-
-
Save DWSR/f6d596850346223393bec23b289c9731 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
apiVersion: v1 | |
items: | |
- apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
kubernetes.io/created-by: | | |
{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"ReplicaSet","namespace":"kube-system","name":"ext-dns-external-dns-3589353250","uid":"e53e92e5-32c9-11e8-866f-065816e74880","apiVersion":"extensions","resourceVersion":"24293568"}} | |
creationTimestamp: 2018-03-28T20:52:15Z | |
generateName: ext-dns-external-dns-3589353250- | |
labels: | |
app: external-dns | |
heritage: Tiller | |
pod-template-hash: "3589353250" | |
release: ext-dns | |
name: ext-dns-external-dns-3589353250-prxfn | |
namespace: kube-system | |
ownerReferences: | |
- apiVersion: extensions/v1beta1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: ext-dns-external-dns-3589353250 | |
uid: e53e92e5-32c9-11e8-866f-065816e74880 | |
resourceVersion: "24293599" | |
selfLink: /api/v1/namespaces/kube-system/pods/ext-dns-external-dns-3589353250-prxfn | |
uid: e543a4a1-32c9-11e8-866f-065816e74880 | |
spec: | |
containers: | |
- args: | |
- --log-level=info | |
- --domain-filter=contoso.com | |
- --policy=upsert-only | |
- --provider=aws | |
- --txt-owner-id=internal-corporate | |
- --source=service | |
- --source=ingress | |
env: | |
- name: AWS_DEFAULT_REGION | |
value: ca-central-1 | |
image: registry.opensource.zalan.do/teapot/external-dns:v0.4.8 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
path: /healthz | |
port: 7979 | |
scheme: HTTP | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: external-dns | |
ports: | |
- containerPort: 7979 | |
protocol: TCP | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: default-token-m1fmj | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
nodeName: ip-172-16-0-84.ca-central-1.compute.internal | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: default | |
serviceAccountName: default | |
terminationGracePeriodSeconds: 30 | |
tolerations: | |
- effect: NoExecute | |
key: node.alpha.kubernetes.io/notReady | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.alpha.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: default-token-m1fmj | |
secret: | |
defaultMode: 420 | |
secretName: default-token-m1fmj | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: 2018-03-28T20:52:15Z | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: 2018-03-28T20:52:23Z | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: 2018-03-28T20:52:15Z | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://af5dd4257a838c5322b286a3bef7f54b963da6f0e9f4d816282c80cb17850051 | |
image: registry.opensource.zalan.do/teapot/external-dns:v0.4.8 | |
imageID: docker-pullable://registry.opensource.zalan.do/teapot/external-dns@sha256:7aa5175f39a7e8a4172972524302c9a8196f681e40d6ee5d2f6bf0ab7d600fee | |
lastState: {} | |
name: external-dns | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: 2018-03-28T20:52:22Z | |
hostIP: 172.16.0.84 | |
phase: Running | |
podIP: 100.96.8.34 | |
qosClass: BestEffort | |
startTime: 2018-03-28T20:52:15Z |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
apiVersion: v1 | |
kind: Pod | |
metadata: | |
annotations: | |
checksum/config: 732faa1bbadef283577af550d529c804e06a0de6faf4b10bdda24a5d53c8ea06 | |
kubernetes.io/created-by: | | |
{"kind":"SerializedReference","apiVersion":"v1","reference":{"kind":"ReplicaSet","namespace":"kube-system","name":"nginx-ingress-controller-1536811364","uid":"ab60e984-32fb-11e8-866f-065816e74880","apiVersion":"extensions","resourceVersion":"24348893"}} | |
creationTimestamp: 2018-03-29T02:48:32Z | |
generateName: nginx-ingress-controller-1536811364- | |
labels: | |
app: nginx-ingress | |
component: controller | |
pod-template-hash: "1536811364" | |
release: nginx-ingress | |
name: nginx-ingress-controller-1536811364-xcb8f | |
namespace: kube-system | |
ownerReferences: | |
- apiVersion: extensions/v1beta1 | |
blockOwnerDeletion: true | |
controller: true | |
kind: ReplicaSet | |
name: nginx-ingress-controller-1536811364 | |
uid: ab60e984-32fb-11e8-866f-065816e74880 | |
resourceVersion: "24348982" | |
selfLink: /api/v1/namespaces/kube-system/pods/nginx-ingress-controller-1536811364-xcb8f | |
uid: ab65ce21-32fb-11e8-866f-065816e74880 | |
spec: | |
containers: | |
- args: | |
- /nginx-ingress-controller | |
- --default-backend-service=kube-system/nginx-ingress-default-backend | |
- --election-id=ingress-controller-leader | |
- --ingress-class=nginx | |
- --configmap=kube-system/nginx-ingress-controller | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.name | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: metadata.namespace | |
image: quay.io/kubernetes-ingress-controller/nginx-ingress-controller:0.11.0 | |
imagePullPolicy: IfNotPresent | |
livenessProbe: | |
failureThreshold: 3 | |
httpGet: | |
path: /healthz | |
port: 10254 | |
scheme: HTTP | |
initialDelaySeconds: 10 | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
name: nginx-ingress-controller | |
ports: | |
- containerPort: 80 | |
name: http | |
protocol: TCP | |
- containerPort: 443 | |
name: https | |
protocol: TCP | |
readinessProbe: | |
failureThreshold: 3 | |
httpGet: | |
path: /healthz | |
port: 10254 | |
scheme: HTTP | |
initialDelaySeconds: 10 | |
periodSeconds: 10 | |
successThreshold: 1 | |
timeoutSeconds: 1 | |
resources: {} | |
terminationMessagePath: /dev/termination-log | |
terminationMessagePolicy: File | |
volumeMounts: | |
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount | |
name: default-token-m1fmj | |
readOnly: true | |
dnsPolicy: ClusterFirst | |
nodeName: ip-172-16-1-64.ca-central-1.compute.internal | |
restartPolicy: Always | |
schedulerName: default-scheduler | |
securityContext: {} | |
serviceAccount: default | |
serviceAccountName: default | |
terminationGracePeriodSeconds: 60 | |
tolerations: | |
- effect: NoExecute | |
key: node.alpha.kubernetes.io/notReady | |
operator: Exists | |
tolerationSeconds: 300 | |
- effect: NoExecute | |
key: node.alpha.kubernetes.io/unreachable | |
operator: Exists | |
tolerationSeconds: 300 | |
volumes: | |
- name: default-token-m1fmj | |
secret: | |
defaultMode: 420 | |
secretName: default-token-m1fmj | |
status: | |
conditions: | |
- lastProbeTime: null | |
lastTransitionTime: 2018-03-29T02:48:32Z | |
status: "True" | |
type: Initialized | |
- lastProbeTime: null | |
lastTransitionTime: 2018-03-29T02:48:52Z | |
status: "True" | |
type: Ready | |
- lastProbeTime: null | |
lastTransitionTime: 2018-03-29T02:48:32Z | |
status: "True" | |
type: PodScheduled | |
containerStatuses: | |
- containerID: docker://7ffff41d12391f218cdcdf894b98c502f323c9036d86eb04a6f9e4709cecec53 | |
image: quay.io/kubernetes-ingress-controller/nginx-ingress-controller:0.11.0 | |
imageID: docker-pullable://quay.io/kubernetes-ingress-controller/nginx-ingress-controller@sha256:885b65cec9e58c4829be447af4b0b00ecc40c09e0b9e9f662374f308e536c217 | |
lastState: {} | |
name: nginx-ingress-controller | |
ready: true | |
restartCount: 0 | |
state: | |
running: | |
startedAt: 2018-03-29T02:48:40Z | |
hostIP: 172.16.1.64 | |
phase: Running | |
podIP: 100.96.13.31 | |
qosClass: BestEffort | |
startTime: 2018-03-29T02:48:32Z |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
------------------------------------------------------------------------------- | |
NGINX Ingress controller | |
Release: 0.11.0 | |
Build: git-9d0ce7c | |
Repository: https://github.com/kubernetes/ingress-nginx | |
------------------------------------------------------------------------------- | |
W0402 20:11:35.895263 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:11:35.895355 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
I0402 20:11:35.895376 7 controller.go:171] backend reload required | |
I0402 20:11:35.895437 7 event.go:218] Event(v1.ObjectReference{Kind:"Ingress", Namespace:"vault", Name:"vault-ingress", UID:"0b703205-36b2-11e8-b7f1-02b7f620cad6", APIVersion:"extensions", ResourceVersion:"25458563", FieldPath:""}): type: 'Normal' reason: 'CREATE' Ingress vault/vault-ingress | |
I0402 20:11:36.040092 7 controller.go:180] ingress backend successfully reloaded... | |
I0402 20:11:36.405006 7 event.go:218] Event(v1.ObjectReference{Kind:"Ingress", Namespace:"vault", Name:"vault-ingress", UID:"0b703205-36b2-11e8-b7f1-02b7f620cad6", APIVersion:"extensions", ResourceVersion:"25458572", FieldPath:""}): type: 'Normal' reason: 'UPDATE' Ingress vault/vault-ingress | |
W0402 20:11:37.859358 7 controller.go:741] service vault/cm-vault-tls-vjoun does not have any active endpoints | |
W0402 20:11:37.859435 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
I0402 20:11:37.859485 7 controller.go:171] backend reload required | |
I0402 20:11:38.021178 7 controller.go:180] ingress backend successfully reloaded... | |
W0402 20:11:41.192542 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:11:41.192777 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
I0402 20:11:41.192811 7 controller.go:171] backend reload required | |
I0402 20:11:41.262644 7 controller.go:180] ingress backend successfully reloaded... | |
W0402 20:11:42.077660 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
I0402 20:11:42.444358 7 status.go:347] updating Ingress vault/vault-ingress status to [{ }] | |
I0402 20:11:42.455603 7 event.go:218] Event(v1.ObjectReference{Kind:"Ingress", Namespace:"vault", Name:"vault-ingress", UID:"0b703205-36b2-11e8-b7f1-02b7f620cad6", APIVersion:"extensions", ResourceVersion:"25458595", FieldPath:""}): type: 'Normal' reason: 'UPDATE' Ingress vault/vault-ingress | |
W0402 20:11:44.525801 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:11:44.525961 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
W0402 20:12:02.078269 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:12:12.078463 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:12:22.078691 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:12:32.078997 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:12:34.866108 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
I0402 20:12:34.869319 7 event.go:218] Event(v1.ObjectReference{Kind:"Ingress", Namespace:"vault", Name:"vault-ingress", UID:"0b703205-36b2-11e8-b7f1-02b7f620cad6", APIVersion:"extensions", ResourceVersion:"25458743", FieldPath:""}): type: 'Normal' reason: 'UPDATE' Ingress vault/vault-ingress | |
W0402 20:12:37.859164 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:12:37.859362 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
I0402 20:12:37.859397 7 controller.go:171] backend reload required | |
I0402 20:12:38.092749 7 controller.go:180] ingress backend successfully reloaded... | |
W0402 20:12:41.192727 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
W0402 20:12:42.079321 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:12:52.079588 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:13:02.079840 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:13:12.080090 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:13:22.080405 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:13:32.080693 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:13:42.080980 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:13:52.081307 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:14:02.081552 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:14:12.081785 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:14:22.082082 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:14:32.082388 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:14:42.082596 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:14:52.082839 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:15:02.083131 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:15:12.083463 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:15:22.083821 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:15:32.084155 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:15:42.084472 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:15:52.084788 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:16:02.085059 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:16:12.085369 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:16:22.085606 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
100.96.12.0 - [100.96.12.0] - - [02/Apr/2018:20:16:24 +0000] "GET / HTTP/1.1" 404 21 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 207 0.005 [upstream-default-backend] 100.96.12.25:8080 21 0.005 404 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:28 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.001 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.001 200 | |
100.96.12.0 - [100.96.12.0] - - [02/Apr/2018:20:16:28 +0000] "GET / HTTP/1.1" 404 21 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 207 0.001 [upstream-default-backend] 100.96.12.25:8080 21 0.001 404 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:30 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.000 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.000 200 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:31 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.000 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.000 200 | |
W0402 20:16:32.085802 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:32 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.000 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.000 200 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:33 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.000 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.000 200 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:34 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.001 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.001 200 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:35 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.000 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.000 200 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:36 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.001 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.001 200 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:37 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.001 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.001 200 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:39 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Go-http-client/1.1" 170 0.001 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.001 200 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:16:40 +0000] "GET /.well-known/acme-challenge/ACME_CHALLENGE_TOKEN HTTP/1.1" 200 87 "-" "Mozilla/5.0 (compatible; Let's Encrypt validation server; +https://www.letsencrypt.org)" 271 0.001 [vault-cm-vault-tls-vjoun-8089] 100.96.13.36:8089 87 0.001 200 | |
100.96.12.0 - [100.96.12.0] - - [02/Apr/2018:20:16:42 +0000] "GET / HTTP/1.1" 404 21 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 207 0.001 [upstream-default-backend] 100.96.12.25:8080 21 0.001 404 | |
W0402 20:16:42.086059 7 backend_ssl.go:49] error obtaining PEM from secret vault/vault-tls: error retrieving secret vault/vault-tls: secret vault/vault-tls was not found | |
W0402 20:16:42.162808 7 controller.go:668] error obtaining service endpoints: error getting service vault/cm-vault-tls-vjoun from the cache: service vault/cm-vault-tls-vjoun was not found | |
W0402 20:16:42.162897 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
I0402 20:16:42.162942 7 controller.go:171] backend reload required | |
I0402 20:16:42.237307 7 event.go:218] Event(v1.ObjectReference{Kind:"Ingress", Namespace:"vault", Name:"vault-ingress", UID:"0b703205-36b2-11e8-b7f1-02b7f620cad6", APIVersion:"extensions", ResourceVersion:"25459427", FieldPath:""}): type: 'Normal' reason: 'UPDATE' Ingress vault/vault-ingress | |
I0402 20:16:42.280832 7 controller.go:180] ingress backend successfully reloaded... | |
I0402 20:16:43.216854 7 event.go:218] Event(v1.ObjectReference{Kind:"Ingress", Namespace:"vault", Name:"vault-ingress", UID:"0b703205-36b2-11e8-b7f1-02b7f620cad6", APIVersion:"extensions", ResourceVersion:"25459438", FieldPath:""}): type: 'Normal' reason: 'UPDATE' Ingress vault/vault-ingress | |
W0402 20:16:44.525885 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
I0402 20:16:44.525944 7 controller.go:171] backend reload required | |
I0402 20:16:44.621873 7 controller.go:180] ingress backend successfully reloaded... | |
W0402 20:16:47.859371 7 controller.go:998] ssl certificate "vault/vault-tls" does not exist in local store | |
I0402 20:16:52.087177 7 backend_ssl.go:68] adding secret vault/vault-tls to the local store | |
I0402 20:16:52.087379 7 controller.go:171] backend reload required | |
I0402 20:16:52.204724 7 controller.go:180] ingress backend successfully reloaded... | |
100.96.8.0 - [100.96.8.0] - - [02/Apr/2018:20:16:53 +0000] "GET / HTTP/2.0" 404 19 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0" 182 0.001 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.001 404 | |
100.96.8.0 - [100.96.8.0] - - [02/Apr/2018:20:16:53 +0000] "GET /favicon.ico HTTP/2.0" 404 19 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0" 23 0.001 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.001 404 | |
100.96.8.0 - [100.96.8.0] - - [02/Apr/2018:20:16:53 +0000] "GET /favicon.ico HTTP/2.0" 404 19 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0" 18 0.001 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.001 404 | |
100.96.12.0 - [100.96.12.0] - - [02/Apr/2018:20:17:02 +0000] "GET / HTTP/1.1" 404 19 "-" "Slackbot-LinkExpanding 1.0 (+https://api.slack.com/robots)" 183 0.001 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.001 404 | |
100.96.8.0 - [100.96.8.0] - - [02/Apr/2018:20:17:07 +0000] "GET / HTTP/2.0" 404 19 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0" 188 0.048 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.048 404 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:17:08 +0000] "GET / HTTP/2.0" 404 19 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36" 236 0.064 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.064 404 | |
100.96.8.0 - [100.96.8.0] - - [02/Apr/2018:20:17:08 +0000] "GET /favicon.ico HTTP/2.0" 404 19 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0" 24 0.001 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.001 404 | |
100.96.13.1 - [100.96.13.1] - - [02/Apr/2018:20:17:08 +0000] "GET /favicon.ico HTTP/2.0" 404 19 "https://vault.contoso.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36" 77 0.001 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.001 404 | |
100.96.8.0 - [100.96.8.0] - - [02/Apr/2018:20:17:08 +0000] "GET /favicon.ico HTTP/2.0" 404 19 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0" 19 0.001 [vault-vault-vault-8200] 100.96.12.32:8200 19 0.001 404 | |
100.96.8.0 - [100.96.8.0] - - [02/Apr/2018:20:17:22 +0000] "GET /v1/root_creds?list=true HTTP/2.0" 200 181 "-" "Go-http-client/2.0" 97 0.002 [vault-vault-vault-8200] 100.96.12.32:8200 181 0.002 200 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
apiVersion: extensions/v1beta1 | |
kind: Ingress | |
metadata: | |
annotations: | |
certmanager.k8s.io/cluster-issuer: letsencrypt-prod | |
dns.alpha.kubernetes.io/external: vault.contoso.com | |
kubectl.kubernetes.io/last-applied-configuration: | | |
{"apiVersion":"extensions/v1beta1","kind":"Ingress","metadata":{"annotations":{"certmanager.k8s.io/cluster-issuer":"letsencrypt-prod","dns.alpha.kubernetes.io/external":"vault.ample.systems","kubernetes.io/ingress.class":"nginx"},"labels":{"app":"vault"},"name":"vault-ingress","namespace":"vault"},"spec":{"rules":[{"host":"vault.contoso.com","http":{"paths":[{"backend":{"serviceName":"vault-vault","servicePort":8200},"path":"/"}]}}],"tls":[{"hosts":["vault.contoso.com"],"secretName":"vault-tls"}]}} | |
kubernetes.io/ingress.class: nginx | |
creationTimestamp: 2018-04-02T20:11:35Z | |
generation: 5 | |
labels: | |
app: vault | |
name: vault-ingress | |
namespace: vault | |
resourceVersion: "25459438" | |
selfLink: /apis/extensions/v1beta1/namespaces/vault/ingresses/vault-ingress | |
uid: 0b703205-36b2-11e8-b7f1-02b7f620cad6 | |
spec: | |
rules: | |
- host: vault.contoso.com | |
http: | |
paths: | |
- backend: | |
serviceName: vault-vault | |
servicePort: 8200 | |
path: / | |
tls: | |
- hosts: | |
- vault.contoso.com | |
secretName: vault-tls | |
status: | |
loadBalancer: | |
ingress: | |
- {} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment