Skip to content

Instantly share code, notes, and snippets.

@SamLR
Last active January 5, 2022 12:58
Show Gist options
  • Save SamLR/a88149789fe46cc658fa8f27b0949f74 to your computer and use it in GitHub Desktop.
Save SamLR/a88149789fe46cc658fa8f27b0949f74 to your computer and use it in GitHub Desktop.
log from timing-out eksctl command
$ eksctl create cluster -f eksctl-test.yaml -v 4
2022-01-05 11:50:27 [▶] role ARN for the current session is "arn:aws:sts::[REDACTED AWS-ACCOUNT ID]:assumed-role/[REDACTED SESSION-NAME]
2022-01-05 11:50:27 [ℹ] eksctl version 0.77.0
2022-01-05 11:50:27 [ℹ] using region us-east-2
2022-01-05 11:50:27 [▶] determining availability zones
2022-01-05 11:50:28 [ℹ] setting availability zones to [us-east-2c us-east-2b us-east-2a]
2022-01-05 11:50:28 [▶] VPC CIDR (192.168.0.0/16) was divided into 8 subnets [192.168.0.0/19 192.168.32.0/19 192.168.64.0/19 192.168.96.0/19 192.168.128.0/19 192.168.160.0/19 192.168.192.0/19 192.168.224.0/19]
2022-01-05 11:50:28 [ℹ] subnets for us-east-2c - public:192.168.0.0/19 private:192.168.96.0/19
2022-01-05 11:50:28 [ℹ] subnets for us-east-2b - public:192.168.32.0/19 private:192.168.128.0/19
2022-01-05 11:50:28 [ℹ] subnets for us-east-2a - public:192.168.64.0/19 private:192.168.160.0/19
2022-01-05 11:50:28 [ℹ] nodegroup "ng-1" will use "" [AmazonLinux2/1.21]
2022-01-05 11:50:28 [ℹ] using Kubernetes version 1.21
2022-01-05 11:50:28 [ℹ] creating EKS cluster "public-access-test" in "us-east-2" region with managed nodes
2022-01-05 11:50:28 [▶] cfg.json = \
{
"kind": "ClusterConfig",
"apiVersion": "eksctl.io/v1alpha5",
"metadata": {
"name": "public-access-test",
"region": "us-east-2",
"version": "1.21"
},
"iam": {
"withOIDC": false,
"vpcResourceControllerPolicy": true
},
"vpc": {
"cidr": "192.168.0.0/16",
"subnets": {
"private": {
"us-east-2a": {
"az": "us-east-2a",
"cidr": "192.168.160.0/19"
},
"us-east-2b": {
"az": "us-east-2b",
"cidr": "192.168.128.0/19"
},
"us-east-2c": {
"az": "us-east-2c",
"cidr": "192.168.96.0/19"
}
},
"public": {
"us-east-2a": {
"az": "us-east-2a",
"cidr": "192.168.64.0/19"
},
"us-east-2b": {
"az": "us-east-2b",
"cidr": "192.168.32.0/19"
},
"us-east-2c": {
"az": "us-east-2c",
"cidr": "192.168.0.0/19"
}
}
},
"manageSharedNodeSecurityGroupRules": true,
"nat": {
"gateway": "Single"
},
"clusterEndpoints": {
"privateAccess": false,
"publicAccess": true
},
"publicAccessCIDRs": [
"[REDACTED MY-IP]/32"
]
},
"privateCluster": {
"enabled": false,
"skipEndpointCreation": false
},
"managedNodeGroups": [
{
"name": "ng-1",
"amiFamily": "AmazonLinux2",
"instanceType": "m5.xlarge",
"desiredCapacity": 2,
"minSize": 2,
"maxSize": 2,
"volumeSize": 80,
"ssh": {
"allow": false
},
"labels": {
"alpha.eksctl.io/cluster-name": "public-access-test",
"alpha.eksctl.io/nodegroup-name": "ng-1"
},
"privateNetworking": true,
"tags": {
"alpha.eksctl.io/nodegroup-name": "ng-1",
"alpha.eksctl.io/nodegroup-type": "managed"
},
"iam": {
"withAddonPolicies": {
"imageBuilder": false,
"autoScaler": false,
"externalDNS": false,
"certManager": false,
"appMesh": null,
"appMeshPreview": null,
"ebs": false,
"fsx": false,
"efs": false,
"albIngress": false,
"xRay": false,
"cloudWatch": false
}
},
"securityGroups": {
"withShared": null,
"withLocal": null
},
"volumeType": "gp3",
"volumeIOPS": 3000,
"volumeThroughput": 125,
"disableIMDSv1": false,
"disablePodIMDS": false,
"instanceSelector": {},
"releaseVersion": ""
}
],
"availabilityZones": [
"us-east-2c",
"us-east-2b",
"us-east-2a"
]
}
2022-01-05 11:50:28 [ℹ] 1 nodegroup (ng-1) was included (based on the include/exclude rules)
2022-01-05 11:50:28 [ℹ] will create a CloudFormation stack for cluster itself and 0 nodegroup stack(s)
2022-01-05 11:50:28 [ℹ] will create a CloudFormation stack for cluster itself and 1 managed nodegroup stack(s)
2022-01-05 11:50:28 [ℹ] if you encounter any issues, check CloudFormation console or try 'eksctl utils describe-stacks --region=us-east-2 --cluster=public-access-test'
2022-01-05 11:50:28 [ℹ] CloudWatch logging will not be enabled for cluster "public-access-test" in "us-east-2"
2022-01-05 11:50:28 [ℹ] you can enable it with 'eksctl utils update-cluster-logging --enable-types={SPECIFY-YOUR-LOG-TYPES-HERE (e.g. all)} --region=us-east-2 --cluster=public-access-test'
2022-01-05 11:50:28 [ℹ] Kubernetes API endpoint access will use default of {publicAccess=true, privateAccess=false} for cluster "public-access-test" in "us-east-2"
2022-01-05 11:50:28 [ℹ]
2 sequential tasks: { create cluster control plane "public-access-test",
2 sequential sub-tasks: {
2 sequential sub-tasks: {
wait for control plane to become ready,
update public access CIDRs,
},
create managed nodegroup "ng-1",
}
}
2022-01-05 11:50:28 [▶] started task: create cluster control plane "public-access-test"
2022-01-05 11:50:28 [ℹ] building cluster stack "eksctl-public-access-test-cluster"
2022-01-05 11:50:28 [▶] CreateStackInput = {
Capabilities: ["CAPABILITY_IAM"],
DisableRollback: false,
StackName: "eksctl-public-access-test-cluster",
Tags: [{
Key: "alpha.eksctl.io/cluster-name",
Value: "public-access-test"
},{
Key: "eksctl.cluster.k8s.io/v1alpha1/cluster-name",
Value: "public-access-test"
},{
Key: "alpha.eksctl.io/eksctl-version",
Value: "0.77.0"
}],
TemplateBody: "{\n \"AWSTemplateFormatVersion\": \"2010-09-09\",\n \"Description\": \"EKS cluster (dedicated VPC: true, dedicated IAM: true) [created and managed by eksctl]\",\n \"Mappings\": {\n \"ServicePrincipalPartitionMap\": {\n \"aws\": {\n \"EC2\": \"ec2.amazonaws.com\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n },\n \"aws-cn\": {\n \"EC2\": \"ec2.amazonaws.com.cn\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n },\n \"aws-us-gov\": {\n \"EC2\": \"ec2.amazonaws.com\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n }\n }\n },\n \"Resources\": {\n \"ClusterSharedNodeSecurityGroup\": {\n \"Type\": \"AWS::EC2::SecurityGroup\",\n \"Properties\": {\n \"GroupDescription\": \"Communication between all nodes in the cluster\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/ClusterSharedNodeSecurityGroup\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"ControlPlane\": {\n \"Type\": \"AWS::EKS::Cluster\",\n \"Properties\": {\n \"Name\": \"public-access-test\",\n \"ResourcesVpcConfig\": {\n \"SecurityGroupIds\": [\n {\n \"Ref\": \"ControlPlaneSecurityGroup\"\n }\n ],\n \"SubnetIds\": [\n {\n \"Ref\": \"SubnetPublicUSEAST2C\"\n },\n {\n \"Ref\": \"SubnetPublicUSEAST2B\"\n },\n {\n \"Ref\": \"SubnetPublicUSEAST2A\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2A\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2C\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2B\"\n }\n ]\n },\n \"RoleArn\": {\n \"Fn::GetAtt\": [\n \"ServiceRole\",\n \"Arn\"\n ]\n },\n \"Version\": \"1.21\"\n }\n },\n \"ControlPlaneSecurityGroup\": {\n \"Type\": \"AWS::EC2::SecurityGroup\",\n \"Properties\": {\n \"GroupDescription\": \"Communication between the control plane and worker nodegroups\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/ControlPlaneSecurityGroup\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"IngressDefaultClusterToNodeSG\": {\n \"Type\": \"AWS::EC2::SecurityGroupIngress\",\n \"Properties\": {\n \"Description\": \"Allow managed and unmanaged nodes to communicate with each other (all ports)\",\n \"FromPort\": 0,\n \"GroupId\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"IpProtocol\": \"-1\",\n \"SourceSecurityGroupId\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"ClusterSecurityGroupId\"\n ]\n },\n \"ToPort\": 65535\n }\n },\n \"IngressInterNodeGroupSG\": {\n \"Type\": \"AWS::EC2::SecurityGroupIngress\",\n \"Properties\": {\n \"Description\": \"Allow nodes to communicate with each other (all ports)\",\n \"FromPort\": 0,\n \"GroupId\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"IpProtocol\": \"-1\",\n \"SourceSecurityGroupId\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"ToPort\": 65535\n }\n },\n \"IngressNodeToDefaultClusterSG\": {\n \"Type\": \"AWS::EC2::SecurityGroupIngress\",\n \"Properties\": {\n \"Description\": \"Allow unmanaged nodes to communicate with control plane (all ports)\",\n \"FromPort\": 0,\n \"GroupId\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"ClusterSecurityGroupId\"\n ]\n },\n \"IpProtocol\": \"-1\",\n \"SourceSecurityGroupId\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"ToPort\": 65535\n }\n },\n \"InternetGateway\": {\n \"Type\": \"AWS::EC2::InternetGateway\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/InternetGateway\"\n }\n }\n ]\n }\n },\n \"NATGateway\": {\n \"Type\": \"AWS::EC2::NatGateway\",\n \"Properties\": {\n \"AllocationId\": {\n \"Fn::GetAtt\": [\n \"NATIP\",\n \"AllocationId\"\n ]\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPublicUSEAST2C\"\n },\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/NATGateway\"\n }\n }\n ]\n }\n },\n \"NATIP\": {\n \"Type\": \"AWS::EC2::EIP\",\n \"Properties\": {\n \"Domain\": \"vpc\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/NATIP\"\n }\n }\n ]\n }\n },\n \"NATPrivateSubnetRouteUSEAST2A\": {\n \"Type\": \"AWS::EC2::Route\",\n \"Properties\": {\n \"DestinationCidrBlock\": \"0.0.0.0/0\",\n \"NatGatewayId\": {\n \"Ref\": \"NATGateway\"\n },\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2A\"\n }\n }\n },\n \"NATPrivateSubnetRouteUSEAST2B\": {\n \"Type\": \"AWS::EC2::Route\",\n \"Properties\": {\n \"DestinationCidrBlock\": \"0.0.0.0/0\",\n \"NatGatewayId\": {\n \"Ref\": \"NATGateway\"\n },\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2B\"\n }\n }\n },\n \"NATPrivateSubnetRouteUSEAST2C\": {\n \"Type\": \"AWS::EC2::Route\",\n \"Properties\": {\n \"DestinationCidrBlock\": \"0.0.0.0/0\",\n \"NatGatewayId\": {\n \"Ref\": \"NATGateway\"\n },\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2C\"\n }\n }\n },\n \"PolicyCloudWatchMetrics\": {\n \"Type\": \"AWS::IAM::Policy\",\n \"Properties\": {\n \"PolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"cloudwatch:PutMetricData\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n },\n \"PolicyName\": {\n \"Fn::Sub\": \"${AWS::StackName}-PolicyCloudWatchMetrics\"\n },\n \"Roles\": [\n {\n \"Ref\": \"ServiceRole\"\n }\n ]\n }\n },\n \"PolicyELBPermissions\": {\n \"Type\": \"AWS::IAM::Policy\",\n \"Properties\": {\n \"PolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAddresses\",\n \"ec2:DescribeInternetGateways\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n },\n \"PolicyName\": {\n \"Fn::Sub\": \"${AWS::StackName}-PolicyELBPermissions\"\n },\n \"Roles\": [\n {\n \"Ref\": \"ServiceRole\"\n }\n ]\n }\n },\n \"PrivateRouteTableUSEAST2A\": {\n \"Type\": \"AWS::EC2::RouteTable\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/PrivateRouteTableUSEAST2A\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"PrivateRouteTableUSEAST2B\": {\n \"Type\": \"AWS::EC2::RouteTable\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/PrivateRouteTableUSEAST2B\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"PrivateRouteTableUSEAST2C\": {\n \"Type\": \"AWS::EC2::RouteTable\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/PrivateRouteTableUSEAST2C\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"PublicRouteTable\": {\n \"Type\": \"AWS::EC2::RouteTable\",\n \"Properties\": {\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/PublicRouteTable\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"PublicSubnetRoute\": {\n \"Type\": \"AWS::EC2::Route\",\n \"Properties\": {\n \"DestinationCidrBlock\": \"0.0.0.0/0\",\n \"GatewayId\": {\n \"Ref\": \"InternetGateway\"\n },\n \"RouteTableId\": {\n \"Ref\": \"PublicRouteTable\"\n }\n },\n \"DependsOn\": [\n \"VPCGatewayAttachment\"\n ]\n },\n \"RouteTableAssociationPrivateUSEAST2A\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2A\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPrivateUSEAST2A\"\n }\n }\n },\n \"RouteTableAssociationPrivateUSEAST2B\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2B\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPrivateUSEAST2B\"\n }\n }\n },\n \"RouteTableAssociationPrivateUSEAST2C\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PrivateRouteTableUSEAST2C\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPrivateUSEAST2C\"\n }\n }\n },\n \"RouteTableAssociationPublicUSEAST2A\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PublicRouteTable\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPublicUSEAST2A\"\n }\n }\n },\n \"RouteTableAssociationPublicUSEAST2B\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PublicRouteTable\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPublicUSEAST2B\"\n }\n }\n },\n \"RouteTableAssociationPublicUSEAST2C\": {\n \"Type\": \"AWS::EC2::SubnetRouteTableAssociation\",\n \"Properties\": {\n \"RouteTableId\": {\n \"Ref\": \"PublicRouteTable\"\n },\n \"SubnetId\": {\n \"Ref\": \"SubnetPublicUSEAST2C\"\n }\n }\n },\n \"ServiceRole\": {\n \"Type\": \"AWS::IAM::Role\",\n \"Properties\": {\n \"AssumeRolePolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"sts:AssumeRole\"\n ],\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": [\n {\n \"Fn::FindInMap\": [\n \"ServicePrincipalPartitionMap\",\n {\n \"Ref\": \"AWS::Partition\"\n },\n \"EKS\"\n ]\n }\n ]\n }\n }\n ],\n \"Version\": \"2012-10-17\"\n },\n \"ManagedPolicyArns\": [\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEKSClusterPolicy\"\n },\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEKSVPCResourceController\"\n }\n ],\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/ServiceRole\"\n }\n }\n ]\n }\n },\n \"SubnetPrivateUSEAST2A\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2a\",\n \"CidrBlock\": \"192.168.160.0/19\",\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/internal-elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPrivateUSEAST2A\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPrivateUSEAST2B\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2b\",\n \"CidrBlock\": \"192.168.128.0/19\",\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/internal-elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPrivateUSEAST2B\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPrivateUSEAST2C\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2c\",\n \"CidrBlock\": \"192.168.96.0/19\",\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/internal-elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPrivateUSEAST2C\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPublicUSEAST2A\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2a\",\n \"CidrBlock\": \"192.168.64.0/19\",\n \"MapPublicIpOnLaunch\": true,\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPublicUSEAST2A\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPublicUSEAST2B\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2b\",\n \"CidrBlock\": \"192.168.32.0/19\",\n \"MapPublicIpOnLaunch\": true,\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPublicUSEAST2B\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"SubnetPublicUSEAST2C\": {\n \"Type\": \"AWS::EC2::Subnet\",\n \"Properties\": {\n \"AvailabilityZone\": \"us-east-2c\",\n \"CidrBlock\": \"192.168.0.0/19\",\n \"MapPublicIpOnLaunch\": true,\n \"Tags\": [\n {\n \"Key\": \"kubernetes.io/role/elb\",\n \"Value\": \"1\"\n },\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/SubnetPublicUSEAST2C\"\n }\n }\n ],\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n },\n \"VPC\": {\n \"Type\": \"AWS::EC2::VPC\",\n \"Properties\": {\n \"CidrBlock\": \"192.168.0.0/16\",\n \"EnableDnsHostnames\": true,\n \"EnableDnsSupport\": true,\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/VPC\"\n }\n }\n ]\n }\n },\n \"VPCGatewayAttachment\": {\n \"Type\": \"AWS::EC2::VPCGatewayAttachment\",\n \"Properties\": {\n \"InternetGatewayId\": {\n \"Ref\": \"InternetGateway\"\n },\n \"VpcId\": {\n \"Ref\": \"VPC\"\n }\n }\n }\n },\n \"Outputs\": {\n \"ARN\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"Arn\"\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::ARN\"\n }\n }\n },\n \"CertificateAuthorityData\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"CertificateAuthorityData\"\n ]\n }\n },\n \"ClusterSecurityGroupId\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"ClusterSecurityGroupId\"\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::ClusterSecurityGroupId\"\n }\n }\n },\n \"ClusterStackName\": {\n \"Value\": {\n \"Ref\": \"AWS::StackName\"\n }\n },\n \"Endpoint\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ControlPlane\",\n \"Endpoint\"\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::Endpoint\"\n }\n }\n },\n \"FeatureNATMode\": {\n \"Value\": \"Single\"\n },\n \"SecurityGroup\": {\n \"Value\": {\n \"Ref\": \"ControlPlaneSecurityGroup\"\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::SecurityGroup\"\n }\n }\n },\n \"ServiceRoleARN\": {\n \"Value\": {\n \"Fn::GetAtt\": [\n \"ServiceRole\",\n \"Arn\"\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::ServiceRoleARN\"\n }\n }\n },\n \"SharedNodeSecurityGroup\": {\n \"Value\": {\n \"Ref\": \"ClusterSharedNodeSecurityGroup\"\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::SharedNodeSecurityGroup\"\n }\n }\n },\n \"SubnetsPrivate\": {\n \"Value\": {\n \"Fn::Join\": [\n \",\",\n [\n {\n \"Ref\": \"SubnetPrivateUSEAST2A\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2C\"\n },\n {\n \"Ref\": \"SubnetPrivateUSEAST2B\"\n }\n ]\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::SubnetsPrivate\"\n }\n }\n },\n \"SubnetsPublic\": {\n \"Value\": {\n \"Fn::Join\": [\n \",\",\n [\n {\n \"Ref\": \"SubnetPublicUSEAST2C\"\n },\n {\n \"Ref\": \"SubnetPublicUSEAST2B\"\n },\n {\n \"Ref\": \"SubnetPublicUSEAST2A\"\n }\n ]\n ]\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::SubnetsPublic\"\n }\n }\n },\n \"VPC\": {\n \"Value\": {\n \"Ref\": \"VPC\"\n },\n \"Export\": {\n \"Name\": {\n \"Fn::Sub\": \"${AWS::StackName}::VPC\"\n }\n }\n }\n }\n}"
}
2022-01-05 11:50:29 [ℹ] deploying stack "eksctl-public-access-test-cluster"
2022-01-05 11:50:59 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:51:29 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:52:30 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:53:30 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:54:31 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:55:31 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:56:32 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:57:32 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:58:33 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 11:59:33 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 12:00:33 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-cluster"
2022-01-05 12:00:34 [▶] processing stack outputs
2022-01-05 12:00:35 [▶] completed task: create cluster control plane "public-access-test"
2022-01-05 12:00:35 [▶] started task:
2 sequential sub-tasks: {
2 sequential sub-tasks: {
wait for control plane to become ready,
update public access CIDRs,
},
create managed nodegroup "ng-1",
}
2022-01-05 12:00:35 [▶] started task:
2 sequential sub-tasks: {
wait for control plane to become ready,
update public access CIDRs,
}
2022-01-05 12:00:35 [▶] started task: wait for control plane to become ready
2022-01-05 12:02:37 [▶] cluster = {
Arn: "arn:aws:eks:us-east-2:[REDACTED]:cluster/public-access-test",
CertificateAuthority: {
Data: "[REDACTED CERT-DATA]"
},
CreatedAt: 2022-01-05 11:51:12.392 +0000 UTC,
Endpoint: "https://[REDACTED ENDPOINT].gr7.us-east-2.eks.amazonaws.com",
Identity: {
Oidc: {
Issuer: "https://oidc.eks.us-east-2.amazonaws.com/id/[REDACTED ENDPOINT]"
}
},
KubernetesNetworkConfig: {
ServiceIpv4Cidr: "10.100.0.0/16"
},
Logging: {
ClusterLogging: [{
Enabled: false,
Types: [
"api",
"audit",
"authenticator",
"controllerManager",
"scheduler"
]
}]
},
Name: "public-access-test",
PlatformVersion: "eks.4",
ResourcesVpcConfig: {
ClusterSecurityGroupId: "sg-0c5637c01f3b983f3",
EndpointPrivateAccess: false,
EndpointPublicAccess: true,
PublicAccessCidrs: ["0.0.0.0/0"],
SecurityGroupIds: ["sg-fe0db7a43a87b161c"],
SubnetIds: [
"subnet-0b198ff80551595ab",
"subnet-0f74f045ac0dee695",
"subnet-0eb618f595eeb776f",
"subnet-0f2a7904708607b44",
"subnet-0ac3b99e960b8a840",
"subnet-09eddd97299caa0b2"
],
VpcId: "vpc-0aee8fccd32e07050"
},
RoleArn: "arn:aws:iam::[REDACTED]:role/eksctl-public-access-test-cluster-ServiceRole-1BG41SGI1SPTG",
Status: "ACTIVE",
Tags: {
aws:cloudformation:stack-id: "arn:aws:cloudformation:us-east-2:[REDACTED]:stack/eksctl-public-access-test-cluster/ad0ef7a0-6e1d-11ec-aa55-cf0ab9d6ae90",
alpha.eksctl.io/eksctl-version: "0.77.0",
eksctl.cluster.k8s.io/v1alpha1/cluster-name: "public-access-test",
aws:cloudformation:stack-name: "eksctl-public-access-test-cluster",
aws:cloudformation:logical-id: "ControlPlane",
alpha.eksctl.io/cluster-name: "public-access-test"
},
Version: "1.21"
}
2022-01-05 12:02:37 [▶] completed task: wait for control plane to become ready
2022-01-05 12:02:37 [▶] started task: update public access CIDRs
2022-01-05 12:02:38 [▶] start waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:02:38 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:02:54 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:03:11 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:03:31 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:03:48 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:04:08 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:04:28 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:04:46 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:05:04 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:05:21 [ℹ] waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:05:21 [▶] done after 2m43.656270872s of waiting for requested "EndpointAccessUpdate" in cluster "public-access-test" to succeed
2022-01-05 12:05:21 [▶] completed task: update public access CIDRs
2022-01-05 12:05:21 [▶] completed task:
2 sequential sub-tasks: {
wait for control plane to become ready,
update public access CIDRs,
}
2022-01-05 12:05:21 [▶] started task: create managed nodegroup "ng-1"
2022-01-05 12:05:21 [▶] waiting for 1 parallel tasks to complete
2022-01-05 12:05:21 [▶] started task: create managed nodegroup "ng-1"
2022-01-05 12:05:21 [ℹ] building managed nodegroup stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:05:21 [▶] CreateStackInput = {
Capabilities: ["CAPABILITY_IAM"],
DisableRollback: false,
StackName: "eksctl-public-access-test-nodegroup-ng-1",
Tags: [
{
Key: "alpha.eksctl.io/cluster-name",
Value: "public-access-test"
},
{
Key: "eksctl.cluster.k8s.io/v1alpha1/cluster-name",
Value: "public-access-test"
},
{
Key: "alpha.eksctl.io/eksctl-version",
Value: "0.77.0"
},
{
Key: "alpha.eksctl.io/nodegroup-name",
Value: "ng-1"
},
{
Key: "alpha.eksctl.io/nodegroup-type",
Value: "managed"
}
],
TemplateBody: "{\n \"AWSTemplateFormatVersion\": \"2010-09-09\",\n \"Description\": \"EKS Managed Nodes (SSH access: false) [created by eksctl]\",\n \"Mappings\": {\n \"ServicePrincipalPartitionMap\": {\n \"aws\": {\n \"EC2\": \"ec2.amazonaws.com\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n },\n \"aws-cn\": {\n \"EC2\": \"ec2.amazonaws.com.cn\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n },\n \"aws-us-gov\": {\n \"EC2\": \"ec2.amazonaws.com\",\n \"EKS\": \"eks.amazonaws.com\",\n \"EKSFargatePods\": \"eks-fargate-pods.amazonaws.com\"\n }\n }\n },\n \"Resources\": {\n \"LaunchTemplate\": {\n \"Type\": \"AWS::EC2::LaunchTemplate\",\n \"Properties\": {\n \"LaunchTemplateData\": {\n \"BlockDeviceMappings\": [\n {\n \"DeviceName\": \"/dev/xvda\",\n \"Ebs\": {\n \"Iops\": 3000,\n \"Throughput\": 125,\n \"VolumeSize\": 80,\n \"VolumeType\": \"gp3\"\n }\n }\n ],\n \"MetadataOptions\": {\n \"HttpPutResponseHopLimit\": 2,\n \"HttpTokens\": \"optional\"\n },\n \"SecurityGroupIds\": [\n {\n \"Fn::ImportValue\": \"eksctl-public-access-test-cluster::ClusterSecurityGroupId\"\n }\n ],\n \"TagSpecifications\": [\n {\n \"ResourceType\": \"instance\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": \"public-access-test-ng-1-Node\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-type\",\n \"Value\": \"managed\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-name\",\n \"Value\": \"ng-1\"\n }\n ]\n },\n {\n \"ResourceType\": \"volume\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": \"public-access-test-ng-1-Node\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-type\",\n \"Value\": \"managed\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-name\",\n \"Value\": \"ng-1\"\n }\n ]\n },\n {\n \"ResourceType\": \"network-interface\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": \"public-access-test-ng-1-Node\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-type\",\n \"Value\": \"managed\"\n },\n {\n \"Key\": \"alpha.eksctl.io/nodegroup-name\",\n \"Value\": \"ng-1\"\n }\n ]\n }\n ]\n },\n \"LaunchTemplateName\": {\n \"Fn::Sub\": \"${AWS::StackName}\"\n }\n }\n },\n \"ManagedNodeGroup\": {\n \"Type\": \"AWS::EKS::Nodegroup\",\n \"Properties\": {\n \"AmiType\": \"AL2_x86_64\",\n \"ClusterName\": \"public-access-test\",\n \"InstanceTypes\": [\n \"m5.xlarge\"\n ],\n \"Labels\": {\n \"alpha.eksctl.io/cluster-name\": \"public-access-test\",\n \"alpha.eksctl.io/nodegroup-name\": \"ng-1\"\n },\n \"LaunchTemplate\": {\n \"Id\": {\n \"Ref\": \"LaunchTemplate\"\n }\n },\n \"NodeRole\": {\n \"Fn::GetAtt\": [\n \"NodeInstanceRole\",\n \"Arn\"\n ]\n },\n \"NodegroupName\": \"ng-1\",\n \"ScalingConfig\": {\n \"DesiredSize\": 2,\n \"MaxSize\": 2,\n \"MinSize\": 2\n },\n \"Subnets\": {\n \"Fn::Split\": [\n \",\",\n {\n \"Fn::ImportValue\": \"eksctl-public-access-test-cluster::SubnetsPrivate\"\n }\n ]\n },\n \"Tags\": {\n \"alpha.eksctl.io/nodegroup-name\": \"ng-1\",\n \"alpha.eksctl.io/nodegroup-type\": \"managed\"\n }\n }\n },\n \"NodeInstanceRole\": {\n \"Type\": \"AWS::IAM::Role\",\n \"Properties\": {\n \"AssumeRolePolicyDocument\": {\n \"Statement\": [\n {\n \"Action\": [\n \"sts:AssumeRole\"\n ],\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": [\n {\n \"Fn::FindInMap\": [\n \"ServicePrincipalPartitionMap\",\n {\n \"Ref\": \"AWS::Partition\"\n },\n \"EC2\"\n ]\n }\n ]\n }\n }\n ],\n \"Version\": \"2012-10-17\"\n },\n \"ManagedPolicyArns\": [\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly\"\n },\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEKSWorkerNodePolicy\"\n },\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonEKS_CNI_Policy\"\n },\n {\n \"Fn::Sub\": \"arn:${AWS::Partition}:iam::aws:policy/AmazonSSMManagedInstanceCore\"\n }\n ],\n \"Path\": \"/\",\n \"Tags\": [\n {\n \"Key\": \"Name\",\n \"Value\": {\n \"Fn::Sub\": \"${AWS::StackName}/NodeInstanceRole\"\n }\n }\n ]\n }\n }\n }\n}"
}
2022-01-05 12:05:22 [ℹ] deploying stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:05:22 [▶] start waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:05:22 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:05:41 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:05:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:06:17 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:06:34 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:06:50 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:07:08 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:07:28 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:07:46 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:08:04 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:08:22 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:08:39 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:08:58 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:09:16 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:09:34 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:09:49 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:10:06 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:10:24 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:10:40 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:10:56 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:11:15 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:11:33 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:11:49 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:12:05 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:12:25 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:12:43 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:13:03 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:13:22 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:13:38 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:13:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:14:15 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:14:34 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:14:51 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:15:08 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:15:28 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:15:44 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:16:01 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:16:17 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:16:35 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:16:54 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:17:13 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:17:31 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:17:48 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:18:05 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:18:21 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:18:40 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:18:58 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:19:15 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:19:34 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:19:50 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:20:08 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:20:25 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:20:41 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:20:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:21:14 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:21:31 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:21:49 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:22:05 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:22:22 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:22:40 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:22:59 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:23:17 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:23:36 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:23:53 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:24:12 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:24:32 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:24:51 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:25:11 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:25:29 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:25:47 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:26:03 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:26:23 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:26:39 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:26:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:27:18 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:27:38 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:27:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:28:13 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:28:29 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:28:49 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:29:06 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:29:24 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:29:42 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:29:57 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:30:18 [ℹ] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:30:22 [✖] unexpected status "CREATE_IN_PROGRESS" while waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1"
2022-01-05 12:30:22 [ℹ] fetching stack events in attempt to troubleshoot the root cause of the failure
2022-01-05 12:30:23 [▶] AWS::EKS::Nodegroup/ManagedNodeGroup: CREATE_IN_PROGRESS – "Resource creation Initiated"
2022-01-05 12:30:23 [▶] AWS::EKS::Nodegroup/ManagedNodeGroup: CREATE_IN_PROGRESS
2022-01-05 12:30:23 [▶] AWS::IAM::Role/NodeInstanceRole: CREATE_COMPLETE
2022-01-05 12:30:23 [▶] AWS::EC2::LaunchTemplate/LaunchTemplate: CREATE_COMPLETE
2022-01-05 12:30:23 [▶] AWS::EC2::LaunchTemplate/LaunchTemplate: CREATE_IN_PROGRESS – "Resource creation Initiated"
2022-01-05 12:30:23 [▶] AWS::IAM::Role/NodeInstanceRole: CREATE_IN_PROGRESS – "Resource creation Initiated"
2022-01-05 12:30:23 [▶] AWS::EC2::LaunchTemplate/LaunchTemplate: CREATE_IN_PROGRESS
2022-01-05 12:30:23 [▶] AWS::IAM::Role/NodeInstanceRole: CREATE_IN_PROGRESS
2022-01-05 12:30:23 [▶] AWS::CloudFormation::Stack/eksctl-public-access-test-nodegroup-ng-1: CREATE_IN_PROGRESS – "User Initiated"
2022-01-05 12:30:23 [▶] failed task: create managed nodegroup "ng-1" (will continue until other parallel tasks are completed)
2022-01-05 12:30:23 [▶] failed task: create managed nodegroup "ng-1" (will not run other sequential tasks)
2022-01-05 12:30:23 [▶] failed task:
2 sequential sub-tasks: {
2 sequential sub-tasks: {
wait for control plane to become ready,
update public access CIDRs,
},
create managed nodegroup "ng-1",
}
(will not run other sequential tasks)
2022-01-05 12:30:23 [!] 1 error(s) occurred and cluster hasn't been created properly, you may wish to check CloudFormation console
2022-01-05 12:30:23 [ℹ] to cleanup resources, run 'eksctl delete cluster --region=us-east-2 --name=public-access-test'
2022-01-05 12:30:23 [✖] waiting for CloudFormation stack "eksctl-public-access-test-nodegroup-ng-1": RequestCanceled: waiter context canceled
caused by: context deadline exceeded
Error: failed to create cluster "public-access-test"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment