Created
May 5, 2015 08:12
-
-
Save FlorianOtel/d67b4d9a62a1ce3e1a57 to your computer and use it in GitHub Desktop.
OpenShift-v3 beta3 ansible playbook run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
PLAY [Populate oo_masters_to_config host group] ******************************* | |
TASK: [add_host ] ************************************************************* | |
hostname=master1.nuage-vpc253.internal | |
ok: [localhost] => (item=master1.nuage-vpc253.internal) => {"item": "master1.nuage-vpc253.internal", "new_groups": ["oo_masters_to_config"], "new_host": "master1.nuage-vpc253.internal"} | |
PLAY [Configure master instances] ********************************************* | |
GATHERING FACTS *************************************************************** | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813205.89-46641379193665/setup; rm -rf /root/.ansible/tmp/ansible-tmp-1430813205.89-46641379193665/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
ok: [master1.nuage-vpc253.internal] | |
TASK: [os_firewall | Install firewalld packages] ****************************** | |
skipping: [master1.nuage-vpc253.internal] | |
TASK: [os_firewall | Check if iptables-services is installed] ***************** | |
skipping: [master1.nuage-vpc253.internal] | |
TASK: [os_firewall | Ensure iptables services are not enabled] **************** | |
skipping: [master1.nuage-vpc253.internal] => (item=iptables) | |
skipping: [master1.nuage-vpc253.internal] => (item=ip6tables) | |
TASK: [os_firewall | Reload systemd units] ************************************ | |
skipping: [master1.nuage-vpc253.internal] | |
TASK: [os_firewall | Start and enable firewalld service] ********************** | |
skipping: [master1.nuage-vpc253.internal] | |
TASK: [os_firewall | need to pause here, otherwise the firewalld service starting can sometimes cause ssh to fail] *** | |
skipping: [master1.nuage-vpc253.internal] | |
TASK: [os_firewall | Mask iptables services] ********************************** | |
skipping: [master1.nuage-vpc253.internal] => (item=iptables) | |
skipping: [master1.nuage-vpc253.internal] => (item=ip6tables) | |
TASK: [os_firewall | Add firewalld allow rules] ******************************* | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'}) | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'}) | |
TASK: [os_firewall | Persist firewalld allow rules] *************************** | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'}) | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'}) | |
TASK: [os_firewall | Remove firewalld allow rules] **************************** | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'}) | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'}) | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'}) | |
TASK: [os_firewall | Persist removal of firewalld allow rules] **************** | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'}) | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'}) | |
skipping: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'}) | |
TASK: [os_firewall | Install iptables packages] ******************************* | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> state=present name=iptables,iptables-services | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python -tt /root/.ansible/tmp/ansible-tmp-1430813214.93-205215060556722/yum; rm -rf /root/.ansible/tmp/ansible-tmp-1430813214.93-205215060556722/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
changed: [master1.nuage-vpc253.internal] => (item=iptables,iptables-services) => {"changed": true, "item": "iptables,iptables-services", "msg": "", "rc": 0, "results": ["iptables-1.4.21-13.el7.x86_64 providing iptables is already installed", "Loaded plugins: amazon-id, rhui-lb\nResolving Dependencies\n--> Running transaction check\n---> Package iptables-services.x86_64 0:1.4.21-13.el7 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n iptables-services x86_64 1.4.21-13.el7 rhel-7-server-rpms 49 k\n\nTransaction Summary\n================================================================================\nInstall 1 Package\n\nTotal download size: 49 k\nInstalled size: 23 k\nDownloading packages:\nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : iptables-services-1.4.21-13.el7.x86_64 1/1 \n Verifying : iptables-services-1.4.21-13.el7.x86_64 1/1 \n\nInstalled:\n iptables-services.x86_64 0:1.4.21-13.el7 \n\nComplete!\n"]} | |
TASK: [os_firewall | Check if firewalld is installed] ************************* | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813232.17-135165834820690/command; rm -rf /root/.ansible/tmp/ansible-tmp-1430813232.17-135165834820690/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
ok: [master1.nuage-vpc253.internal] => {"changed": false, "cmd": ["rpm", "-q", "firewalld"], "delta": "0:00:00.027632", "end": "2015-05-05 04:07:12.512333", "failed": false, "failed_when_result": false, "rc": 1, "start": "2015-05-05 04:07:12.484701", "stderr": "", "stdout": "package firewalld is not installed", "stdout_lines": ["package firewalld is not installed"], "warnings": ["Consider using yum module rather than running rpm"]} | |
TASK: [os_firewall | Ensure firewalld service is not enabled] ***************** | |
skipping: [master1.nuage-vpc253.internal] | |
TASK: [os_firewall | Reload systemd units] ************************************ | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813232.55-128049013360794/command; rm -rf /root/.ansible/tmp/ansible-tmp-1430813232.55-128049013360794/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
changed: [master1.nuage-vpc253.internal] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.096537", "end": "2015-05-05 04:07:12.941264", "rc": 0, "start": "2015-05-05 04:07:12.844727", "stderr": "", "stdout": "", "warnings": []} | |
TASK: [os_firewall | Start and enable iptables service] *********************** | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> state=started name=iptables | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813232.97-256585662064156/service; rm -rf /root/.ansible/tmp/ansible-tmp-1430813232.97-256585662064156/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
changed: [master1.nuage-vpc253.internal] => {"changed": true, "enabled": true, "name": "iptables", "state": "started"} | |
TASK: [os_firewall | need to pause here, otherwise the iptables service starting can sometimes cause ssh to fail] *** | |
<master1.nuage-vpc253.internal> | |
duration_unit=seconds, prompt=None calculated_seconds=10, pause_type=seconds, | |
(^C-c = continue early, ^C-a = abort) | |
[master1.nuage-vpc253.internal] | |
Pausing for 10 seconds | |
ok: [master1.nuage-vpc253.internal] => {"changed": false, "delta": 10, "rc": 0, "start": "2015-05-05 04:07:13.959363", "stderr": "", "stdout": "Paused for 10.01 seconds", "stop": "2015-05-05 04:07:23.969494"} | |
TASK: [os_firewall | Mask firewalld service] ********************************** | |
skipping: [master1.nuage-vpc253.internal] | |
TASK: [os_firewall | Add iptables allow rules] ******************************** | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> action=add protocol=tcp port=4001 name=etcd embedded | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813244.01-135877805749028/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813244.01-135877805749028/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
changed: [master1.nuage-vpc253.internal] => (item={'port': '4001/tcp', 'service': 'etcd embedded'}) => {"changed": true, "item": {"port": "4001/tcp", "service": "etcd embedded"}, "output": ["", "Successfully created chain OS_FIREWALL_ALLOW", "iptables: Saving firewall rules to /etc/sysconfig/iptables: [ OK ]\r\n", "", "iptables: Saving firewall rules to /etc/sysconfig/iptables: [ OK ]\r\n", "", "iptables: Saving firewall rules to /etc/sysconfig/iptables: [ OK ]\r\n"]} | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> action=add protocol=tcp port=8443 name=OpenShift api https | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813244.52-159501192142016/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813244.52-159501192142016/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
changed: [master1.nuage-vpc253.internal] => (item={'port': '8443/tcp', 'service': 'OpenShift api https'}) => {"changed": true, "item": {"port": "8443/tcp", "service": "OpenShift api https"}, "output": ["", "iptables: Saving firewall rules to /etc/sysconfig/iptables: [ OK ]\r\n"]} | |
TASK: [os_firewall | Remove iptables rules] *********************************** | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=8080 name=OpenShift api http | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813244.87-23735028534777/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813244.87-23735028534777/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
ok: [master1.nuage-vpc253.internal] => (item={'port': '8080/tcp', 'service': 'OpenShift api http'}) => {"changed": false, "item": {"port": "8080/tcp", "service": "OpenShift api http"}, "output": []} | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=8444 name=former OpenShift web console port | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813245.15-156812419957784/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813245.15-156812419957784/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
ok: [master1.nuage-vpc253.internal] => (item={'port': '8444/tcp', 'service': 'former OpenShift web console port'}) => {"changed": false, "item": {"port": "8444/tcp", "service": "former OpenShift web console port"}, "output": []} | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> action=remove protocol=tcp port=7001 name=former etcd peer port | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813245.45-266739959892033/os_firewall_manage_iptables; rm -rf /root/.ansible/tmp/ansible-tmp-1430813245.45-266739959892033/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
ok: [master1.nuage-vpc253.internal] => (item={'port': '7001/tcp', 'service': 'former etcd peer port'}) => {"changed": false, "item": {"port": "7001/tcp", "service": "former etcd peer port"}, "output": []} | |
TASK: [openshift_facts | Gather OpenShift facts] ****************************** | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
<master1.nuage-vpc253.internal> | |
<master1.nuage-vpc253.internal> ConnectTimeout=10 PasswordAuthentication=no 'LANG=C LC_CTYPE=C /usr/bin/python /root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts; rm -rf /root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/ >/dev/null 2>&1' KbdInteractiveAuthentication=no ControlPath=/root/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey ControlMaster=auto Port=22 ControlPersist=60s | |
failed: [master1.nuage-vpc253.internal] => {"failed": true, "parsed": false} | |
Traceback (most recent call last): | |
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 4981, in <module> | |
main() | |
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 461, in main | |
openshift_facts = OpenShiftFacts(role, fact_file, local_facts) | |
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 36, in __init__ | |
self.facts = self.generate_facts(local_facts) | |
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 44, in generate_facts | |
facts = self.apply_provider_facts(defaults, provider_facts, roles) | |
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 142, in apply_provider_facts | |
facts['common'][h_var] = self.choose_hostname([provider_facts['network'].get(h_var)], facts['common'][ip_var]) | |
File "/root/.ansible/tmp/ansible-tmp-1430813245.75-56836120331394/openshift_facts", line 164, in choose_hostname | |
ips = [ i for i in hostnames if i is not None and re.match(r'\A\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\Z', i) ] | |
File "/usr/lib64/python2.7/re.py", line 137, in match | |
return _compile(pattern, flags).match(string) | |
TypeError: expected string or buffer | |
OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013 | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: /etc/ssh/ssh_config line 56: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug2: fd 3 setting O_NONBLOCK | |
debug2: mux_client_hello_exchange: master version 4 | |
debug3: mux_client_forwards: request forwardings: 0 local, 0 remote | |
debug3: mux_client_request_session: entering | |
debug3: mux_client_request_alive: entering | |
debug3: mux_client_request_alive: done pid = 10744 | |
debug3: mux_client_request_session: session request sent | |
debug1: mux_client_request_session: master session id: 2 | |
debug3: mux_client_read_packet: read header failed: Broken pipe | |
debug2: Received exit status from master 0 | |
Shared connection to master1.nuage-vpc253.internal closed. | |
FATAL: all hosts have already failed -- aborting | |
PLAY RECAP ******************************************************************** | |
to retry, use: --limit @/root/config.retry | |
localhost : ok=1 changed=0 unreachable=0 failed=0 | |
master1.nuage-vpc253.internal : ok=14 changed=4 unreachable=0 failed=1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment