Skip to content

Instantly share code, notes, and snippets.

@FlorianOtel
Created May 5, 2015 08:12
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save FlorianOtel/d67b4d9a62a1ce3e1a57 to your computer and use it in GitHub Desktop.
Save FlorianOtel/d67b4d9a62a1ce3e1a57 to your computer and use it in GitHub Desktop.
OpenShift-v3 beta3 ansible playbook run
PLAY [Populate oo_masters_to_config host group] *******************************
TASK: [add_host ] *************************************************************
hostname=master1.nuage-vpc253.internal
ok: [localhost] => (item=master1.nuage-vpc253.internal) => {"item": "master1.nuage-vpc253.internal", "new_groups": ["oo_masters_to_config"], "new_host": "master1.nuage-vpc253.internal"}
PLAY [Configure master instances] *********************************************
GATHERING FACTS ***************************************************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813205.89-46641379193665/setup; rm -rf /root/.ansible/tmp/ansible-tmp-1430813205.89-46641379193665/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Install firewalld packages] ******************************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Check if iptables-services is installed] *****************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Ensure iptables services are not enabled] ****************
skipping: [master1.nuage-vpc253.internal] => (item=iptables)
skipping: [master1.nuage-vpc253.internal] => (item=ip6tables)
TASK: [os_firewall | Reload systemd units] ************************************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Start and enable firewalld service] **********************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | need to pause here, otherwise the firewalld service starting can sometimes cause ssh to fail] ***
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Mask iptables services] **********************************
skipping: [master1.nuage-vpc253.internal] => (item=iptables)
skipping: [master1.nuage-vpc253.internal] => (item=ip6tables)
TASK: [os_firewall | Add firewalld allow rules] *******************************
skipping: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'})
TASK: [os_firewall | Persist firewalld allow rules] ***************************
skipping: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'})
TASK: [os_firewall | Remove firewalld allow rules] ****************************
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'})
TASK: [os_firewall | Persist removal of firewalld allow rules] ****************
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'})
skipping: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'})
TASK: [os_firewall | Install iptables packages] *******************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> state=present name=iptables,iptables-services
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python -tt /root/.ansible/tmp/ansible-tmp-1430813214.93-205215060556722/yum; rm -rf /root/.ansible/tmp/ansible-tmp-1430813214.93-205215060556722/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
changed: [master1.nuage-vpc253.internal] => (item=iptables,iptables-services) => {"changed": true, "item": "iptables,iptables-services", "msg": "", "rc": 0, "results": ["iptables-1.4.21-13.el7.x86_64 providing iptables is already installed", "Loaded plugins: amazon-id, rhui-lb\nResolving Dependencies\n--> Running transaction check\n---> Package iptables-services.x86_64 0:1.4.21-13.el7 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n iptables-services x86_64 1.4.21-13.el7 rhel-7-server-rpms 49 k\n\nTransaction Summary\n================================================================================\nInstall 1 Package\n\nTotal download size: 49 k\nInstalled size: 23 k\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : iptables-services-1.4.21-13.el7.x86_64 1/1 \n Verifying : iptables-services-1.4.21-13.el7.x86_64 1/1 \n\nInstalled:\n iptables-services.x86_64 0:1.4.21-13.el7 \n\nComplete!\n"]}
TASK: [os_firewall | Check if firewalld is installed] *************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813232.17-135165834820690/command; rm -rf /root/.ansible/tmp/ansible-tmp-1430813232.17-135165834820690/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => {"changed": false, "cmd": ["rpm", "-q", "firewalld"], "delta": "0:00:00.027632", "end": "2015-05-05 04:07:12.512333", "failed": false, "failed_when_result": false, "rc": 1, "start": "2015-05-05 04:07:12.484701", "stderr": "", "stdout": "package firewalld is not installed", "stdout_lines": ["package firewalld is not installed"], "warnings": ["Consider using yum module rather than running rpm"]}
TASK: [os_firewall | Ensure firewalld service is not enabled] *****************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Reload systemd units] ************************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813232.55-128049013360794/command; rm -rf /root/.ansible/tmp/ansible-tmp-1430813232.55-128049013360794/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
changed: [master1.nuage-vpc253.internal] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.096537", "end": "2015-05-05 04:07:12.941264", "rc": 0, "start": "2015-05-05 04:07:12.844727", "stderr": "", "stdout": "", "warnings": []}
TASK: [os_firewall | Start and enable iptables service] ***********************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> state=started name=iptables
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813232.97-256585662064156/service; rm -rf /root/.ansible/tmp/ansible-tmp-1430813232.97-256585662064156/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
changed: [master1.nuage-vpc253.internal] => {"changed": true, "enabled": true, "name": "iptables", "state": "started"}
TASK: [os_firewall | need to pause here, otherwise the iptables service starting can sometimes cause ssh to fail] ***
<master1.nuage-vpc253.internal>
duration_unit=seconds, prompt=None calculated_seconds=10, pause_type=seconds,
(^C-c = continue early, ^C-a = abort)
[master1.nuage-vpc253.internal]
Pausing for 10 seconds
ok: [master1.nuage-vpc253.internal] => {"changed": false, "delta": 10, "rc": 0, "start": "2015-05-05 04:07:13.959363", "stderr": "", "stdout": "Paused for 10.01 seconds", "stop": "2015-05-05 04:07:23.969494"}
TASK: [os_firewall | Mask firewalld service] **********************************
skipping: [master1.nuage-vpc253.internal]
TASK: [os_firewall | Add iptables allow rules] ********************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=add protocol=tcp port=4001 name=etcd embedded
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813244.01-135877805749028/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813244.01-135877805749028/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
changed: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'}) => {"changed": true, "item": {"port": "4001/tcp", "service": "etcd embedded"}, "output": ["", "Successfully created chain OS_FIREWALL_ALLOW", "iptables: Saving firewall rules to /etc/sysconfig/iptables: [ OK ]\r\n", "", "iptables: Saving firewall rules to /etc/sysconfig/iptables: [ OK ]\r\n", "", "iptables: Saving firewall rules to /etc/sysconfig/iptables: [ OK ]\r\n"]}
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=add protocol=tcp port=8443 name=OpenShift api https
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813244.52-159501192142016/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813244.52-159501192142016/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
changed: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'}) => {"changed": true, "item": {"port": "8443/tcp", "service": "OpenShift api https"}, "output": ["", "iptables: Saving firewall rules to /etc/sysconfig/iptables: [ OK ]\r\n"]}
TASK: [os_firewall | Remove iptables rules] ***********************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=8080 name=OpenShift api http
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813244.87-23735028534777/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813244.87-23735028534777/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'}) => {"changed": false, "item": {"port": "8080/tcp", "service": "OpenShift api http"}, "output": []}
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=8444 name=former OpenShift web console port
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813245.15-156812419957784/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813245.15-156812419957784/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'}) => {"changed": false, "item": {"port": "8444/tcp", "service": "former OpenShift web console port"}, "output": []}
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=7001 name=former etcd peer port
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813245.45-266739959892033/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813245.45-266739959892033/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
ok: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'}) => {"changed": false, "item": {"port": "7001/tcp", "service": "former etcd peer port"}, "output": []}
TASK: [openshift_facts | Gather OpenShift facts] ******************************
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
<master1.nuage-vpc253.internal>
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts; rm -rf /root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s
failed: [master1.nuage-vpc253.internal] => {"failed": true, "parsed": false}
Traceback (most recent call last):
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 4981, in <module>
main()
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 461, in main
openshift_facts = OpenShiftFacts(role, fact_file, local_facts)
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 36, in __init__
self.facts = self.generate_facts(local_facts)
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 44, in generate_facts
facts = self.apply_provider_facts(defaults, provider_facts, roles)
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 142, in apply_provider_facts
facts['common'][h_var] = self.choose_hostname([provider_facts['network'].get(h_var)], facts['common'][ip_var])
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 164, in choose_hostname
ips = [ i for i in hostnames if i is not None and re.match(r'\A\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\Z', i) ]
File "/usr/lib64/python2.7/re.py", line 137, in match
return _compile(pattern, flags).match(string)
TypeError: expected string or buffer
OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 56: Applying options for *
debug1: auto-mux: Trying existing master
debug2: fd 3 setting O_NONBLOCK
debug2: mux_client_hello_exchange: master version 4
debug3: mux_client_forwards: request forwardings: 0 local, 0 remote
debug3: mux_client_request_session: entering
debug3: mux_client_request_alive: entering
debug3: mux_client_request_alive: done pid = 10744
debug3: mux_client_request_session: session request sent
debug1: mux_client_request_session: master session id: 2
debug3: mux_client_read_packet: read header failed: Broken pipe
debug2: Received exit status from master 0
Shared connection to master1.nuage-vpc253.internal closed.
FATAL: all hosts have already failed -- aborting
PLAY RECAP ********************************************************************
to retry, use: --limit @/root/config.retry
localhost : ok=1 changed=0 unreachable=0 failed=0
master1.nuage-vpc253.internal : ok=14 changed=4 unreachable=0 failed=1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment