io]
I1203 10:31:29.029303 35890 topological_sort.go:64] VPC/test.k8s.example.io: []
I1203 10:31:29.029309 35890 topological_sort.go:64] AutoscalingGroup/nodes.test.k8s.example.io: [Subnet/us-west-2b.test.k8s.example.io LaunchConfiguration/nodes.test.k8s.example.io]
I1203 10:31:29.029316 35890 topological_sort.go:64] test.k8s.example.io-addons-kube-dns.addons.k8s.io-k8s-1.6: []
I1203 10:31:29.029322 35890 topological_sort.go:64] Secret/kube: []
I1203 10:31:29.029328 35890 topological_sort.go:64] Secret/system:logging: []
I1203 10:31:29.029334 35890 topological_sort.go:64] SecurityGroupRule/ssh-external-to-master-0.0.0.0/0: [SecurityGroup/masters.test.k8s.example.io]
I1203 10:31:29.029340 35890 topological_sort.go:64] IAMRolePolicy/masters.test.k8s.example.io: [IAMRole/masters.test.k8s.example.io DNSZone/Z3STZN85S7ZJGL]
I1203 10:31:29.029438 35890 topological_sort.go:64] Route/0.0.0.0/0: [RouteTable/test.k8s.example.io InternetGateway/test.k8s.example.io]
I1203 10:31:29.029454 35890 topological_sort.go:64] Keypair/kubelet: []
I1203 10:31:29.029460 35890 topological_sort.go:64] SecurityGroupRule/all-node-to-node: [SecurityGroup/nodes.test.k8s.example.io SecurityGroup/nodes.test.k8s.example.io]
I1203 10:31:29.029467 35890 topological_sort.go:64] Secret/system:dns: []
I1203 10:31:29.029473 35890 topological_sort.go:64] LaunchConfiguration/nodes.test.k8s.example.io: [SSHKey/kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0 SecurityGroup/nodes.test.k8s.example.io IAMInstanceProfile/nodes.test.k8s.example.io]
I1203 10:31:29.029483 35890 topological_sort.go:64] Secret/system:controller_manager: []
I1203 10:31:29.029506 35890 topological_sort.go:64] Keypair/kube-scheduler: []
I1203 10:31:29.029513 35890 topological_sort.go:64] VPCDHCPOptionsAssociation/test.k8s.example.io: [VPC/test.k8s.example.io DHCPOptions/test.k8s.example.io]
I1203 10:31:29.029521 35890 topological_sort.go:64] RouteTable/test.k8s.example.io: [VPC/test.k8s.example.io]
I1203 10:31:29.029527 35890 topological_sort.go:64] IAMRole/masters.test.k8s.example.io: []
I1203 10:31:29.029533 35890 topological_sort.go:64] test.k8s.example.io-addons-kube-dns.addons.k8s.io-pre-k8s-1.6: []
I1203 10:31:29.029539 35890 topological_sort.go:64] SecurityGroupRule/ssh-external-to-node-0.0.0.0/0: [SecurityGroup/nodes.test.k8s.example.io]
I1203 10:31:29.029546 35890 topological_sort.go:64] LaunchConfiguration/master-us-west-2b.masters.test.k8s.example.io: [SSHKey/kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0 SecurityGroup/masters.test.k8s.example.io IAMInstanceProfile/masters.test.k8s.example.io]
I1203 10:31:29.029633 35890 topological_sort.go:64] IAMRole/nodes.test.k8s.example.io: []
I1203 10:31:29.029653 35890 topological_sort.go:64] SecurityGroupRule/https-external-to-master-0.0.0.0/0: [SecurityGroup/masters.test.k8s.example.io]
I1203 10:31:29.029659 35890 topological_sort.go:64] test.k8s.example.io-addons-bootstrap: []
I1203 10:31:29.029664 35890 topological_sort.go:64] IAMRolePolicy/additional.masters.test.k8s.example.io: [IAMRole/masters.test.k8s.example.io]
I1203 10:31:29.029668 35890 topological_sort.go:64] IAMRolePolicy/additional.nodes.test.k8s.example.io: [IAMRole/nodes.test.k8s.example.io]
I1203 10:31:29.029673 35890 topological_sort.go:64] Keypair/kops: []
I1203 10:31:29.029678 35890 topological_sort.go:64] Secret/admin: []
I1203 10:31:29.029682 35890 topological_sort.go:64] SecurityGroup/masters.test.k8s.example.io: [VPC/test.k8s.example.io]
I1203 10:31:29.029751 35890 topological_sort.go:64] SecurityGroup/nodes.test.k8s.example.io: [VPC/test.k8s.example.io]
I1203 10:31:29.029765 35890 topological_sort.go:64] Keypair/master: []
I1203 10:31:29.029770 35890 topological_sort.go:64] SecurityGroupRule/all-master-to-master: [SecurityGroup/masters.test.k8s.example.io SecurityGroup/masters.test.k8s.example.io]
I1203 10:31:29.029777 35890 topological_sort.go:64] DNSZone/Z3STZN85S7ZJGL: []
I1203 10:31:29.029782 35890 topological_sort.go:64] Keypair/kubecfg: []
I1203 10:31:29.029786 35890 topological_sort.go:64] test.k8s.example.io-addons-dns-controller.addons.k8s.io-k8s-1.6: []
I1203 10:31:29.029791 35890 topological_sort.go:64] SecurityGroupRule/all-master-to-node: [SecurityGroup/nodes.test.k8s.example.io SecurityGroup/masters.test.k8s.example.io]
I1203 10:31:29.029801 35890 topological_sort.go:64] EBSVolume/b.etcd-main.test.k8s.example.io: []
I1203 10:31:29.029805 35890 topological_sort.go:64] Secret/kubelet: []
I1203 10:31:29.029839 35890 topological_sort.go:64] test.k8s.example.io-addons-storage-aws.addons.k8s.io: []
I1203 10:31:29.029856 35890 topological_sort.go:64] SecurityGroupRule/node-egress: [SecurityGroup/nodes.test.k8s.example.io]
I1203 10:31:29.029875 35890 topological_sort.go:64] Secret/kube-proxy: []
I1203 10:31:29.029882 35890 topological_sort.go:64] test.k8s.example.io-addons-limit-range.addons.k8s.io: []
I1203 10:31:29.029889 35890 topological_sort.go:64] test.k8s.example.io-addons-networking.projectcalico.org.canal-pre-k8s-1.6: []
I1203 10:31:29.029893 35890 topological_sort.go:64] EBSVolume/b.etcd-events.test.k8s.example.io: []
I1203 10:31:29.029898 35890 topological_sort.go:64] SSHKey/kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0:[]
I1203 10:31:29.029904 35890 topological_sort.go:64] Keypair/kube-proxy: []
I1203 10:31:29.029909 35890 topological_sort.go:64] SecurityGroupRule/node-to-master-udp-1-65535: [SecurityGroup/masters.test.k8s.example.io SecurityGroup/nodes.test.k8s.example.io]
I1203 10:31:29.029915 35890 topological_sort.go:64] IAMInstanceProfileRole/nodes.test.k8s.example.io: [IAMInstanceProfile/nodes.test.k8s.example.io IAMRole/nodes.test.k8s.example.io]
I1203 10:31:29.029920 35890 topological_sort.go:64] test.k8s.example.io-addons-core.addons.k8s.io: []
I1203 10:31:29.029925 35890 topological_sort.go:64] Subnet/us-west-2b.test.k8s.example.io: [VPC/test.k8s.example.io]
I1203 10:31:29.029930 35890 topological_sort.go:64] IAMInstanceProfile/nodes.test.k8s.example.io: []
I1203 10:31:29.029934 35890 topological_sort.go:64] test.k8s.example.io-addons-networking.projectcalico.org.canal-k8s-1.6: []
I1203 10:31:29.029939 35890 topological_sort.go:64] AutoscalingGroup/master-us-west-2b.masters.test.k8s.example.io: [Subnet/us-west-2b.test.k8s.example.io LaunchConfiguration/master-us-west-2b.masters.test.k8s.example.io]
I1203 10:31:29.029989 35890 topological_sort.go:64] IAMRolePolicy/nodes.test.k8s.example.io: [IAMRole/nodes.test.k8s.example.io DNSZone/Z3STZN85S7ZJGL]
I1203 10:31:29.030001 35890 topological_sort.go:64] Secret/system:scheduler: []
I1203 10:31:29.030006 35890 topological_sort.go:64] Secret/system:monitoring: []
I1203 10:31:29.030011 35890 topological_sort.go:64] SecurityGroupRule/node-to-master-tcp-1-4000: [SecurityGroup/masters.test.k8s.example.io SecurityGroup/nodes.test.k8s.example.io]
I1203 10:31:29.030016 35890 topological_sort.go:64] IAMInstanceProfile/masters.test.k8s.example.io: []
I1203 10:31:29.030021 35890 topological_sort.go:64] RouteTableAssociation/us-west-2b.test.k8s.example.io: [RouteTable/test.k8s.example.io Subnet/us-west-2b.test.k8s.example.io]
I1203 10:31:29.030110 35890 executor.go:91] Tasks: 0 done / 65 total; 36 can run
I1203 10:31:29.030514 35890 executor.go:157] Executing task "IAMInstanceProfile/masters.test.k8s.example.io": *awstasks.IAMInstanceProfile {"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":null}
I1203 10:31:29.030347 35890 executor.go:157] Executing task "IAMInstanceProfile/nodes.test.k8s.example.io": *awstasks.IAMInstanceProfile {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":null}
I1203 10:31:29.030505 35890 executor.go:157] Executing task "EBSVolume/b.etcd-events.test.k8s.example.io": *awstasks.EBSVolume {"Name":"b.etcd-events.test.k8s.example.io","Lifecycle":"Sync","ID":null,"AvailabilityZone":"us-west-2b","VolumeType":"gp2","SizeGB":20,"KmsKeyId":null,"Encrypted":false,"Tags":{"k8s.io/etcd/events":"b/b","k8s.io/role/master":"1"}}
I1203 10:31:29.030459 35890 executor.go:157] Executing task "Keypair/kubecfg": *fitasks.Keypair {"Name":"kubecfg","Lifecycle":"Sync","subject":"o=system:masters,cn=kubecfg","type":"client","alternateNames":null,"alternateNameTasks":null}
I1203 10:31:29.030305 35890 executor.go:157] Executing task "Keypair/kubelet": *fitasks.Keypair {"Name":"kubelet","Lifecycle":"Sync","subject":"o=system:nodes,cn=kubelet","type":"client","alternateNames":null,"alternateNameTasks":null}
I1203 10:31:29.030372 35890 executor.go:157] Executing task "Keypair/kops": *fitasks.Keypair {"Name":"kops","Lifecycle":"Sync","subject":"o=system:masters,cn=kops","type":"client","alternateNames":null,"alternateNameTasks":null}
I1203 10:31:29.030352 35890 executor.go:157] Executing task "EBSVolume/b.etcd-main.test.k8s.example.io": *awstasks.EBSVolume {"Name":"b.etcd-main.test.k8s.example.io","Lifecycle":"Sync","ID":null,"AvailabilityZone":"us-west-2b","VolumeType":"gp2","SizeGB":20,"KmsKeyId":null,"Encrypted":false,"Tags":{"k8s.io/etcd/main":"b/b","k8s.io/role/master":"1"}}
I1203 10:31:29.030389 35890 executor.go:157] Executing task "Keypair/kube-controller-manager": *fitasks.Keypair {"Name":"kube-controller-manager","Lifecycle":"Sync","subject":"cn=system:kube-controller-manager","type":"client","alternateNames":null,"alternateNameTasks":null}
I1203 10:31:29.030385 35890 executor.go:157] Executing task "DNSZone/Z3STZN85S7ZJGL": *awstasks.DNSZone {"Name":"Z3STZN85S7ZJGL","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z3STZN85S7ZJGL","Private":null,"PrivateVPC":null}
I1203 10:31:29.030502 35890 executor.go:157] Executing task "Keypair/kube-proxy": *fitasks.Keypair {"Name":"kube-proxy","Lifecycle":"Sync","subject":"cn=system:kube-proxy","type":"client","alternateNames":null,"alternateNameTasks":null}
I1203 10:31:29.030235 35890 executor.go:157] Executing task "Keypair/master": *fitasks.Keypair {"Name":"master","Lifecycle":"Sync","subject":"cn=kubernetes-master","type":"server","alternateNames":["kubernetes","kubernetes.default","kubernetes.default.svc","kubernetes.default.svc.cluster.local","api.test.k8s.example.io","api.internal.test.k8s.example.io","100.64.0.1","127.0.0.1"],"alternateNameTasks":null}
I1203 10:31:29.030596 35890 executor.go:157] Executing task "VPC/test.k8s.example.io": *awstasks.VPC {"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}
I1203 10:31:29.031182 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-controller-manager/"
I1203 10:31:29.030175 35890 executor.go:157] Executing task "Keypair/kube-scheduler": *fitasks.Keypair {"Name":"kube-scheduler","Lifecycle":"Sync","subject":"cn=system:kube-scheduler","type":"client","alternateNames":null,"alternateNameTasks":null}
I1203 10:31:29.031318 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-scheduler/"
I1203 10:31:29.032092 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1203 10:31:29.032278 35890 request_logger.go:45] AWS request: ec2/DescribeVpcs
I1203 10:31:29.032986 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-proxy/"
I1203 10:31:29.032281 35890 request_logger.go:45] AWS request: ec2/DescribeVolumes
I1203 10:31:29.030455 35890 executor.go:157] Executing task "DHCPOptions/test.k8s.example.io": *awstasks.DHCPOptions {"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":null,"DomainName":"us-west-2.compute.internal","DomainNameServers":"AmazonProvidedDNS"}
I1203 10:31:29.032419 35890 request_logger.go:45] AWS request: ec2/DescribeVolumes
I1203 10:31:29.032434 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubecfg/"
I1203 10:31:29.033477 35890 request_logger.go:45] AWS request: route53/GetHostedZone
I1203 10:31:29.033492 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1203 10:31:29.030207 35890 executor.go:157] Executing task "Secret/system:dns": *fitasks.Secret {"Name":"system:dns","Lifecycle":"Sync"}
I1203 10:31:29.030300 35890 executor.go:157] Executing task "Secret/system:scheduler": *fitasks.Secret {"Name":"system:scheduler","Lifecycle":"Sync"}
I1203 10:31:29.030413 35890 executor.go:157] Executing task "Secret/kube-proxy": *fitasks.Secret {"Name":"kube-proxy","Lifecycle":"Sync"}
I1203 10:31:29.032613 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/master/"
I1203 10:31:29.030527 35890 executor.go:157] Executing task "Secret/kube": *fitasks.Secret {"Name":"kube","Lifecycle":"Sync"}
I1203 10:31:29.030487 35890 executor.go:157] Executing task "Secret/system:monitoring": *fitasks.Secret {"Name":"system:monitoring","Lifecycle":"Sync"}
I1203 10:31:29.033695 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler"
I1203 10:31:29.033719 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring"
I1203 10:31:29.030178 35890 executor.go:157] Executing task "test.k8s.example.io-addons-core.addons.k8s.io": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-core.addons.k8s.io","Lifecycle":"Sync","Location":"addons/core.addons.k8s.io/v1.4.0.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.033978 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/core.addons.k8s.io/v1.4.0.yaml"
I1203 10:31:29.030557 35890 executor.go:157] Executing task "Secret/system:logging": *fitasks.Secret {"Name":"system:logging","Lifecycle":"Sync"}
I1203 10:31:29.032566 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubelet/"
I1203 10:31:29.034121 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging"
I1203 10:31:29.032622 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kops/"
I1203 10:31:29.034165 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy"
I1203 10:31:29.030371 35890 executor.go:157] Executing task "IAMRole/nodes.test.k8s.example.io": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}
I1203 10:31:29.033456 35890 request_logger.go:45] AWS request: ec2/DescribeDhcpOptions
I1203 10:31:29.030355 35890 executor.go:157] Executing task "Secret/system:controller_manager": *fitasks.Secret {"Name":"system:controller_manager","Lifecycle":"Sync"}
I1203 10:31:29.030314 35890 executor.go:157] Executing task "Secret/kubelet": *fitasks.Secret {"Name":"kubelet","Lifecycle":"Sync"}
I1203 10:31:29.030235 35890 executor.go:157] Executing task "Secret/admin": *fitasks.Secret {"Name":"admin","Lifecycle":"Sync"}
I1203 10:31:29.030430 35890 executor.go:157] Executing task "test.k8s.example.io-addons-kube-dns.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-kube-dns.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.030544 35890 executor.go:157] Executing task "test.k8s.example.io-addons-limit-range.addons.k8s.io": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-limit-range.addons.k8s.io","Lifecycle":"Sync","Location":"addons/limit-range.addons.k8s.io/v1.5.0.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.034449 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager"
I1203 10:31:29.034458 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:29.030568 35890 executor.go:157] Executing task "test.k8s.example.io-addons-dns-controller.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-dns-controller.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.030289 35890 executor.go:157] Executing task "test.k8s.example.io-addons-bootstrap": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-bootstrap","Lifecycle":"Sync","Location":"addons/bootstrap-channel.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.034575 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:29.030544 35890 executor.go:157] Executing task "IAMRole/masters.test.k8s.example.io": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"masters.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}
I1203 10:31:29.034638 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet"
I1203 10:31:29.034738 35890 request_logger.go:45] AWS request: iam/GetRole
I1203 10:31:29.034433 35890 request_logger.go:45] AWS request: iam/GetRole
I1203 10:31:29.034586 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/bootstrap-channel.yaml"
I1203 10:31:29.034473 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1203 10:31:29.034831 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin"
I1203 10:31:29.034866 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns"
I1203 10:31:29.030319 35890 executor.go:157] Executing task "test.k8s.example.io-addons-dns-controller.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-dns-controller.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.035003 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:29.030173 35890 executor.go:157] Executing task "SSHKey/kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0": *awstasks.SSHKey {"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":null}
I1203 10:31:29.030342 35890 executor.go:157] Executing task "test.k8s.example.io-addons-networking.projectcalico.org.canal-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-networking.projectcalico.org.canal-k8s-1.6","Lifecycle":"Sync","Location":"addons/networking.projectcalico.org.canal/k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.035227 35890 sshkey.go:210] Computed SSH key fingerprint as "22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"
I1203 10:31:29.030285 35890 executor.go:157] Executing task "test.k8s.example.io-addons-storage-aws.addons.k8s.io": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-storage-aws.addons.k8s.io","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.6.0.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.035247 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/networking.projectcalico.org.canal/k8s-1.6.yaml"
I1203 10:31:29.035275 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1203 10:31:29.030331 35890 executor.go:157] Executing task "test.k8s.example.io-addons-kube-dns.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-kube-dns.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.035413 35890 request_logger.go:45] AWS request: ec2/DescribeKeyPairs
I1203 10:31:29.035425 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:29.030225 35890 executor.go:157] Executing task "test.k8s.example.io-addons-networking.projectcalico.org.canal-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"test.k8s.example.io-addons-networking.projectcalico.org.canal-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":{}}}
I1203 10:31:29.035100 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube"
I1203 10:31:29.035517 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml"
I1203 10:31:29.094600 35890 vpc.go:154] Creating VPC with CIDR: "172.20.0.0/16"
I1203 10:31:29.094787 35890 request_logger.go:45] AWS request: ec2/CreateVpc
I1203 10:31:29.142056 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-controller-manager: []
I1203 10:31:29.142117 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-controller-manager/"
I1203 10:31:29.196176 35890 ebsvolume.go:134] Creating PersistentVolume with Name:"b.etcd-events.test.k8s.example.io"
I1203 10:31:29.196449 35890 request_logger.go:45] AWS request: ec2/CreateVolume
I1203 10:31:29.217007 35890 dhcp_options.go:133] Creating DHCPOptions with Name:"test.k8s.example.io"
I1203 10:31:29.217188 35890 request_logger.go:45] AWS request: ec2/CreateDhcpOptions
I1203 10:31:29.225882 35890 sshkey.go:226] Creating SSHKey with Name:"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0"
I1203 10:31:29.226101 35890 request_logger.go:45] AWS request: ec2/ImportKeyPair
I1203 10:31:29.246240 35890 ebsvolume.go:134] Creating PersistentVolume with Name:"b.etcd-main.test.k8s.example.io"
I1203 10:31:29.246542 35890 request_logger.go:45] AWS request: ec2/CreateVolume
I1203 10:31:29.265866 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-scheduler: []
I1203 10:31:29.265957 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-scheduler/"
I1203 10:31:29.300338 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:29.320867 35890 request_logger.go:45] AWS request: ec2/ModifyVpcAttribute
I1203 10:31:29.342912 35890 aws_cloud.go:407] adding tags to "dopt-b55b73d3": map[Name:test.k8s.example.io KubernetesCluster:test.k8s.example.io]
I1203 10:31:29.343087 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:29.369862 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-proxy: []
I1203 10:31:29.369945 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-proxy/"
I1203 10:31:29.370363 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:29.419944 35890 aws_cloud.go:407] adding tags to "vol-047b542314a60d879": map[Name:b.etcd-events.test.k8s.example.io KubernetesCluster:test.k8s.example.io k8s.io/etcd/events:b/b k8s.io/role/master:1]
I1203 10:31:29.420189 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:29.443839 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns"
I1203 10:31:29.445696 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy"
I1203 10:31:29.449617 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin"
I1203 10:31:29.449659 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:29.449690 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=5047
I1203 10:31:29.449754 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1203 10:31:29.449774 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" SSE="AES256" ACL="" BodyLen=458
I1203 10:31:29.449825 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring"
I1203 10:31:29.450763 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler"
I1203 10:31:29.450852 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:29.450881 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=6392
I1203 10:31:29.456669 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubelet: []
I1203 10:31:29.456700 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubelet/"
I1203 10:31:29.471702 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1203 10:31:29.471734 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/limit-range.addons.k8s.io/v1.5.0.yaml" SSE="AES256" ACL="" BodyLen=150
I1203 10:31:29.472737 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kops: []
I1203 10:31:29.472780 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kops/"
I1203 10:31:29.473887 35890 request_logger.go:45] AWS request: ec2/ModifyVpcAttribute
I1203 10:31:29.487709 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/master: []
I1203 10:31:29.487742 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/master/"
I1203 10:31:29.503823 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:29.510292 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg: []
I1203 10:31:29.510336 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubecfg/"
I1203 10:31:29.516978 35890 iaminstanceprofile.go:107] Creating IAMInstanceProfile with Name:"masters.test.k8s.example.io"
I1203 10:31:29.517132 35890 request_logger.go:45] AWS request: iam/CreateInstanceProfile
I1203 10:31:29.520585 35890 iamrole.go:143] Creating IAMRole with Name:"nodes.test.k8s.example.io"
I1203 10:31:29.520757 35890 request_logger.go:45] AWS request: iam/CreateRole
I1203 10:31:29.524714 35890 iamrole.go:143] Creating IAMRole with Name:"masters.test.k8s.example.io"
I1203 10:31:29.524795 35890 request_logger.go:45] AWS request: iam/CreateRole
I1203 10:31:29.529110 35890 iaminstanceprofile.go:107] Creating IAMInstanceProfile with Name:"nodes.test.k8s.example.io"
I1203 10:31:29.529183 35890 request_logger.go:45] AWS request: iam/CreateInstanceProfile
I1203 10:31:29.540771 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging"
I1203 10:31:29.543331 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/bootstrap-channel.yaml"
I1203 10:31:29.543378 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/bootstrap-channel.yaml" SSE="AES256" ACL="" BodyLen=1887
I1203 10:31:29.544632 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1203 10:31:29.544667 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=1078
I1203 10:31:29.546228 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet"
I1203 10:31:29.547566 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1203 10:31:29.547603 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=2136
I1203 10:31:29.547924 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager"
I1203 10:31:29.549321 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/networking.projectcalico.org.canal/k8s-1.6.yaml"
I1203 10:31:29.549351 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/networking.projectcalico.org.canal/k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=6165
I1203 10:31:29.551054 35890 aws_cloud.go:407] adding tags to "vol-02fab5cd2d1effbf3": map[KubernetesCluster:test.k8s.example.io k8s.io/etcd/main:b/b k8s.io/role/master:1 Name:b.etcd-main.test.k8s.example.io]
I1203 10:31:29.551228 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:29.556877 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube"
I1203 10:31:29.575024 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml"
I1203 10:31:29.575058 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" SSE="AES256" ACL="" BodyLen=4363
I1203 10:31:29.575383 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/addons/core.addons.k8s.io/v1.4.0.yaml"
I1203 10:31:29.575411 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/addons/core.addons.k8s.io/v1.4.0.yaml" SSE="AES256" ACL="" BodyLen=61
I1203 10:31:29.629249 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-scheduler: []
I1203 10:31:29.629391 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns"
I1203 10:31:29.629489 35890 keypair.go:169] Creating PKI keypair "kube-scheduler"
I1203 10:31:29.629496 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:29.629532 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-scheduler/"
I1203 10:31:29.636422 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1203 10:31:29.649002 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1203 10:31:29.662038 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubelet: []
I1203 10:31:29.662208 35890 keypair.go:169] Creating PKI keypair "kubelet"
I1203 10:31:29.662255 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubelet/"
I1203 10:31:29.675895 35890 aws_cloud.go:407] adding tags to "vpc-94435af2": map[KubernetesCluster:test.k8s.example.io Name:test.k8s.example.io kubernetes.io/cluster/test.k8s.example.io:owned]
I1203 10:31:29.676075 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:29.708473 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kops: []
I1203 10:31:29.708666 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/master: []
I1203 10:31:29.708706 35890 keypair.go:169] Creating PKI keypair "kops"
I1203 10:31:29.708756 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kops/"
I1203 10:31:29.708791 35890 keypair.go:169] Creating PKI keypair "master"
I1203 10:31:29.708820 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/master/"
I1203 10:31:29.739118 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg: []
I1203 10:31:29.739285 35890 keypair.go:169] Creating PKI keypair "kubecfg"
I1203 10:31:29.739321 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubecfg/"
I1203 10:31:29.745948 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-controller-manager: []
I1203 10:31:29.746088 35890 keypair.go:169] Creating PKI keypair "kube-controller-manager"
I1203 10:31:29.746114 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-controller-manager/"
I1203 10:31:29.750816 35890 iaminstanceprofile.go:137] Found IAM instance profile "masters.test.k8s.example.io"
I1203 10:31:29.780042 35890 iaminstanceprofile.go:137] Found IAM instance profile "nodes.test.k8s.example.io"
I1203 10:31:29.810445 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns"
I1203 10:31:29.810485 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:dns" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:29.855930 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-scheduler: []
I1203 10:31:29.855984 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-scheduler/"
I1203 10:31:29.880237 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/master: []
I1203 10:31:29.880269 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/master/"
I1203 10:31:29.882368 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubelet: []
I1203 10:31:29.882395 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubelet/"
I1203 10:31:29.885534 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-controller-manager: []
I1203 10:31:29.885555 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-controller-manager/"
I1203 10:31:29.910261 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kops: []
I1203 10:31:29.910303 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kops/"
I1203 10:31:29.912015 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg: []
I1203 10:31:29.912055 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubecfg/"
I1203 10:31:29.942381 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:dns"
I1203 10:31:29.942431 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy"
I1203 10:31:29.970377 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-scheduler: []
I1203 10:31:30.015380 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubelet: []
I1203 10:31:30.015406 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/master: []
I1203 10:31:30.015967 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kops: []
I1203 10:31:30.018434 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg: []
I1203 10:31:30.033982 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-controller-manager: []
I1203 10:31:30.049434 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy"
I1203 10:31:30.049460 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/kube-proxy" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:30.149982 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-proxy: []
I1203 10:31:30.150076 35890 keypair.go:169] Creating PKI keypair "kube-proxy"
I1203 10:31:30.150093 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kube-proxy/"
I1203 10:31:30.170298 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube-proxy"
I1203 10:31:30.170614 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring"
I1203 10:31:30.218728 35890 vfs_castore.go:422] Issuing new certificate: "kops"
I1203 10:31:30.218789 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/ca/"
I1203 10:31:30.250745 35890 vfs_castore.go:422] Issuing new certificate: "master"
I1203 10:31:30.306540 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring"
I1203 10:31:30.306574 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:monitoring" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:30.322187 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-proxy: []
I1203 10:31:30.322234 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kube-proxy/"
I1203 10:31:30.397907 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca: []
I1203 10:31:30.424763 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:monitoring"
I1203 10:31:30.424779 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler"
I1203 10:31:30.429982 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-proxy: []
I1203 10:31:30.512627 35890 vfs_castore.go:422] Issuing new certificate: "kube-controller-manager"
I1203 10:31:30.596734 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler"
I1203 10:31:30.596767 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:scheduler" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:30.634791 35890 vfs_castore.go:422] Issuing new certificate: "kubecfg"
I1203 10:31:30.705282 35890 vfs_castore.go:422] Issuing new certificate: "kube-scheduler"
I1203 10:31:30.709580 35890 vfs_castore.go:422] Issuing new certificate: "kubelet"
I1203 10:31:30.729207 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:scheduler"
I1203 10:31:30.729241 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin"
I1203 10:31:30.832537 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin"
I1203 10:31:30.832561 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/admin" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:30.938759 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/admin"
I1203 10:31:30.938788 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging"
I1203 10:31:30.944808 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key"
I1203 10:31:30.944839 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key" SSE="AES256" ACL="" BodyLen=1679
I1203 10:31:31.039490 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging"
I1203 10:31:31.039519 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:logging" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:31.045049 35890 vfs_castore.go:422] Issuing new certificate: "kube-proxy"
I1203 10:31:31.147855 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/ca/"
I1203 10:31:31.163295 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:logging"
I1203 10:31:31.163328 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet"
I1203 10:31:31.266813 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key]
I1203 10:31:31.266853 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key"
I1203 10:31:31.356128 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet"
I1203 10:31:31.356168 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/kubelet" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:31.370285 35890 ca.go:395] Parsing pem block: "RSA PRIVATE KEY"
I1203 10:31:31.370722 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt"
I1203 10:31:31.370741 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt" SSE="AES256" ACL="" BodyLen=1046
I1203 10:31:31.466102 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kubelet"
I1203 10:31:31.466123 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager"
I1203 10:31:31.474940 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/ca/"
I1203 10:31:31.584263 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt]
I1203 10:31:31.584299 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt"
I1203 10:31:31.584762 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager"
I1203 10:31:31.584793 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/system:controller_manager" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:31.685978 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:31.691089 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-controller-manager/6495390240644720569490410739.key"
I1203 10:31:31.691119 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kube-controller-manager/6495390240644720569490410739.key" SSE="AES256" ACL="" BodyLen=1675
I1203 10:31:31.693242 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/master/6495390239520972701276977581.key"
I1203 10:31:31.693269 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/master/6495390239520972701276977581.key" SSE="AES256" ACL="" BodyLen=1679
I1203 10:31:31.693412 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg/6495390241170448363893406246.key"
I1203 10:31:31.693429 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubelet/6495390241491692548329293100.key"
I1203 10:31:31.693454 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kubelet/6495390241491692548329293100.key" SSE="AES256" ACL="" BodyLen=1679
I1203 10:31:31.693435 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kubecfg/6495390241170448363893406246.key" SSE="AES256" ACL="" BodyLen=1675
I1203 10:31:31.693757 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kops/6495390239383399988241973783.key"
I1203 10:31:31.693777 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kops/6495390239383399988241973783.key" SSE="AES256" ACL="" BodyLen=1679
I1203 10:31:31.694313 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-proxy/6495390242932509451645604935.key"
I1203 10:31:31.694338 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kube-proxy/6495390242932509451645604935.key" SSE="AES256" ACL="" BodyLen=1675
I1203 10:31:31.694337 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kube-scheduler/6495390241473216285367084156.key"
I1203 10:31:31.694359 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/private/kube-scheduler/6495390241473216285367084156.key" SSE="AES256" ACL="" BodyLen=1679
I1203 10:31:31.800772 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/master/6495390239520972701276977581.crt"
I1203 10:31:31.800810 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/master/6495390239520972701276977581.crt" SSE="AES256" ACL="" BodyLen=1334
I1203 10:31:31.824536 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-controller-manager/6495390240644720569490410739.crt"
I1203 10:31:31.824567 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kube-controller-manager/6495390240644720569490410739.crt" SSE="AES256" ACL="" BodyLen=1090
I1203 10:31:31.909744 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubelet/6495390241491692548329293100.crt"
I1203 10:31:31.909783 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kubelet/6495390241491692548329293100.crt" SSE="AES256" ACL="" BodyLen=1090
I1203 10:31:31.966292 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt"
I1203 10:31:31.966330 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt" SSE="AES256" ACL="" BodyLen=1094
I1203 10:31:32.032001 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/system:controller_manager"
I1203 10:31:32.032022 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube"
I1203 10:31:32.032021 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kops/6495390239383399988241973783.crt"
I1203 10:31:32.032154 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kops/6495390239383399988241973783.crt" SSE="AES256" ACL="" BodyLen=1090
I1203 10:31:32.082103 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-scheduler/6495390241473216285367084156.crt"
I1203 10:31:32.082125 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kube-scheduler/6495390241473216285367084156.crt" SSE="AES256" ACL="" BodyLen=1078
I1203 10:31:32.092038 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-proxy/6495390242932509451645604935.crt"
I1203 10:31:32.092070 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/pki/issued/kube-proxy/6495390242932509451645604935.crt" SSE="AES256" ACL="" BodyLen=1074
I1203 10:31:32.092952 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/master/6495390239520972701276977581.crt"
I1203 10:31:32.109714 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-controller-manager/6495390240644720569490410739.crt"
I1203 10:31:32.167474 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt"
I1203 10:31:32.169244 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubelet/6495390241491692548329293100.crt"
I1203 10:31:32.190857 35890 s3fs.go:110] Writing file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube"
I1203 10:31:32.190892 35890 s3fs.go:130] Calling S3 PutObject Bucket="clusters.k8s.example.io" Key="test.k8s.example.io/secrets/kube" SSE="AES256" ACL="" BodyLen=55
I1203 10:31:32.203591 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kops/6495390239383399988241973783.crt"
I1203 10:31:32.236773 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-proxy/6495390242932509451645604935.crt"
I1203 10:31:32.269291 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:32.269460 35890 keypair.go:191] created certificate &{{[] [] [] [] [] [] [] kubernetes-master [{2.5.4.3 kubernetes-master}] []} false 0xc421054500 0xc420bc98d0}
I1203 10:31:32.271897 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:32.272042 35890 keypair.go:191] created certificate &{{[] [] [] [] [] [] [] system:kube-controller-manager [{2.5.4.3 system:kube-controller-manager}] []} false 0xc4214c1900 0xc4210c8910}
I1203 10:31:32.288240 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kube-scheduler/6495390241473216285367084156.crt"
I1203 10:31:32.289408 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:32.289555 35890 keypair.go:191] created certificate &{{[] [system:masters] [] [] [] [] [] kubecfg [{2.5.4.10 system:masters} {2.5.4.3 kubecfg}] []} false 0xc421004000 0xc4210c8e80}
I1203 10:31:32.295978 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:32.296138 35890 keypair.go:191] created certificate &{{[] [system:nodes] [] [] [] [] [] kubelet [{2.5.4.10 system:nodes} {2.5.4.3 kubelet}] []} false 0xc4211c8500 0xc420caefd0}
I1203 10:31:32.300553 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube"
I1203 10:31:32.309214 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:32.309364 35890 keypair.go:191] created certificate &{{[] [system:masters] [] [] [] [] [] kops [{2.5.4.10 system:masters} {2.5.4.3 kops}] []} false 0xc421004f00 0xc420cb0680}
I1203 10:31:32.339543 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:32.339692 35890 keypair.go:191] created certificate &{{[] [] [] [] [] [] [] system:kube-proxy [{2.5.4.3 system:kube-proxy}] []} false 0xc421005400 0xc420cb0a20}
I1203 10:31:32.412695 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:32.412807 35890 keypair.go:191] created certificate &{{[] [] [] [] [] [] [] system:kube-scheduler [{2.5.4.3 system:kube-scheduler}] []} false 0xc42121c000 0xc42020b6d0}
I1203 10:31:32.412857 35890 executor.go:91] Tasks: 36 done / 65 total; 12 can run
I1203 10:31:32.412894 35890 executor.go:157] Executing task "VPCDHCPOptionsAssociation/test.k8s.example.io": *awstasks.VPCDHCPOptionsAssociation {"Name":"test.k8s.example.io","Lifecycle":"Sync","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"DHCPOptions":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"dopt-b55b73d3","DomainName":"us-west-2.compute.internal","DomainNameServers":"AmazonProvidedDNS"}}
I1203 10:31:32.412992 35890 executor.go:157] Executing task "IAMRolePolicy/additional.nodes.test.k8s.example.io": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.nodes.test.k8s.example.io","Role":{"ID":"AROAIFNA4X2WHNFBXGKPS","Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Name":"","Resource":""}}
I1203 10:31:32.413012 35890 executor.go:157] Executing task "IAMRolePolicy/additional.masters.test.k8s.example.io": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.masters.test.k8s.example.io","Role":{"ID":"AROAJ6VV455WIHSQMC3F4","Lifecycle":"Sync","Name":"masters.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Name":"","Resource":""}}
I1203 10:31:32.413157 35890 aws_cloud.go:556] Calling DescribeVPC for VPC "vpc-94435af2"
I1203 10:31:32.412937 35890 executor.go:157] Executing task "InternetGateway/test.k8s.example.io": *awstasks.InternetGateway {"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":null,"VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"Shared":false}
I1203 10:31:32.412901 35890 executor.go:157] Executing task "IAMInstanceProfileRole/masters.test.k8s.example.io": *awstasks.IAMInstanceProfileRole {"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","InstanceProfile":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJHOL6F7GKSEPBF634"},"Role":{"ID":"AROAJ6VV455WIHSQMC3F4","Lifecycle":"Sync","Name":"masters.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}}
I1203 10:31:32.412950 35890 executor.go:157] Executing task "SecurityGroup/masters.test.k8s.example.io": *awstasks.SecurityGroup {"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null}
I1203 10:31:32.413312 35890 request_logger.go:45] AWS request: iam/GetRolePolicy
I1203 10:31:32.413366 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1203 10:31:32.412970 35890 executor.go:157] Executing task "SecurityGroup/nodes.test.k8s.example.io": *awstasks.SecurityGroup {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null}
I1203 10:31:32.413313 35890 request_logger.go:45] AWS request: iam/GetRolePolicy
I1203 10:31:32.413537 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:32.412987 35890 executor.go:157] Executing task "RouteTable/test.k8s.example.io": *awstasks.RouteTable {"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":null,"VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}}
I1203 10:31:32.413399 35890 request_logger.go:45] AWS request: ec2/DescribeInternetGateways
I1203 10:31:32.412911 35890 executor.go:157] Executing task "IAMRolePolicy/nodes.test.k8s.example.io": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","Role":{"ID":"AROAIFNA4X2WHNFBXGKPS","Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"test.k8s.example.io","creationTimestamp":"2017-12-03T18:31:25Z"},"spec":{"channel":"stable","configBase":"s3://clusters.k8s.example.io/test.k8s.example.io","cloudProvider":"aws","kubernetesVersion":"1.7.10","subnets":[{"name":"us-west-2b","zone":"us-west-2b","cidr":"172.20.32.0/19","type":"Public"}],"masterPublicName":"api.test.k8s.example.io","masterInternalName":"api.internal.test.k8s.example.io","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://clusters.k8s.example.io/test.k8s.example.io/secrets","keyStore":"s3://clusters.k8s.example.io/test.k8s.example.io/pki","configStore":"s3://clusters.k8s.example.io/test.k8s.example.io","dnsZone":"Z3STZN85S7ZJGL","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","etcdMembers":[{"name":"b","instanceGroup":"master-us-west-2b"}]},{"name":"events","etcdMembers":[{"name":"b","instanceGroup":"master-us-west-2b"}]}],"docker":{"bridge":"","logLevel":"warn","ipTables":false,"ipMasq":false,"logDriver":"json-file","logOpt":["max-size=10m","max-file=5"],"storage":"overlay,aufs","version":"1.12.6"},"kubeDNS":{"image":"gcr.io/google_containers/kubedns-amd64:1.3","replicas":2,"domain":"cluster.local","serverIP":"100.64.0.10"},"kubeAPIServer":{"image":"gcr.io/google_containers/kube-apiserver:v1.7.10","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"address":"127.0.0.1","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"admissionControl":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd2","authorizationMode":"AlwaysAllow"},"kubeControllerManager":{"logLevel":2,"image":"gcr.io/google_containers/kube-controller-manager:v1.7.10","cloudProvider":"aws","clusterName":"test.k8s.example.io","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"gcr.io/google_containers/kube-scheduler:v1.7.10","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"gcr.io/google_containers/kube-proxy:v1.7.10","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"kubeconfigPath":"/var/lib/kubelet/kubeconfig","requireKubeconfig":true,"logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"masterKubelet":{"kubeconfigPath":"/var/lib/kubelet/kubeconfig","requireKubeconfig":true,"logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"networking":{"canal":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}}}},"Role":"Node","Region":"us-west-2","HostedZoneID":""},"DNSZone":{"Name":"Z3STZN85S7ZJGL","Lifecycle":"Sync","DNSName":"k8s.example.io","ZoneID":"Z3STZN85S7ZJGL","Private":null,"PrivateVPC":null}}}
I1203 10:31:32.413301 35890 request_logger.go:45] AWS request: ec2/DescribeVpcs
I1203 10:31:32.412946 35890 executor.go:157] Executing task "IAMInstanceProfileRole/nodes.test.k8s.example.io": *awstasks.IAMInstanceProfileRole {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","InstanceProfile":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJLWAGCDBPKNVBVYTY"},"Role":{"ID":"AROAIFNA4X2WHNFBXGKPS","Lifecycle":"Sync","Name":"nodes.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}}
I1203 10:31:32.413029 35890 executor.go:157] Executing task "Subnet/us-west-2b.test.k8s.example.io": *awstasks.Subnet {"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":null,"VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"AvailabilityZone":"us-west-2b","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"us-west-2b.test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}
I1203 10:31:32.414016 35890 request_logger.go:45] AWS request: iam/GetRolePolicy
I1203 10:31:32.413645 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:32.412923 35890 executor.go:157] Executing task "IAMRolePolicy/masters.test.k8s.example.io": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"masters.test.k8s.example.io","Role":{"ID":"AROAJ6VV455WIHSQMC3F4","Lifecycle":"Sync","Name":"masters.test.k8s.example.io","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"test.k8s.example.io","creationTimestamp":"2017-12-03T18:31:25Z"},"spec":{"channel":"stable","configBase":"s3://clusters.k8s.example.io/test.k8s.example.io","cloudProvider":"aws","kubernetesVersion":"1.7.10","subnets":[{"name":"us-west-2b","zone":"us-west-2b","cidr":"172.20.32.0/19","type":"Public"}],"masterPublicName":"api.test.k8s.example.io","masterInternalName":"api.internal.test.k8s.example.io","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://clusters.k8s.example.io/test.k8s.example.io/secrets","keyStore":"s3://clusters.k8s.example.io/test.k8s.example.io/pki","configStore":"s3://clusters.k8s.example.io/test.k8s.example.io","dnsZone":"Z3STZN85S7ZJGL","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","etcdMembers":[{"name":"b","instanceGroup":"master-us-west-2b"}]},{"name":"events","etcdMembers":[{"name":"b","instanceGroup":"master-us-west-2b"}]}],"docker":{"bridge":"","logLevel":"warn","ipTables":false,"ipMasq":false,"logDriver":"json-file","logOpt":["max-size=10m","max-file=5"],"storage":"overlay,aufs","version":"1.12.6"},"kubeDNS":{"image":"gcr.io/google_containers/kubedns-amd64:1.3","replicas":2,"domain":"cluster.local","serverIP":"100.64.0.10"},"kubeAPIServer":{"image":"gcr.io/google_containers/kube-apiserver:v1.7.10","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"address":"127.0.0.1","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"admissionControl":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd2","authorizationMode":"AlwaysAllow"},"kubeControllerManager":{"logLevel":2,"image":"gcr.io/google_containers/kube-controller-manager:v1.7.10","cloudProvider":"aws","clusterName":"test.k8s.example.io","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"gcr.io/google_containers/kube-scheduler:v1.7.10","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"gcr.io/google_containers/kube-proxy:v1.7.10","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"kubeconfigPath":"/var/lib/kubelet/kubeconfig","requireKubeconfig":true,"logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"masterKubelet":{"kubeconfigPath":"/var/lib/kubelet/kubeconfig","requireKubeconfig":true,"logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"gcr.io/google_containers/pause-amd64:3.0","allowPrivileged":true,"enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%"},"networking":{"canal":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}}}},"Role":"Master","Region":"us-west-2","HostedZoneID":""},"DNSZone":{"Name":"Z3STZN85S7ZJGL","Lifecycle":"Sync","DNSName":"k8s.example.io","ZoneID":"Z3STZN85S7ZJGL","Private":null,"PrivateVPC":null}}}
I1203 10:31:32.413731 35890 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1203 10:31:32.414084 35890 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1203 10:31:32.414150 35890 request_logger.go:45] AWS request: ec2/DescribeSubnets
I1203 10:31:32.414458 35890 request_logger.go:45] AWS request: iam/GetRolePolicy
I1203 10:31:32.474820 35890 internetgateway.go:137] Creating InternetGateway
I1203 10:31:32.475077 35890 request_logger.go:45] AWS request: ec2/CreateInternetGateway
I1203 10:31:32.528819 35890 request_logger.go:45] AWS request: iam/AddRoleToInstanceProfile
I1203 10:31:32.543810 35890 securitygroup.go:167] Creating SecurityGroup with Name:"masters.test.k8s.example.io" VPC:"vpc-94435af2"
I1203 10:31:32.543977 35890 request_logger.go:45] AWS request: ec2/CreateSecurityGroup
I1203 10:31:32.548327 35890 securitygroup.go:167] Creating SecurityGroup with Name:"nodes.test.k8s.example.io" VPC:"vpc-94435af2"
I1203 10:31:32.548436 35890 request_logger.go:45] AWS request: ec2/CreateSecurityGroup
I1203 10:31:32.576550 35890 changes.go:80] Field changed "DHCPOptions" actual="{<nil> <nil> 0xc420aea928 <nil> <nil>}" expected="{0xc4211d1c80 0xc42040ac90 0xc420531ca8 0xc4211d1ca0 0xc4211d1c90}"
I1203 10:31:32.576679 35890 vpc_dhcpoptions_association.go:89] calling EC2 AssociateDhcpOptions
I1203 10:31:32.576826 35890 request_logger.go:45] AWS request: ec2/AssociateDhcpOptions
I1203 10:31:32.598827 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:32.600743 35890 routetable.go:119] Creating RouteTable with VPC: "vpc-94435af2"
I1203 10:31:32.600973 35890 request_logger.go:45] AWS request: ec2/CreateRouteTable
I1203 10:31:32.602626 35890 subnet.go:167] Creating Subnet with CIDR: "172.20.32.0/19"
I1203 10:31:32.603219 35890 request_logger.go:45] AWS request: ec2/CreateSubnet
I1203 10:31:32.609190 35890 internetgateway.go:150] Creating InternetGatewayAttachment
I1203 10:31:32.609284 35890 request_logger.go:45] AWS request: ec2/AttachInternetGateway
I1203 10:31:32.645977 35890 aws_cloud.go:407] adding tags to "sg-615f8d1d": map[Name:masters.test.k8s.example.io KubernetesCluster:test.k8s.example.io]
I1203 10:31:32.646317 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:32.661790 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/pki/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.661825 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.661838 35890 iam_builder.go:221] Found root location "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.662193 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/pki/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.662212 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.662223 35890 iam_builder.go:221] Found root location "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.662316 35890 iamrolepolicy.go:146] Creating IAMRolePolicy
I1203 10:31:32.662335 35890 iamrolepolicy.go:174] PutRolePolicy RoleName=nodes.test.k8s.example.io PolicyName=nodes.test.k8s.example.io: {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:Describe*"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"ecr:GetAuthorizationToken",
"ecr:BatchCheckLayerAvailability",
"ecr:GetDownloadUrlForLayer",
"ecr:GetRepositoryPolicy",
"ecr:DescribeRepositories",
"ecr:ListImages",
"ecr:BatchGetImage"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"route53:ChangeResourceRecordSets",
"route53:ListResourceRecordSets",
"route53:GetHostedZone"
],
"Resource": [
"arn:aws:route53:::hostedzone/Z3STZN85S7ZJGL"
]
},
{
"Effect": "Allow",
"Action": [
"route53:GetChange"
],
"Resource": [
"arn:aws:route53:::change/*"
]
},
{
"Effect": "Allow",
"Action": [
"route53:ListHostedZones"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:*"
],
"Resource": [
"arn:aws:s3:::clusters.k8s.example.io/test.k8s.example.io",
"arn:aws:s3:::clusters.k8s.example.io/test.k8s.example.io/*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:GetBucketLocation",
"s3:ListBucket"
],
"Resource": [
"arn:aws:s3:::clusters.k8s.example.io"
]
}
]
}
I1203 10:31:32.662609 35890 request_logger.go:45] AWS request: iam/PutRolePolicy
I1203 10:31:32.677575 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:32.699654 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:32.721544 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:32.747348 35890 aws_cloud.go:407] adding tags to "igw-87a144e1": map[Name:test.k8s.example.io KubernetesCluster:test.k8s.example.io]
I1203 10:31:32.747554 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:32.764346 35890 aws_cloud.go:407] adding tags to "sg-e45d8f98": map[KubernetesCluster:test.k8s.example.io Name:nodes.test.k8s.example.io]
I1203 10:31:32.764530 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:32.782282 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/pki/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.782319 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.782335 35890 iam_builder.go:221] Found root location "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.782457 35890 request_logger.go:45] AWS request: ec2/DescribeTags
I1203 10:31:32.782488 35890 request_logger.go:45] AWS request: iam/AddRoleToInstanceProfile
I1203 10:31:32.782520 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/pki/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.782539 35890 iam_builder.go:216] Ignoring location "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/" because found parent "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.782556 35890 iam_builder.go:221] Found root location "s3://clusters.k8s.example.io/test.k8s.example.io/"
I1203 10:31:32.782707 35890 iamrolepolicy.go:146] Creating IAMRolePolicy
I1203 10:31:32.782727 35890 iamrolepolicy.go:174] PutRolePolicy RoleName=masters.test.k8s.example.io PolicyName=masters.test.k8s.example.io: {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ecr:GetAuthorizationToken",
"ecr:BatchCheckLayerAvailability",
"ecr:GetDownloadUrlForLayer",
"ecr:GetRepositoryPolicy",
"ecr:DescribeRepositories",
"ecr:ListImages",
"ecr:BatchGetImage"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"ec2:*"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"elasticloadbalancing:*"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"autoscaling:DescribeAutoScalingGroups",
"autoscaling:DescribeAutoScalingInstances",
"autoscaling:SetDesiredCapacity",
"autoscaling:TerminateInstanceInAutoScalingGroup"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"route53:ChangeResourceRecordSets",
"route53:ListResourceRecordSets",
"route53:GetHostedZone"
],
"Resource": [
"arn:aws:route53:::hostedzone/Z3STZN85S7ZJGL"
]
},
{
"Effect": "Allow",
"Action": [
"route53:GetChange"
],
"Resource": [
"arn:aws:route53:::change/*"
]
},
{
"Effect": "Allow",
"Action": [
"route53:ListHostedZones"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:*"
],
"Resource": [
"arn:aws:s3:::clusters.k8s.example.io/test.k8s.example.io",
"arn:aws:s3:::clusters.k8s.example.io/test.k8s.example.io/*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:GetBucketLocation",
"s3:ListBucket"
],
"Resource": [
"arn:aws:s3:::clusters.k8s.example.io"
]
}
]
}
I1203 10:31:32.783027 35890 request_logger.go:45] AWS request: iam/PutRolePolicy
I1203 10:31:32.818907 35890 aws_cloud.go:407] adding tags to "subnet-924206da": map[Name:us-west-2b.test.k8s.example.io kubernetes.io/cluster/test.k8s.example.io:owned KubernetesCluster:test.k8s.example.io]
I1203 10:31:32.819121 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:32.835672 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.059918 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.071323 35890 aws_cloud.go:407] adding tags to "rtb-2b042052": map[KubernetesCluster:test.k8s.example.io Name:test.k8s.example.io]
I1203 10:31:33.071484 35890 request_logger.go:45] AWS request: ec2/CreateTags
I1203 10:31:33.702023 35890 executor.go:91] Tasks: 48 done / 65 total; 15 can run
I1203 10:31:33.702081 35890 executor.go:157] Executing task "SecurityGroupRule/node-egress": *awstasks.SecurityGroupRule {"Name":"node-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true}
I1203 10:31:33.702235 35890 executor.go:157] Executing task "SecurityGroupRule/master-egress": *awstasks.SecurityGroupRule {"Name":"master-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true}
I1203 10:31:33.702187 35890 executor.go:157] Executing task "SecurityGroupRule/all-master-to-master": *awstasks.SecurityGroupRule {"Name":"all-master-to-master","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"Egress":null}
I1203 10:31:33.702379 35890 executor.go:157] Executing task "SecurityGroupRule/all-master-to-node": *awstasks.SecurityGroupRule {"Name":"all-master-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"Egress":null}
I1203 10:31:33.702756 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.702144 35890 executor.go:157] Executing task "SecurityGroupRule/ssh-external-to-node-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-node-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null}
I1203 10:31:33.702263 35890 executor.go:157] Executing task "SecurityGroupRule/node-to-master-udp-1-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-udp-1-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":null,"Protocol":"udp","FromPort":1,"ToPort":65535,"SourceGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"Egress":null}
I1203 10:31:33.702173 35890 executor.go:157] Executing task "RouteTableAssociation/us-west-2b.test.k8s.example.io": *awstasks.RouteTableAssociation {"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":null,"RouteTable":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"rtb-2b042052","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}},"Subnet":{"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":"subnet-924206da","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"AvailabilityZone":"us-west-2b","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"us-west-2b.test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}}
I1203 10:31:33.702163 35890 executor.go:157] Executing task "SecurityGroupRule/ssh-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null}
I1203 10:31:33.702118 35890 executor.go:157] Executing task "SecurityGroupRule/all-node-to-node": *awstasks.SecurityGroupRule {"Name":"all-node-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"Egress":null}
I1203 10:31:33.702133 35890 executor.go:157] Executing task "SecurityGroupRule/node-to-master-tcp-1-4000": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-1-4000","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":null,"Protocol":"tcp","FromPort":1,"ToPort":4000,"SourceGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"Egress":null}
I1203 10:31:33.703223 35890 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1203 10:31:33.702174 35890 executor.go:157] Executing task "SecurityGroupRule/https-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"https-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":443,"ToPort":443,"SourceGroup":null,"Egress":null}
I1203 10:31:33.703294 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.702160 35890 executor.go:157] Executing task "LaunchConfiguration/nodes.test.k8s.example.io": *awstasks.LaunchConfiguration {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","UserData":{"Name":"","Resource":{}},"ImageID":"kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28","InstanceType":"t2.medium","SSHKey":{"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":"22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"},"SecurityGroups":[{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null}],"AssociatePublicIP":true,"IAMInstanceProfile":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJLWAGCDBPKNVBVYTY"},"RootVolumeSize":128,"RootVolumeType":"gp2","RootVolumeOptimization":null,"SpotPrice":"","ID":null,"Tenancy":null}
I1203 10:31:33.702211 35890 executor.go:157] Executing task "SecurityGroupRule/node-to-master-tcp-4003-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-4003-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null},"CIDR":null,"Protocol":"tcp","FromPort":4003,"ToPort":65535,"SourceGroup":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null},"Egress":null}
I1203 10:31:33.702575 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.702622 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.702198 35890 executor.go:157] Executing task "LaunchConfiguration/master-us-west-2b.masters.test.k8s.example.io": *awstasks.LaunchConfiguration {"Name":"master-us-west-2b.masters.test.k8s.example.io","Lifecycle":"Sync","UserData":{"Name":"","Resource":{}},"ImageID":"kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28","InstanceType":"m3.medium","SSHKey":{"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":"22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"},"SecurityGroups":[{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null}],"AssociatePublicIP":true,"IAMInstanceProfile":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJHOL6F7GKSEPBF634"},"RootVolumeSize":64,"RootVolumeType":"gp2","RootVolumeOptimization":null,"SpotPrice":"","ID":null,"Tenancy":null}
I1203 10:31:33.702224 35890 executor.go:157] Executing task "Route/0.0.0.0/0": *awstasks.Route {"Name":"0.0.0.0/0","Lifecycle":"Sync","RouteTable":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"rtb-2b042052","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}},"Instance":null,"CIDR":"0.0.0.0/0","InternetGateway":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"igw-87a144e1","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"Shared":false},"NatGateway":null}
I1203 10:31:33.702882 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.703005 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.704005 35890 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1203 10:31:33.703087 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.703176 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.703362 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.704127 35890 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1203 10:31:33.703417 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.703777 35890 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1203 10:31:33.703899 35890 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1203 10:31:33.805673 35890 securitygrouprule.go:277] all-master-to-master: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-615f8d1d)
I1203 10:31:33.805788 35890 routetableassociation.go:149] Checking for existing RouteTableAssociation to subnet
I1203 10:31:33.805872 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:33.805911 35890 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1203 10:31:33.846517 35890 route.go:174] Creating Route with RouteTable:"rtb-2b042052" CIDR:"0.0.0.0/0"
I1203 10:31:33.847019 35890 request_logger.go:45] AWS request: ec2/CreateRoute
I1203 10:31:33.848782 35890 securitygrouprule.go:277] ssh-external-to-master-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=22 toPort=22 cidr=0.0.0.0/0)
I1203 10:31:33.849198 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:33.856825 35890 securitygrouprule.go:277] node-to-master-tcp-4003-65535: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=4003 toPort=65535 sourceGroup=sg-e45d8f98)
I1203 10:31:33.856949 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:33.860371 35890 securitygrouprule.go:277] ssh-external-to-node-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=22 toPort=22 cidr=0.0.0.0/0)
I1203 10:31:33.860510 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:33.861741 35890 securitygrouprule.go:277] all-node-to-node: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-e45d8f98)
I1203 10:31:33.861848 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:33.874520 35890 securitygrouprule.go:277] all-master-to-node: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-615f8d1d)
I1203 10:31:33.874581 35890 securitygrouprule.go:277] node-to-master-udp-1-65535: Calling EC2 AuthorizeSecurityGroupIngress (protocol=udp fromPort=1 toPort=65535 sourceGroup=sg-e45d8f98)
I1203 10:31:33.874657 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:33.874679 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:33.905350 35890 securitygrouprule.go:277] node-to-master-tcp-1-4000: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=1 toPort=4000 sourceGroup=sg-e45d8f98)
I1203 10:31:33.905623 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:33.907201 35890 routetableassociation.go:172] Creating RouteTableAssociation
I1203 10:31:33.907415 35890 request_logger.go:45] AWS request: ec2/AssociateRouteTable
I1203 10:31:33.907455 35890 securitygrouprule.go:277] https-external-to-master-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=443 toPort=443 cidr=0.0.0.0/0)
I1203 10:31:33.907670 35890 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1203 10:31:34.885841 35890 launchconfiguration.go:241] Creating AutoscalingLaunchConfiguration with Name:"master-us-west-2b.masters.test.k8s.example.io-20171203183134"
I1203 10:31:34.885876 35890 aws_cloud.go:587] Calling DescribeImages to resolve name "kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28"
I1203 10:31:34.886020 35890 request_logger.go:45] AWS request: ec2/DescribeImages
I1203 10:31:34.932034 35890 launchconfiguration.go:241] Creating AutoscalingLaunchConfiguration with Name:"nodes.test.k8s.example.io-20171203183134"
I1203 10:31:34.932065 35890 aws_cloud.go:587] Calling DescribeImages to resolve name "kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28"
I1203 10:31:34.932205 35890 request_logger.go:45] AWS request: ec2/DescribeImages
I1203 10:31:34.960805 35890 aws_cloud.go:632] Resolved image "ami-2fa0ba56"
I1203 10:31:34.960836 35890 aws_cloud.go:587] Calling DescribeImages to resolve name "kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28"
I1203 10:31:34.960976 35890 request_logger.go:45] AWS request: ec2/DescribeImages
I1203 10:31:34.970440 35890 aws_cloud.go:632] Resolved image "ami-2fa0ba56"
I1203 10:31:34.970469 35890 aws_cloud.go:587] Calling DescribeImages to resolve name "kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28"
I1203 10:31:34.970599 35890 request_logger.go:45] AWS request: ec2/DescribeImages
I1203 10:31:35.000779 35890 aws_cloud.go:632] Resolved image "ami-2fa0ba56"
I1203 10:31:35.000911 35890 urls.go:85] Using default protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz"
I1203 10:31:35.000933 35890 context.go:132] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz.sha1
I1203 10:31:35.006468 35890 aws_cloud.go:632] Resolved image "ami-2fa0ba56"
I1203 10:31:35.006544 35890 context.go:132] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz.sha1
I1203 10:31:35.444682 35890 apply_cluster.go:803] Found hash "8f796b29894b0184bff97906d072284c8e579331" for "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz"
I1203 10:31:35.445403 35890 apply_cluster.go:803] Found hash "8f796b29894b0184bff97906d072284c8e579331" for "https://kubeupv2.s3.amazonaws.com/kops/1.7.1/images/protokube.tar.gz"
I1203 10:31:35.445885 35890 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration
I1203 10:31:35.446310 35890 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration
I1203 10:31:35.542448 35890 launchconfiguration.go:326] got an error indicating that the IAM instance profile "nodes.test.k8s.example.io" is not ready: "Invalid IamInstanceProfile: nodes.test.k8s.example.io"
I1203 10:31:35.542488 35890 launchconfiguration.go:327] waiting for IAM instance profile "nodes.test.k8s.example.io" to be ready
I1203 10:31:35.542516 35890 launchconfiguration.go:326] got an error indicating that the IAM instance profile "masters.test.k8s.example.io" is not ready: "Invalid IamInstanceProfile: masters.test.k8s.example.io"
I1203 10:31:35.542540 35890 launchconfiguration.go:327] waiting for IAM instance profile "masters.test.k8s.example.io" to be ready
I1203 10:31:45.546127 35890 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration
I1203 10:31:45.546146 35890 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration
I1203 10:31:45.974557 35890 executor.go:91] Tasks: 63 done / 65 total; 2 can run
I1203 10:31:45.974598 35890 executor.go:157] Executing task "AutoscalingGroup/nodes.test.k8s.example.io": *awstasks.AutoscalingGroup {"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","MinSize":2,"MaxSize":2,"Subnets":[{"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":"subnet-924206da","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"AvailabilityZone":"us-west-2b","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"us-west-2b.test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}],"Tags":{"k8s.io/role/node":"1"},"LaunchConfiguration":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","UserData":{"Name":"","Resource":{}},"ImageID":"kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28","InstanceType":"t2.medium","SSHKey":{"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":"22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"},"SecurityGroups":[{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-e45d8f98","Description":"Security group for nodes","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null}],"AssociatePublicIP":true,"IAMInstanceProfile":{"Name":"nodes.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJLWAGCDBPKNVBVYTY"},"RootVolumeSize":128,"RootVolumeType":"gp2","RootVolumeOptimization":null,"SpotPrice":"","ID":"nodes.test.k8s.example.io-20171203183134","Tenancy":null}}
I1203 10:31:45.974613 35890 executor.go:157] Executing task "AutoscalingGroup/master-us-west-2b.masters.test.k8s.example.io": *awstasks.AutoscalingGroup {"Name":"master-us-west-2b.masters.test.k8s.example.io","Lifecycle":"Sync","MinSize":1,"MaxSize":1,"Subnets":[{"Name":"us-west-2b.test.k8s.example.io","Lifecycle":"Sync","ID":"subnet-924206da","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"AvailabilityZone":"us-west-2b","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"us-west-2b.test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}}],"Tags":{"k8s.io/role/master":"1"},"LaunchConfiguration":{"Name":"master-us-west-2b.masters.test.k8s.example.io","Lifecycle":"Sync","UserData":{"Name":"","Resource":{}},"ImageID":"kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2017-07-28","InstanceType":"m3.medium","SSHKey":{"Name":"kubernetes.test.k8s.example.io-d3:b3:9e:53:86:58:02:60:a5:50:3e:d2:b7:22:8e:c0","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa REDACTED\n"},"KeyFingerprint":"22:1f:26:33:78:17:de:19:de:0e:0f:19:2f:85:91:39"},"SecurityGroups":[{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"sg-615f8d1d","Description":"Security group for masters","VPC":{"Name":"test.k8s.example.io","Lifecycle":"Sync","ID":"vpc-94435af2","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"test.k8s.example.io","Name":"test.k8s.example.io","kubernetes.io/cluster/test.k8s.example.io":"owned"}},"RemoveExtraRules":["port=22","port=443","port=4001","port=4789","port=179"],"Shared":null}],"AssociatePublicIP":true,"IAMInstanceProfile":{"Name":"masters.test.k8s.example.io","Lifecycle":"Sync","ID":"AIPAJHOL6F7GKSEPBF634"},"RootVolumeSize":64,"RootVolumeType":"gp2","RootVolumeOptimization":null,"SpotPrice":"","ID":"master-us-west-2b.masters.test.k8s.example.io-20171203183134","Tenancy":null}}
I1203 10:31:45.975065 35890 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups
I1203 10:31:45.982677 35890 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups
I1203 10:31:46.029020 35890 autoscalinggroup.go:179] Creating autoscaling Group with Name:"nodes.test.k8s.example.io"
I1203 10:31:46.029170 35890 request_logger.go:45] AWS request: autoscaling/CreateAutoScalingGroup
I1203 10:31:46.035773 35890 autoscalinggroup.go:179] Creating autoscaling Group with Name:"master-us-west-2b.masters.test.k8s.example.io"
I1203 10:31:46.035962 35890 request_logger.go:45] AWS request: autoscaling/CreateAutoScalingGroup
I1203 10:31:46.456025 35890 executor.go:91] Tasks: 65 done / 65 total; 0 can run
I1203 10:31:46.456081 35890 dns.go:152] Pre-creating DNS records
I1203 10:31:46.456206 35890 route53.go:50] AWS request: route53 ListHostedZones
I1203 10:31:46.877815 35890 route53.go:50] AWS request: route53 ListResourceRecordSets
I1203 10:31:47.014750 35890 dns.go:228] Pre-creating DNS record api.test.k8s.example.io. => 203.0.113.123
I1203 10:31:47.014776 35890 dns.go:228] Pre-creating DNS record api.internal.test.k8s.example.io. => 203.0.113.123
I1203 10:31:47.014784 35890 dns.go:228] Pre-creating DNS record etcd-b.internal.test.k8s.example.io. => 203.0.113.123
I1203 10:31:47.014791 35890 dns.go:228] Pre-creating DNS record etcd-events-b.internal.test.k8s.example.io. => 203.0.113.123
I1203 10:31:47.014812 35890 rrchangeset.go:106] Route53 Changeset:
CREATE A api.test.k8s.example.io.
CREATE A api.internal.test.k8s.example.io.
CREATE A etcd-b.internal.test.k8s.example.io.
CREATE A etcd-events-b.internal.test.k8s.example.io.
I1203 10:31:47.015051 35890 route53.go:50] AWS request: route53 ChangeResourceRecordSets
I1203 10:31:47.224780 35890 dns.go:239] Pre-created DNS names: [api.test.k8s.example.io. api.internal.test.k8s.example.io. etcd-b.internal.test.k8s.example.io. etcd-events-b.internal.test.k8s.example.io.]
I1203 10:31:47.224816 35890 context.go:79] deleting temp dir: "/var/folders/0n/pvjw4yqx4l19lm2yddktp2400000gp/T/deploy989791546"
I1203 10:31:47.226324 35890 kubectl.go:130] Running command: kubectl config view --output json
I1203 10:31:47.343585 35890 kubectl.go:82] config = "{\n \"kind\": \"Config\",\n \"apiVersion\": \"v1\",\n \"preferences\": {},\n \"clusters\": [\n {\n \"name\": \"minikube\",\n \"cluster\": {\n \"server\": \"https://192.168.99.100:8443\",\n \"certificate-authority\": \"/Users/eric/.minikube/ca.crt\"\n }\n },\n {\n \"name\": \"spc4aio7dc\",\n \"cluster\": {\n \"server\": \"https://52.24.106.73:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"spcazu6wir\",\n \"cluster\": {\n \"server\": \"https://34.215.43.81:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"spcgsj0ug3\",\n \"cluster\": {\n \"server\": \"https://34.214.69.241:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"spcwcgbrmw\",\n \"cluster\": {\n \"server\": \"https://34.214.76.249:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"spczl43ats\",\n \"cluster\": {\n \"server\": \"https://54.215.215.41:6443\",\n \"certificate-authority-data\": \"REDACTED\"\n }\n }\n ],\n \"users\": [\n {\n \"name\": \"minikube\",\n \"user\": {\n \"client-certificate\": \"/Users/eric/.minikube/client.crt\",\n \"client-key\": \"/Users/eric/.minikube/client.key\"\n }\n },\n {\n \"name\": \"newprod-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"production-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"stage925-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"staging-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"staging915-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n },\n {\n \"name\": \"toast-user\",\n \"user\": {\n \"client-certificate-data\": \"REDACTED\",\n \"client-key-data\": \"REDACTED\"\n }\n }\n ],\n \"contexts\": [\n {\n \"name\": \"minikube\",\n \"context\": {\n \"cluster\": \"minikube\",\n \"user\": \"minikube\"\n }\n },\n {\n \"name\": \"newprod\",\n \"context\": {\n \"cluster\": \"spcrfihxq9\",\n \"user\": \"newprod-user\"\n }\n },\n {\n \"name\": \"newstaging\",\n \"context\": {\n \"cluster\": \"spcgsj0ug3\",\n \"user\": \"newstaging-user\"\n }\n },\n {\n \"name\": \"production\",\n \"context\": {\n \"cluster\": \"spczl43ats\",\n \"user\": \"production-user\"\n }\n },\n {\n \"name\": \"stage925\",\n \"context\": {\n \"cluster\": \"spc1b8g9vo\",\n \"user\": \"stage925-user\"\n }\n },\n {\n \"name\": \"staging\",\n \"context\": {\n \"cluster\": \"spc1b8g9vo\",\n \"user\": \"staging-user\",\n \"namespace\": \"default\"\n }\n },\n {\n \"name\": \"staging-bak\",\n \"context\": {\n \"cluster\": \"spc1b8g9vo\",\n \"user\": \"staging-user\"\n }\n },\n {\n \"name\": \"staging-test\",\n \"context\": {\n \"cluster\": \"spcazu6wir\",\n \"user\": \"staging-user\"\n }\n },\n {\n \"name\": \"staging915\",\n \"context\": {\n \"cluster\": \"spcwcgbrmw\",\n \"user\": \"staging915-user\"\n }\n },\n {\n \"name\": \"toast\",\n \"context\": {\n \"cluster\": \"spc4aio7dc\",\n \"user\": \"toast-user\"\n }\n }\n ],\n \"current-context\": \"\"\n}"
I1203 10:31:47.344245 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubecfg/"
I1203 10:31:47.474140 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt]
I1203 10:31:47.474176 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt"
I1203 10:31:47.576013 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:47.576324 35890 update_cluster.go:247] Exporting kubecfg for cluster
I1203 10:31:47.576384 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/ca/"
I1203 10:31:47.691987 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt]
I1203 10:31:47.692013 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/ca/6495390242501859353567867837.crt"
I1203 10:31:47.799678 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:47.800059 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/ca/"
I1203 10:31:47.943066 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key]
I1203 10:31:47.943108 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/ca/6495390242501859353567867837.key"
I1203 10:31:48.044868 35890 ca.go:395] Parsing pem block: "RSA PRIVATE KEY"
I1203 10:31:48.045279 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/issued/kubecfg/"
I1203 10:31:48.174002 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt]
I1203 10:31:48.174031 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/issued/kubecfg/6495390241170448363893406246.crt"
I1203 10:31:48.311881 35890 ca.go:377] Parsing pem block: "CERTIFICATE"
I1203 10:31:48.312077 35890 s3fs.go:210] Listing objects in S3 bucket "clusters.k8s.example.io" with prefix "test.k8s.example.io/pki/private/kubecfg/"
I1203 10:31:48.418040 35890 s3fs.go:236] Listed files in s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg: [s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg/6495390241170448363893406246.key]
I1203 10:31:48.418089 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/pki/private/kubecfg/6495390241170448363893406246.key"
I1203 10:31:48.521313 35890 ca.go:395] Parsing pem block: "RSA PRIVATE KEY"
I1203 10:31:48.521714 35890 s3fs.go:173] Reading file "s3://clusters.k8s.example.io/test.k8s.example.io/secrets/kube"
I1203 10:31:48.625411 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config
I1203 10:31:48.628002 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config
I1203 10:31:48.630371 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config
I1203 10:31:48.632949 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config
I1203 10:31:48.642635 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config
I1203 10:31:48.650933 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config
I1203 10:31:48.660119 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config
I1203 10:31:48.669807 35890 loader.go:357] Config loaded from file /Users/eric/.kube/config
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment