Skip to content

Instantly share code, notes, and snippets.

@dkwgit
Last active April 6, 2024 19:57
Show Gist options
  • Save dkwgit/65ef9ac485a1ee8579279a0816915cc0 to your computer and use it in GitHub Desktop.
Save dkwgit/65ef9ac485a1ee8579279a0816915cc0 to your computer and use it in GitHub Desktop.
kops create cluster log for a bug report
This file has been truncated, but you can view the full file.
I0406 14:25:02.411029 745188 factory.go:82] state store s3://kops-state-store-public-terraform-missing-route53-api-endpoint
I0406 14:25:02.411148 745188 s3context.go:329] unable to read /sys/devices/virtual/dmi/id/product_uuid, assuming not running on EC2: open /sys/devices/virtual/dmi/id/product_uuid: no such file or directory
I0406 14:25:06.049947 745188 s3context.go:165] unable to get region from metadata:unable to get region from metadata: EC2MetadataRequestError: failed to get EC2 instance identity document
caused by: RequestError: send request failed
caused by: Get "http://169.254.169.254/latest/dynamic/instance-identity/document": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
I0406 14:25:06.049985 745188 s3context.go:175] defaulting region to "us-east-1"
I0406 14:25:06.705265 745188 s3context.go:211] found bucket in region "us-east-1"
I0406 14:25:06.705318 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/config"
I0406 14:25:06.890607 745188 channel.go:123] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/"
I0406 14:25:06.890676 745188 channel.go:143] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable"
I0406 14:25:06.890713 745188 context.go:242] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable
I0406 14:25:06.966702 745188 channel.go:152] Channel contents: spec:
images:
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 )
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.4.0 <1.5.0"
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.5.0 <1.6.0"
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.6.0 <1.7.0"
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.7.0 <1.8.0"
- name: kope.io/k8s-1.8-debian-stretch-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.8.0 <1.9.0"
- name: kope.io/k8s-1.9-debian-stretch-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.9.0 <1.10.0"
- name: kope.io/k8s-1.10-debian-stretch-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.10.0 <1.11.0"
# Stretch is the default for 1.11 (for nvme)
- name: kope.io/k8s-1.11-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.11.0 <1.12.0"
- name: kope.io/k8s-1.12-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.12.0 <1.13.0"
- name: kope.io/k8s-1.13-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.13.0 <1.14.0"
- name: kope.io/k8s-1.14-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.14.0 <1.15.0"
- name: kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.15.0 <1.16.0"
- name: kope.io/k8s-1.16-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.16.0 <1.17.0"
- name: kope.io/k8s-1.17-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.17.0 <1.18.0"
- name: 099720109477/ubuntu/images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20240126
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.18.0 <1.27.0"
- name: 099720109477/ubuntu/images/hvm-ssd/ubuntu-focal-20.04-arm64-server-20240126
providerID: aws
architectureID: arm64
kubernetesVersion: ">=1.20.0 <1.27.0"
- name: 099720109477/ubuntu/images/hvm-ssd/ubuntu-jammy-22.04-amd64-server-20240126
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.27.0"
- name: 099720109477/ubuntu/images/hvm-ssd/ubuntu-jammy-22.04-arm64-server-20240126
providerID: aws
architectureID: arm64
kubernetesVersion: ">=1.27.0"
- name: cos-cloud/cos-stable-65-10323-99-0
providerID: gce
architectureID: amd64
kubernetesVersion: "<1.16.0-alpha.1"
- name: "cos-cloud/cos-stable-77-12371-114-0"
providerID: gce
architectureID: amd64
kubernetesVersion: ">=1.16.0 <1.18.0"
- name: ubuntu-os-cloud/ubuntu-2004-focal-v20230918
providerID: gce
architectureID: amd64
kubernetesVersion: ">=1.18.0 <1.27.0"
- name: ubuntu-os-cloud/ubuntu-2204-jammy-v20230919
providerID: gce
architectureID: amd64
kubernetesVersion: ">=1.27.0"
- name: Canonical:0001-com-ubuntu-server-focal:20_04-lts-gen2:20.04.202308310
providerID: azure
architectureID: amd64
kubernetesVersion: ">=1.20.0 <1.27.0"
- name: Canonical:0001-com-ubuntu-server-jammy:22_04-lts-gen2:22.04.202310040
providerID: azure
architectureID: amd64
kubernetesVersion: ">=1.27.0"
cluster:
kubernetesVersion: v1.5.8
networking:
kubenet: {}
kubernetesVersions:
- range: ">=1.28.0"
recommendedVersion: 1.28.6
requiredVersion: 1.28.0
- range: ">=1.27.0"
recommendedVersion: 1.27.10
requiredVersion: 1.27.0
- range: ">=1.26.0"
recommendedVersion: 1.26.13
requiredVersion: 1.26.0
- range: ">=1.25.0"
recommendedVersion: 1.25.16
requiredVersion: 1.25.0
- range: ">=1.24.0"
recommendedVersion: 1.24.17
requiredVersion: 1.24.0
- range: ">=1.23.0"
recommendedVersion: 1.23.17
requiredVersion: 1.23.0
- range: ">=1.22.0"
recommendedVersion: 1.22.17
requiredVersion: 1.22.0
- range: ">=1.21.0"
recommendedVersion: 1.21.14
requiredVersion: 1.21.0
- range: ">=1.20.0"
recommendedVersion: 1.20.15
requiredVersion: 1.20.0
- range: ">=1.19.0"
recommendedVersion: 1.19.16
requiredVersion: 1.19.0
- range: ">=1.18.0"
recommendedVersion: 1.18.20
requiredVersion: 1.18.0
- range: ">=1.17.0"
recommendedVersion: 1.17.17
requiredVersion: 1.17.0
- range: ">=1.16.0"
recommendedVersion: 1.16.15
requiredVersion: 1.16.0
- range: ">=1.15.0"
recommendedVersion: 1.15.12
requiredVersion: 1.15.0
- range: ">=1.14.0"
recommendedVersion: 1.14.10
requiredVersion: 1.14.0
- range: ">=1.13.0"
recommendedVersion: 1.13.12
requiredVersion: 1.13.0
- range: ">=1.12.0"
recommendedVersion: 1.12.10
requiredVersion: 1.12.0
- range: ">=1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.0
- range: "<1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.10
kopsVersions:
- range: ">=1.28.0-alpha.1"
recommendedVersion: "1.28.0"
#requiredVersion: 1.28.0
kubernetesVersion: 1.28.6
- range: ">=1.27.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.27.0
kubernetesVersion: 1.27.10
- range: ">=1.26.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.26.0
kubernetesVersion: 1.26.13
- range: ">=1.25.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.25.0
kubernetesVersion: 1.25.16
- range: ">=1.24.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.24.0
kubernetesVersion: 1.24.17
- range: ">=1.23.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.23.0
kubernetesVersion: 1.23.17
- range: ">=1.22.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.22.0
kubernetesVersion: 1.22.17
- range: ">=1.21.0-alpha.1"
recommendedVersion: "1.26.5"
#requiredVersion: 1.21.0
kubernetesVersion: 1.21.14
- range: ">=1.20.0-alpha.1"
recommendedVersion: "1.25.4"
#requiredVersion: 1.20.0
kubernetesVersion: 1.20.15
- range: ">=1.19.0-alpha.1"
recommendedVersion: "1.24.5"
#requiredVersion: 1.19.0
kubernetesVersion: 1.19.16
- range: ">=1.18.0-alpha.1"
recommendedVersion: "1.23.4"
#requiredVersion: 1.18.0
kubernetesVersion: 1.18.20
- range: ">=1.17.0-alpha.1"
recommendedVersion: "1.22.3"
#requiredVersion: 1.17.0
kubernetesVersion: 1.17.17
- range: ">=1.16.0-alpha.1"
recommendedVersion: "1.21.4"
#requiredVersion: 1.16.0
kubernetesVersion: 1.16.15
- range: ">=1.15.0-alpha.1"
recommendedVersion: "1.21.4"
#requiredVersion: 1.15.0
kubernetesVersion: 1.15.12
- range: ">=1.14.0-alpha.1"
#recommendedVersion: "1.14.0"
#requiredVersion: 1.14.0
kubernetesVersion: 1.14.10
- range: ">=1.13.0-alpha.1"
#recommendedVersion: "1.13.0"
#requiredVersion: 1.13.0
kubernetesVersion: 1.13.12
- range: ">=1.12.0-alpha.1"
recommendedVersion: "1.12.1"
#requiredVersion: 1.12.0
kubernetesVersion: 1.12.10
- range: ">=1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.11.0
kubernetesVersion: 1.11.10
- range: "<1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.10.0
kubernetesVersion: 1.11.10
I0406 14:25:07.045409 745188 new_cluster.go:1183] networking mode=cilium => {"subnets":[{"name":"us-east-1a","zone":"us-east-1a"}],"cilium":{"enableNodePort":true}}
I0406 14:25:07.045467 745188 new_cluster.go:1373] Cloud Provider ID: "aws"
I0406 14:25:07.266887 745188 request_logger.go:45] AWS request: ec2/DescribeInstanceTypes
I0406 14:25:07.485966 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.20.0 <1.27.0
I0406 14:25:07.486017 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.4.0 <1.5.0
I0406 14:25:07.486024 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.5.0 <1.6.0
I0406 14:25:07.486028 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.6.0 <1.7.0
I0406 14:25:07.486030 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.7.0 <1.8.0
I0406 14:25:07.486033 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.8.0 <1.9.0
I0406 14:25:07.486036 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.9.0 <1.10.0
I0406 14:25:07.486040 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.10.0 <1.11.0
I0406 14:25:07.486043 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.11.0 <1.12.0
I0406 14:25:07.486046 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.12.0 <1.13.0
I0406 14:25:07.486050 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.13.0 <1.14.0
I0406 14:25:07.486054 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.14.0 <1.15.0
I0406 14:25:07.486056 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.15.0 <1.16.0
I0406 14:25:07.486059 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.16.0 <1.17.0
I0406 14:25:07.486062 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.17.0 <1.18.0
I0406 14:25:07.486065 745188 channel.go:317] Kubernetes version "1.28.6" does not match range: >=1.18.0 <1.27.0
I0406 14:25:07.486076 745188 aws_cloud.go:2099] Calling DescribeImages to resolve name "099720109477/ubuntu/images/hvm-ssd/ubuntu-jammy-22.04-amd64-server-20240126"
I0406 14:25:07.486177 745188 request_logger.go:45] AWS request: ec2/DescribeImages
I0406 14:25:07.638731 745188 aws_cloud.go:2169] Resolved image "ami-04ab94c703fb30101"
I0406 14:25:07.638764 745188 aws_cloud.go:2416] checking if instance type "t3.medium" is supported in region "us-east-1"
I0406 14:25:07.638909 745188 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings
I0406 14:25:07.795966 745188 aws_cloud.go:2174] Querying EC2 for all valid zones in region "us-east-1"
I0406 14:25:07.796135 745188 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I0406 14:25:07.871742 745188 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-east-1a
I0406 14:25:07.871773 745188 defaults.go:248] Not setting up Proxy Excludes
I0406 14:25:07.871996 745188 populate_cluster_spec.go:390] Defaulted PodCIDR to 100.96.0.0/11
I0406 14:25:07.872021 745188 populate_cluster_spec.go:399] Defaulted ServiceClusterIPRange to 100.64.0.0/13
I0406 14:25:07.872025 745188 subnets.go:51] All subnets have CIDRs; skipping assignment logic
I0406 14:25:07.872028 745188 defaults.go:248] Not setting up Proxy Excludes
I0406 14:25:07.872074 745188 clientset.go:108] Using keystore path: "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki"
I0406 14:25:07.883798 745188 utils.go:199] Querying for all DNS zones to find match for "bug-report-cluster-public.<DOMAIN_REDACTED>"
I0406 14:25:07.883922 745188 route53.go:53] AWS request: route53 ListHostedZones
I0406 14:25:08.397347 745188 populate_cluster_spec.go:279] Defaulting DNS zone to: Z050288919G22381WZFHT
I0406 14:25:08.398141 745188 options_loader.go:53] executing builder *components.DefaultsOptionsBuilder
I0406 14:25:08.398270 745188 options_loader.go:53] executing builder *components.EtcdOptionsBuilder
I0406 14:25:08.398286 745188 options_loader.go:53] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I0406 14:25:08.398316 745188 options_loader.go:53] executing builder *components.KubeAPIServerOptionsBuilder
I0406 14:25:09.264131 745188 options_loader.go:53] executing builder *components.DockerOptionsBuilder
I0406 14:25:09.264168 745188 options_loader.go:53] executing builder *components.ContainerdOptionsBuilder
I0406 14:25:09.264184 745188 options_loader.go:53] executing builder *components.NetworkingOptionsBuilder
I0406 14:25:09.264187 745188 options_loader.go:53] executing builder *components.KubeDnsOptionsBuilder
I0406 14:25:09.264197 745188 options_loader.go:53] executing builder *components.KubeletOptionsBuilder
I0406 14:25:09.264267 745188 kubelet.go:120] Cloud Provider: aws
I0406 14:25:09.771464 745188 options_loader.go:53] executing builder *components.KubeControllerManagerOptionsBuilder
I0406 14:25:09.771567 745188 kubecontrollermanager.go:57] Kubernetes version "1.28.6" supports AttachDetachReconcileSyncPeriod; will configure
I0406 14:25:09.771577 745188 kubecontrollermanager.go:62] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s
I0406 14:25:10.273989 745188 options_loader.go:53] executing builder *components.KubeSchedulerOptionsBuilder
I0406 14:25:10.773032 745188 options_loader.go:53] executing builder *components.KubeProxyOptionsBuilder
I0406 14:25:11.248525 745188 options_loader.go:53] executing builder *components.CloudConfigurationOptionsBuilder
I0406 14:25:11.248576 745188 options_loader.go:53] executing builder *components.CalicoOptionsBuilder
I0406 14:25:11.248581 745188 options_loader.go:53] executing builder *components.CiliumOptionsBuilder
I0406 14:25:11.248589 745188 options_loader.go:53] executing builder *components.OpenStackOptionsBuilder
I0406 14:25:11.248602 745188 options_loader.go:53] executing builder *components.DiscoveryOptionsBuilder
I0406 14:25:11.248606 745188 options_loader.go:53] executing builder *components.ClusterAutoscalerOptionsBuilder
I0406 14:25:11.248608 745188 options_loader.go:53] executing builder *components.NodeTerminationHandlerOptionsBuilder
I0406 14:25:11.248612 745188 options_loader.go:53] executing builder *components.NodeProblemDetectorOptionsBuilder
I0406 14:25:11.248614 745188 options_loader.go:53] executing builder *components.AWSOptionsBuilder
I0406 14:25:11.248616 745188 options_loader.go:53] executing builder *components.AWSEBSCSIDriverOptionsBuilder
I0406 14:25:11.248619 745188 options_loader.go:53] executing builder *components.AWSCloudControllerManagerOptionsBuilder
I0406 14:25:11.248629 745188 options_loader.go:53] executing builder *components.GCPCloudControllerManagerOptionsBuilder
I0406 14:25:11.248631 745188 options_loader.go:53] executing builder *components.GCPPDCSIDriverOptionsBuilder
I0406 14:25:11.248653 745188 options_loader.go:53] executing builder *components.HetznerCloudControllerManagerOptionsBuilder
I0406 14:25:11.248655 745188 options_loader.go:53] executing builder *components.KarpenterOptionsBuilder
I0406 14:25:11.249011 745188 options_loader.go:53] executing builder *components.DefaultsOptionsBuilder
I0406 14:25:11.249039 745188 options_loader.go:53] executing builder *components.EtcdOptionsBuilder
I0406 14:25:11.249043 745188 options_loader.go:53] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I0406 14:25:11.249046 745188 options_loader.go:53] executing builder *components.KubeAPIServerOptionsBuilder
I0406 14:25:11.738929 745188 options_loader.go:53] executing builder *components.DockerOptionsBuilder
I0406 14:25:11.738983 745188 options_loader.go:53] executing builder *components.ContainerdOptionsBuilder
I0406 14:25:11.738988 745188 options_loader.go:53] executing builder *components.NetworkingOptionsBuilder
I0406 14:25:11.738992 745188 options_loader.go:53] executing builder *components.KubeDnsOptionsBuilder
I0406 14:25:11.738995 745188 options_loader.go:53] executing builder *components.KubeletOptionsBuilder
I0406 14:25:11.739002 745188 kubelet.go:120] Cloud Provider: aws
I0406 14:25:12.198947 745188 options_loader.go:53] executing builder *components.KubeControllerManagerOptionsBuilder
I0406 14:25:12.198989 745188 kubecontrollermanager.go:57] Kubernetes version "1.28.6" supports AttachDetachReconcileSyncPeriod; will configure
I0406 14:25:12.713144 745188 options_loader.go:53] executing builder *components.KubeSchedulerOptionsBuilder
I0406 14:25:12.713200 745188 options_loader.go:53] executing builder *components.KubeProxyOptionsBuilder
I0406 14:25:13.335933 745188 options_loader.go:53] executing builder *components.CloudConfigurationOptionsBuilder
I0406 14:25:13.335965 745188 options_loader.go:53] executing builder *components.CalicoOptionsBuilder
I0406 14:25:13.335969 745188 options_loader.go:53] executing builder *components.CiliumOptionsBuilder
I0406 14:25:13.335973 745188 options_loader.go:53] executing builder *components.OpenStackOptionsBuilder
I0406 14:25:13.335975 745188 options_loader.go:53] executing builder *components.DiscoveryOptionsBuilder
I0406 14:25:13.335978 745188 options_loader.go:53] executing builder *components.ClusterAutoscalerOptionsBuilder
I0406 14:25:13.335981 745188 options_loader.go:53] executing builder *components.NodeTerminationHandlerOptionsBuilder
I0406 14:25:13.335983 745188 options_loader.go:53] executing builder *components.NodeProblemDetectorOptionsBuilder
I0406 14:25:13.335985 745188 options_loader.go:53] executing builder *components.AWSOptionsBuilder
I0406 14:25:13.335990 745188 options_loader.go:53] executing builder *components.AWSEBSCSIDriverOptionsBuilder
I0406 14:25:13.335992 745188 options_loader.go:53] executing builder *components.AWSCloudControllerManagerOptionsBuilder
I0406 14:25:13.336001 745188 options_loader.go:53] executing builder *components.GCPCloudControllerManagerOptionsBuilder
I0406 14:25:13.336003 745188 options_loader.go:53] executing builder *components.GCPPDCSIDriverOptionsBuilder
I0406 14:25:13.336006 745188 options_loader.go:53] executing builder *components.HetznerCloudControllerManagerOptionsBuilder
I0406 14:25:13.336007 745188 options_loader.go:53] executing builder *components.KarpenterOptionsBuilder
I0406 14:25:13.336461 745188 options_loader.go:53] executing builder *components.DefaultsOptionsBuilder
I0406 14:25:13.336487 745188 options_loader.go:53] executing builder *components.EtcdOptionsBuilder
I0406 14:25:13.336491 745188 options_loader.go:53] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I0406 14:25:13.336494 745188 options_loader.go:53] executing builder *components.KubeAPIServerOptionsBuilder
I0406 14:25:13.920307 745188 options_loader.go:53] executing builder *components.DockerOptionsBuilder
I0406 14:25:13.920340 745188 options_loader.go:53] executing builder *components.ContainerdOptionsBuilder
I0406 14:25:13.920345 745188 options_loader.go:53] executing builder *components.NetworkingOptionsBuilder
I0406 14:25:13.920349 745188 options_loader.go:53] executing builder *components.KubeDnsOptionsBuilder
I0406 14:25:13.920354 745188 options_loader.go:53] executing builder *components.KubeletOptionsBuilder
I0406 14:25:13.920365 745188 kubelet.go:120] Cloud Provider: aws
I0406 14:25:14.412591 745188 options_loader.go:53] executing builder *components.KubeControllerManagerOptionsBuilder
I0406 14:25:14.412646 745188 kubecontrollermanager.go:57] Kubernetes version "1.28.6" supports AttachDetachReconcileSyncPeriod; will configure
I0406 14:25:14.952841 745188 options_loader.go:53] executing builder *components.KubeSchedulerOptionsBuilder
I0406 14:25:14.952877 745188 options_loader.go:53] executing builder *components.KubeProxyOptionsBuilder
I0406 14:25:15.762492 745188 options_loader.go:53] executing builder *components.CloudConfigurationOptionsBuilder
I0406 14:25:15.762523 745188 options_loader.go:53] executing builder *components.CalicoOptionsBuilder
I0406 14:25:15.762532 745188 options_loader.go:53] executing builder *components.CiliumOptionsBuilder
I0406 14:25:15.762535 745188 options_loader.go:53] executing builder *components.OpenStackOptionsBuilder
I0406 14:25:15.762537 745188 options_loader.go:53] executing builder *components.DiscoveryOptionsBuilder
I0406 14:25:15.762540 745188 options_loader.go:53] executing builder *components.ClusterAutoscalerOptionsBuilder
I0406 14:25:15.762543 745188 options_loader.go:53] executing builder *components.NodeTerminationHandlerOptionsBuilder
I0406 14:25:15.762545 745188 options_loader.go:53] executing builder *components.NodeProblemDetectorOptionsBuilder
I0406 14:25:15.762548 745188 options_loader.go:53] executing builder *components.AWSOptionsBuilder
I0406 14:25:15.762552 745188 options_loader.go:53] executing builder *components.AWSEBSCSIDriverOptionsBuilder
I0406 14:25:15.762555 745188 options_loader.go:53] executing builder *components.AWSCloudControllerManagerOptionsBuilder
I0406 14:25:15.762563 745188 options_loader.go:53] executing builder *components.GCPCloudControllerManagerOptionsBuilder
I0406 14:25:15.762565 745188 options_loader.go:53] executing builder *components.GCPPDCSIDriverOptionsBuilder
I0406 14:25:15.762567 745188 options_loader.go:53] executing builder *components.HetznerCloudControllerManagerOptionsBuilder
I0406 14:25:15.762569 745188 options_loader.go:53] executing builder *components.KarpenterOptionsBuilder
I0406 14:25:15.763087 745188 spec_builder.go:45] options: {
"channel": "stable",
"configStore": {
"base": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>",
"keypairs": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki",
"secrets": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets"
},
"cloudProvider": {
"aws": {
"ebsCSIDriver": {
"enabled": true,
"version": "v1.14.1"
},
"nodeTerminationHandler": {
"enabled": true,
"enableSpotInterruptionDraining": true,
"enableScheduledEventDraining": true,
"enableRebalanceMonitoring": false,
"enableRebalanceDraining": false,
"prometheusEnable": false,
"excludeFromLoadBalancers": true,
"managedASGTag": "aws-node-termination-handler/managed",
"memoryRequest": "64Mi",
"cpuRequest": "50m",
"version": "v1.18.3"
}
}
},
"containerRuntime": "containerd",
"kubernetesVersion": "1.28.6",
"dnsZone": "Z050288919G22381WZFHT",
"clusterDNSDomain": "cluster.local",
"sshAccess": [
"0.0.0.0/0",
"::/0"
],
"etcdClusters": [
{
"name": "main",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "control-plane-us-east-1a",
"encryptedVolume": true
}
],
"version": "3.5.9",
"backups": {
"backupStore": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/main"
},
"manager": {
"backupRetentionDays": 90
},
"memoryRequest": "100Mi",
"cpuRequest": "200m"
},
{
"name": "events",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "control-plane-us-east-1a",
"encryptedVolume": true
}
],
"version": "3.5.9",
"backups": {
"backupStore": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/events"
},
"manager": {
"backupRetentionDays": 90
},
"memoryRequest": "100Mi",
"cpuRequest": "100m"
}
],
"containerd": {
"logLevel": "info",
"version": "1.7.13",
"runc": {
"version": "1.1.12"
}
},
"docker": {
"skipInstall": true
},
"kubeDNS": {
"cacheMaxSize": 1000,
"cacheMaxConcurrent": 150,
"domain": "cluster.local",
"serverIP": "100.64.0.10",
"memoryRequest": "70Mi",
"cpuRequest": "100m",
"memoryLimit": "170Mi",
"nodeLocalDNS": {
"enabled": false,
"image": "registry.k8s.io/dns/k8s-dns-node-cache:1.22.20",
"memoryRequest": "5Mi",
"cpuRequest": "25m"
}
},
"kubeAPIServer": {
"image": "registry.k8s.io/kube-apiserver:v1.28.6@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68",
"logLevel": 2,
"cloudProvider": "external",
"securePort": 443,
"bindAddress": "0.0.0.0",
"enableAdmissionPlugins": [
"NamespaceLifecycle",
"LimitRanger",
"ServiceAccount",
"DefaultStorageClass",
"DefaultTolerationSeconds",
"MutatingAdmissionWebhook",
"ValidatingAdmissionWebhook",
"NodeRestriction",
"ResourceQuota"
],
"serviceClusterIPRange": "100.64.0.0/13",
"etcdServers": [
"https://127.0.0.1:4001"
],
"etcdServersOverrides": [
"/events#https://127.0.0.1:4002"
],
"allowPrivileged": true,
"apiServerCount": 1,
"anonymousAuth": false,
"kubeletPreferredAddressTypes": [
"InternalIP",
"Hostname",
"ExternalIP"
],
"storageBackend": "etcd3",
"authorizationMode": "Node,RBAC",
"requestheaderUsernameHeaders": [
"X-Remote-User"
],
"requestheaderGroupHeaders": [
"X-Remote-Group"
],
"requestheaderExtraHeaderPrefixes": [
"X-Remote-Extra-"
],
"requestheaderAllowedNames": [
"aggregator"
],
"featureGates": {
"InTreePluginAWSUnregister": "true"
},
"serviceAccountIssuer": "https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>",
"serviceAccountJWKSURI": "https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>/openid/v1/jwks",
"apiAudiences": [
"kubernetes.svc.default"
]
},
"kubeControllerManager": {
"logLevel": 2,
"image": "registry.k8s.io/kube-controller-manager:v1.28.6@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e",
"cloudProvider": "external",
"clusterName": "bug-report-cluster-public.<DOMAIN_REDACTED>",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": false,
"leaderElection": {
"leaderElect": true
},
"attachDetachReconcileSyncPeriod": "1m0s",
"useServiceAccountCredentials": true,
"featureGates": {
"InTreePluginAWSUnregister": "true"
}
},
"cloudControllerManager": {
"image": "registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1",
"clusterName": "bug-report-cluster-public.<DOMAIN_REDACTED>",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": false,
"leaderElection": {
"leaderElect": true
}
},
"kubeScheduler": {
"logLevel": 2,
"image": "registry.k8s.io/kube-scheduler:v1.28.6@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39",
"leaderElection": {
"leaderElect": true
},
"featureGates": {
"InTreePluginAWSUnregister": "true"
}
},
"kubeProxy": {
"image": "registry.k8s.io/kube-proxy:v1.28.6@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a",
"cpuRequest": "100m",
"logLevel": 2,
"clusterCIDR": "100.96.0.0/11",
"enabled": false
},
"kubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"podInfraContainerImage": "registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"cloudProvider": "external",
"cgroupRoot": "/",
"registerSchedulable": true,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"InTreePluginAWSUnregister": "true"
},
"protectKernelDefaults": true,
"cgroupDriver": "systemd",
"shutdownGracePeriod": "30s",
"shutdownGracePeriodCriticalPods": "10s"
},
"controlPlaneKubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"podInfraContainerImage": "registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"cloudProvider": "external",
"cgroupRoot": "/",
"registerSchedulable": true,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"InTreePluginAWSUnregister": "true"
},
"protectKernelDefaults": true,
"cgroupDriver": "systemd",
"shutdownGracePeriod": "30s",
"shutdownGracePeriodCriticalPods": "10s"
},
"cloudConfig": {
"manageStorageClasses": true
},
"externalDNS": {
"provider": "dns-controller"
},
"networking": {
"networkCIDR": "172.20.0.0/16",
"subnets": [
{
"name": "us-east-1a",
"cidr": "172.20.0.0/16",
"zone": "us-east-1a",
"type": "Public"
}
],
"topology": {
"dns": "Public"
},
"nonMasqueradeCIDR": "100.64.0.0/10",
"podCIDR": "100.96.0.0/11",
"serviceClusterIPRange": "100.64.0.0/13",
"cilium": {
"version": "v1.13.10",
"memoryRequest": "128Mi",
"cpuRequest": "25m",
"agentPrometheusPort": 9090,
"enableL7Proxy": true,
"enableBPFMasquerade": false,
"enableEndpointHealthChecking": true,
"identityAllocationMode": "crd",
"identityChangeGracePeriod": "5s",
"masquerade": true,
"tunnel": "vxlan",
"monitorAggregation": "medium",
"bpfCTGlobalTCPMax": 524288,
"bpfCTGlobalAnyMax": 262144,
"bpfLBAlgorithm": "random",
"bpfLBMaglevTableSize": "16381",
"bpfNATGlobalMax": 524288,
"bpfNeighGlobalMax": 524288,
"bpfPolicyMapMax": 16384,
"bpfLBMapMax": 65536,
"sidecarIstioProxyImage": "cilium/istio_proxy",
"clusterName": "default",
"toFQDNsDNSRejectResponseCode": "refused",
"ipam": "kubernetes",
"enableNodePort": true,
"enableRemoteNodeIdentity": true,
"enableUnreachableRoutes": false,
"hubble": {
"enabled": false
},
"disableCNPStatusUpdates": true
}
},
"api": {
"dns": {},
"publicName": "api.bug-report-cluster-public.<DOMAIN_REDACTED>",
"access": [
"0.0.0.0/0",
"::/0"
]
},
"authorization": {
"rbac": {}
},
"iam": {
"legacy": false,
"allowContainerRegistry": true
}
}
I0406 14:25:15.763170 745188 populate_instancegroup_spec.go:75] Populating instance group spec for "control-plane-us-east-1a"
I0406 14:25:15.763461 745188 populate_instancegroup_spec.go:75] Populating instance group spec for "nodes-us-east-1a"
I0406 14:25:15.767007 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/config"
I0406 14:25:16.029128 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/config"
I0406 14:25:16.029162 745188 s3context.go:239] Checking default bucket encryption for "kops-state-store-public-terraform-missing-route53-api-endpoint"
I0406 14:25:16.029167 745188 s3context.go:244] Calling S3 GetBucketEncryption Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint"
I0406 14:25:16.070316 745188 s3context.go:264] bucket "kops-state-store-public-terraform-missing-route53-api-endpoint" has default encryption set to true
I0406 14:25:16.070354 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/config" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:16.131503 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/control-plane-us-east-1a"
I0406 14:25:16.177702 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/control-plane-us-east-1a"
I0406 14:25:16.177738 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/control-plane-us-east-1a" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:16.254016 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/nodes-us-east-1a"
I0406 14:25:16.298344 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/nodes-us-east-1a"
I0406 14:25:16.298396 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/nodes-us-east-1a" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:16.383067 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/clusteraddons/default"
I0406 14:25:16.383105 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/clusteraddons/default" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:16.430474 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/config"
I0406 14:25:16.485888 745188 clientset.go:108] Using keystore path: "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki"
I0406 14:25:16.485950 745188 aws_cloud.go:2174] Querying EC2 for all valid zones in region "us-east-1"
I0406 14:25:16.486064 745188 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I0406 14:25:16.558543 745188 s3fs.go:409] Listing objects in S3 bucket "kops-state-store-public-terraform-missing-route53-api-endpoint" with prefix "bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/"
I0406 14:25:16.623062 745188 s3fs.go:437] Listed files in s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup: [s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/control-plane-us-east-1a s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/nodes-us-east-1a]
I0406 14:25:16.623122 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/control-plane-us-east-1a"
I0406 14:25:16.681558 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/instancegroup/nodes-us-east-1a"
I0406 14:25:16.738232 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/clusteraddons/default"
I0406 14:25:16.790220 745188 channel.go:123] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/"
I0406 14:25:16.790277 745188 channel.go:143] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable"
I0406 14:25:16.790285 745188 context.go:242] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable
I0406 14:25:16.864494 745188 channel.go:152] Channel contents: spec:
images:
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 )
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.4.0 <1.5.0"
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.5.0 <1.6.0"
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.6.0 <1.7.0"
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.7.0 <1.8.0"
- name: kope.io/k8s-1.8-debian-stretch-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.8.0 <1.9.0"
- name: kope.io/k8s-1.9-debian-stretch-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.9.0 <1.10.0"
- name: kope.io/k8s-1.10-debian-stretch-amd64-hvm-ebs-2018-08-17
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.10.0 <1.11.0"
# Stretch is the default for 1.11 (for nvme)
- name: kope.io/k8s-1.11-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.11.0 <1.12.0"
- name: kope.io/k8s-1.12-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.12.0 <1.13.0"
- name: kope.io/k8s-1.13-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.13.0 <1.14.0"
- name: kope.io/k8s-1.14-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.14.0 <1.15.0"
- name: kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.15.0 <1.16.0"
- name: kope.io/k8s-1.16-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.16.0 <1.17.0"
- name: kope.io/k8s-1.17-debian-stretch-amd64-hvm-ebs-2021-02-05
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.17.0 <1.18.0"
- name: 099720109477/ubuntu/images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20240126
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.18.0 <1.27.0"
- name: 099720109477/ubuntu/images/hvm-ssd/ubuntu-focal-20.04-arm64-server-20240126
providerID: aws
architectureID: arm64
kubernetesVersion: ">=1.20.0 <1.27.0"
- name: 099720109477/ubuntu/images/hvm-ssd/ubuntu-jammy-22.04-amd64-server-20240126
providerID: aws
architectureID: amd64
kubernetesVersion: ">=1.27.0"
- name: 099720109477/ubuntu/images/hvm-ssd/ubuntu-jammy-22.04-arm64-server-20240126
providerID: aws
architectureID: arm64
kubernetesVersion: ">=1.27.0"
- name: cos-cloud/cos-stable-65-10323-99-0
providerID: gce
architectureID: amd64
kubernetesVersion: "<1.16.0-alpha.1"
- name: "cos-cloud/cos-stable-77-12371-114-0"
providerID: gce
architectureID: amd64
kubernetesVersion: ">=1.16.0 <1.18.0"
- name: ubuntu-os-cloud/ubuntu-2004-focal-v20230918
providerID: gce
architectureID: amd64
kubernetesVersion: ">=1.18.0 <1.27.0"
- name: ubuntu-os-cloud/ubuntu-2204-jammy-v20230919
providerID: gce
architectureID: amd64
kubernetesVersion: ">=1.27.0"
- name: Canonical:0001-com-ubuntu-server-focal:20_04-lts-gen2:20.04.202308310
providerID: azure
architectureID: amd64
kubernetesVersion: ">=1.20.0 <1.27.0"
- name: Canonical:0001-com-ubuntu-server-jammy:22_04-lts-gen2:22.04.202310040
providerID: azure
architectureID: amd64
kubernetesVersion: ">=1.27.0"
cluster:
kubernetesVersion: v1.5.8
networking:
kubenet: {}
kubernetesVersions:
- range: ">=1.28.0"
recommendedVersion: 1.28.6
requiredVersion: 1.28.0
- range: ">=1.27.0"
recommendedVersion: 1.27.10
requiredVersion: 1.27.0
- range: ">=1.26.0"
recommendedVersion: 1.26.13
requiredVersion: 1.26.0
- range: ">=1.25.0"
recommendedVersion: 1.25.16
requiredVersion: 1.25.0
- range: ">=1.24.0"
recommendedVersion: 1.24.17
requiredVersion: 1.24.0
- range: ">=1.23.0"
recommendedVersion: 1.23.17
requiredVersion: 1.23.0
- range: ">=1.22.0"
recommendedVersion: 1.22.17
requiredVersion: 1.22.0
- range: ">=1.21.0"
recommendedVersion: 1.21.14
requiredVersion: 1.21.0
- range: ">=1.20.0"
recommendedVersion: 1.20.15
requiredVersion: 1.20.0
- range: ">=1.19.0"
recommendedVersion: 1.19.16
requiredVersion: 1.19.0
- range: ">=1.18.0"
recommendedVersion: 1.18.20
requiredVersion: 1.18.0
- range: ">=1.17.0"
recommendedVersion: 1.17.17
requiredVersion: 1.17.0
- range: ">=1.16.0"
recommendedVersion: 1.16.15
requiredVersion: 1.16.0
- range: ">=1.15.0"
recommendedVersion: 1.15.12
requiredVersion: 1.15.0
- range: ">=1.14.0"
recommendedVersion: 1.14.10
requiredVersion: 1.14.0
- range: ">=1.13.0"
recommendedVersion: 1.13.12
requiredVersion: 1.13.0
- range: ">=1.12.0"
recommendedVersion: 1.12.10
requiredVersion: 1.12.0
- range: ">=1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.0
- range: "<1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.10
kopsVersions:
- range: ">=1.28.0-alpha.1"
recommendedVersion: "1.28.0"
#requiredVersion: 1.28.0
kubernetesVersion: 1.28.6
- range: ">=1.27.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.27.0
kubernetesVersion: 1.27.10
- range: ">=1.26.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.26.0
kubernetesVersion: 1.26.13
- range: ">=1.25.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.25.0
kubernetesVersion: 1.25.16
- range: ">=1.24.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.24.0
kubernetesVersion: 1.24.17
- range: ">=1.23.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.23.0
kubernetesVersion: 1.23.17
- range: ">=1.22.0-alpha.1"
recommendedVersion: "1.27.0"
#requiredVersion: 1.22.0
kubernetesVersion: 1.22.17
- range: ">=1.21.0-alpha.1"
recommendedVersion: "1.26.5"
#requiredVersion: 1.21.0
kubernetesVersion: 1.21.14
- range: ">=1.20.0-alpha.1"
recommendedVersion: "1.25.4"
#requiredVersion: 1.20.0
kubernetesVersion: 1.20.15
- range: ">=1.19.0-alpha.1"
recommendedVersion: "1.24.5"
#requiredVersion: 1.19.0
kubernetesVersion: 1.19.16
- range: ">=1.18.0-alpha.1"
recommendedVersion: "1.23.4"
#requiredVersion: 1.18.0
kubernetesVersion: 1.18.20
- range: ">=1.17.0-alpha.1"
recommendedVersion: "1.22.3"
#requiredVersion: 1.17.0
kubernetesVersion: 1.17.17
- range: ">=1.16.0-alpha.1"
recommendedVersion: "1.21.4"
#requiredVersion: 1.16.0
kubernetesVersion: 1.16.15
- range: ">=1.15.0-alpha.1"
recommendedVersion: "1.21.4"
#requiredVersion: 1.15.0
kubernetesVersion: 1.15.12
- range: ">=1.14.0-alpha.1"
#recommendedVersion: "1.14.0"
#requiredVersion: 1.14.0
kubernetesVersion: 1.14.10
- range: ">=1.13.0-alpha.1"
#recommendedVersion: "1.13.0"
#requiredVersion: 1.13.0
kubernetesVersion: 1.13.12
- range: ">=1.12.0-alpha.1"
recommendedVersion: "1.12.1"
#requiredVersion: 1.12.0
kubernetesVersion: 1.12.10
- range: ">=1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.11.0
kubernetesVersion: 1.11.10
- range: "<1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.10.0
kubernetesVersion: 1.11.10
I0406 14:25:16.864720 745188 populate_cluster_spec.go:390] Defaulted PodCIDR to 100.96.0.0/11
I0406 14:25:16.864730 745188 populate_cluster_spec.go:399] Defaulted ServiceClusterIPRange to 100.64.0.0/13
I0406 14:25:16.864737 745188 subnets.go:51] All subnets have CIDRs; skipping assignment logic
I0406 14:25:16.864742 745188 defaults.go:248] Not setting up Proxy Excludes
I0406 14:25:16.864756 745188 clientset.go:108] Using keystore path: "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki"
I0406 14:25:16.877056 745188 utils.go:199] Querying for all DNS zones to find match for "bug-report-cluster-public.<DOMAIN_REDACTED>"
I0406 14:25:16.877159 745188 route53.go:53] AWS request: route53 ListHostedZones
I0406 14:25:17.358877 745188 populate_cluster_spec.go:279] Defaulting DNS zone to: Z050288919G22381WZFHT
I0406 14:25:17.359093 745188 options_loader.go:53] executing builder *components.DefaultsOptionsBuilder
I0406 14:25:17.359136 745188 options_loader.go:53] executing builder *components.EtcdOptionsBuilder
I0406 14:25:17.359140 745188 options_loader.go:53] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I0406 14:25:17.359166 745188 options_loader.go:53] executing builder *components.KubeAPIServerOptionsBuilder
I0406 14:25:17.859143 745188 options_loader.go:53] executing builder *components.DockerOptionsBuilder
I0406 14:25:17.859183 745188 options_loader.go:53] executing builder *components.ContainerdOptionsBuilder
I0406 14:25:17.859201 745188 options_loader.go:53] executing builder *components.NetworkingOptionsBuilder
I0406 14:25:17.859206 745188 options_loader.go:53] executing builder *components.KubeDnsOptionsBuilder
I0406 14:25:17.859217 745188 options_loader.go:53] executing builder *components.KubeletOptionsBuilder
I0406 14:25:17.859244 745188 kubelet.go:120] Cloud Provider: aws
I0406 14:25:18.324872 745188 options_loader.go:53] executing builder *components.KubeControllerManagerOptionsBuilder
I0406 14:25:18.324906 745188 kubecontrollermanager.go:57] Kubernetes version "1.28.6" supports AttachDetachReconcileSyncPeriod; will configure
I0406 14:25:18.324915 745188 kubecontrollermanager.go:62] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s
I0406 14:25:18.796820 745188 options_loader.go:53] executing builder *components.KubeSchedulerOptionsBuilder
I0406 14:25:19.276267 745188 options_loader.go:53] executing builder *components.KubeProxyOptionsBuilder
I0406 14:25:19.782700 745188 options_loader.go:53] executing builder *components.CloudConfigurationOptionsBuilder
I0406 14:25:19.782734 745188 options_loader.go:53] executing builder *components.CalicoOptionsBuilder
I0406 14:25:19.782738 745188 options_loader.go:53] executing builder *components.CiliumOptionsBuilder
I0406 14:25:19.782745 745188 options_loader.go:53] executing builder *components.OpenStackOptionsBuilder
I0406 14:25:19.782749 745188 options_loader.go:53] executing builder *components.DiscoveryOptionsBuilder
I0406 14:25:19.782753 745188 options_loader.go:53] executing builder *components.ClusterAutoscalerOptionsBuilder
I0406 14:25:19.782755 745188 options_loader.go:53] executing builder *components.NodeTerminationHandlerOptionsBuilder
I0406 14:25:19.782758 745188 options_loader.go:53] executing builder *components.NodeProblemDetectorOptionsBuilder
I0406 14:25:19.782762 745188 options_loader.go:53] executing builder *components.AWSOptionsBuilder
I0406 14:25:19.782765 745188 options_loader.go:53] executing builder *components.AWSEBSCSIDriverOptionsBuilder
I0406 14:25:19.782767 745188 options_loader.go:53] executing builder *components.AWSCloudControllerManagerOptionsBuilder
I0406 14:25:19.782781 745188 options_loader.go:53] executing builder *components.GCPCloudControllerManagerOptionsBuilder
I0406 14:25:19.782783 745188 options_loader.go:53] executing builder *components.GCPPDCSIDriverOptionsBuilder
I0406 14:25:19.782785 745188 options_loader.go:53] executing builder *components.HetznerCloudControllerManagerOptionsBuilder
I0406 14:25:19.782787 745188 options_loader.go:53] executing builder *components.KarpenterOptionsBuilder
I0406 14:25:19.783149 745188 options_loader.go:53] executing builder *components.DefaultsOptionsBuilder
I0406 14:25:19.783173 745188 options_loader.go:53] executing builder *components.EtcdOptionsBuilder
I0406 14:25:19.783177 745188 options_loader.go:53] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I0406 14:25:19.783180 745188 options_loader.go:53] executing builder *components.KubeAPIServerOptionsBuilder
I0406 14:25:20.236412 745188 options_loader.go:53] executing builder *components.DockerOptionsBuilder
I0406 14:25:20.236445 745188 options_loader.go:53] executing builder *components.ContainerdOptionsBuilder
I0406 14:25:20.236449 745188 options_loader.go:53] executing builder *components.NetworkingOptionsBuilder
I0406 14:25:20.236454 745188 options_loader.go:53] executing builder *components.KubeDnsOptionsBuilder
I0406 14:25:20.236458 745188 options_loader.go:53] executing builder *components.KubeletOptionsBuilder
I0406 14:25:20.236464 745188 kubelet.go:120] Cloud Provider: aws
I0406 14:25:20.686955 745188 options_loader.go:53] executing builder *components.KubeControllerManagerOptionsBuilder
I0406 14:25:20.686991 745188 kubecontrollermanager.go:57] Kubernetes version "1.28.6" supports AttachDetachReconcileSyncPeriod; will configure
I0406 14:25:21.170351 745188 options_loader.go:53] executing builder *components.KubeSchedulerOptionsBuilder
I0406 14:25:21.170402 745188 options_loader.go:53] executing builder *components.KubeProxyOptionsBuilder
I0406 14:25:21.626888 745188 options_loader.go:53] executing builder *components.CloudConfigurationOptionsBuilder
I0406 14:25:21.626946 745188 options_loader.go:53] executing builder *components.CalicoOptionsBuilder
I0406 14:25:21.626950 745188 options_loader.go:53] executing builder *components.CiliumOptionsBuilder
I0406 14:25:21.626952 745188 options_loader.go:53] executing builder *components.OpenStackOptionsBuilder
I0406 14:25:21.626955 745188 options_loader.go:53] executing builder *components.DiscoveryOptionsBuilder
I0406 14:25:21.626958 745188 options_loader.go:53] executing builder *components.ClusterAutoscalerOptionsBuilder
I0406 14:25:21.626960 745188 options_loader.go:53] executing builder *components.NodeTerminationHandlerOptionsBuilder
I0406 14:25:21.626962 745188 options_loader.go:53] executing builder *components.NodeProblemDetectorOptionsBuilder
I0406 14:25:21.626964 745188 options_loader.go:53] executing builder *components.AWSOptionsBuilder
I0406 14:25:21.626985 745188 options_loader.go:53] executing builder *components.AWSEBSCSIDriverOptionsBuilder
I0406 14:25:21.626988 745188 options_loader.go:53] executing builder *components.AWSCloudControllerManagerOptionsBuilder
I0406 14:25:21.626996 745188 options_loader.go:53] executing builder *components.GCPCloudControllerManagerOptionsBuilder
I0406 14:25:21.626999 745188 options_loader.go:53] executing builder *components.GCPPDCSIDriverOptionsBuilder
I0406 14:25:21.627001 745188 options_loader.go:53] executing builder *components.HetznerCloudControllerManagerOptionsBuilder
I0406 14:25:21.627003 745188 options_loader.go:53] executing builder *components.KarpenterOptionsBuilder
I0406 14:25:21.627435 745188 options_loader.go:53] executing builder *components.DefaultsOptionsBuilder
I0406 14:25:21.627459 745188 options_loader.go:53] executing builder *components.EtcdOptionsBuilder
I0406 14:25:21.627462 745188 options_loader.go:53] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I0406 14:25:21.627465 745188 options_loader.go:53] executing builder *components.KubeAPIServerOptionsBuilder
I0406 14:25:22.104677 745188 options_loader.go:53] executing builder *components.DockerOptionsBuilder
I0406 14:25:22.104729 745188 options_loader.go:53] executing builder *components.ContainerdOptionsBuilder
I0406 14:25:22.104734 745188 options_loader.go:53] executing builder *components.NetworkingOptionsBuilder
I0406 14:25:22.104737 745188 options_loader.go:53] executing builder *components.KubeDnsOptionsBuilder
I0406 14:25:22.104741 745188 options_loader.go:53] executing builder *components.KubeletOptionsBuilder
I0406 14:25:22.104746 745188 kubelet.go:120] Cloud Provider: aws
I0406 14:25:22.574300 745188 options_loader.go:53] executing builder *components.KubeControllerManagerOptionsBuilder
I0406 14:25:22.574336 745188 kubecontrollermanager.go:57] Kubernetes version "1.28.6" supports AttachDetachReconcileSyncPeriod; will configure
I0406 14:25:23.068020 745188 options_loader.go:53] executing builder *components.KubeSchedulerOptionsBuilder
I0406 14:25:23.068082 745188 options_loader.go:53] executing builder *components.KubeProxyOptionsBuilder
I0406 14:25:23.558416 745188 options_loader.go:53] executing builder *components.CloudConfigurationOptionsBuilder
I0406 14:25:23.558466 745188 options_loader.go:53] executing builder *components.CalicoOptionsBuilder
I0406 14:25:23.558470 745188 options_loader.go:53] executing builder *components.CiliumOptionsBuilder
I0406 14:25:23.558473 745188 options_loader.go:53] executing builder *components.OpenStackOptionsBuilder
I0406 14:25:23.558475 745188 options_loader.go:53] executing builder *components.DiscoveryOptionsBuilder
I0406 14:25:23.558478 745188 options_loader.go:53] executing builder *components.ClusterAutoscalerOptionsBuilder
I0406 14:25:23.558481 745188 options_loader.go:53] executing builder *components.NodeTerminationHandlerOptionsBuilder
I0406 14:25:23.558484 745188 options_loader.go:53] executing builder *components.NodeProblemDetectorOptionsBuilder
I0406 14:25:23.558486 745188 options_loader.go:53] executing builder *components.AWSOptionsBuilder
I0406 14:25:23.558490 745188 options_loader.go:53] executing builder *components.AWSEBSCSIDriverOptionsBuilder
I0406 14:25:23.558493 745188 options_loader.go:53] executing builder *components.AWSCloudControllerManagerOptionsBuilder
I0406 14:25:23.558502 745188 options_loader.go:53] executing builder *components.GCPCloudControllerManagerOptionsBuilder
I0406 14:25:23.558504 745188 options_loader.go:53] executing builder *components.GCPPDCSIDriverOptionsBuilder
I0406 14:25:23.558506 745188 options_loader.go:53] executing builder *components.HetznerCloudControllerManagerOptionsBuilder
I0406 14:25:23.558508 745188 options_loader.go:53] executing builder *components.KarpenterOptionsBuilder
I0406 14:25:23.558932 745188 spec_builder.go:45] options: {
"channel": "stable",
"configStore": {
"base": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>",
"keypairs": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki",
"secrets": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets"
},
"cloudProvider": {
"aws": {
"ebsCSIDriver": {
"enabled": true,
"version": "v1.14.1"
},
"nodeTerminationHandler": {
"enabled": true,
"enableSpotInterruptionDraining": true,
"enableScheduledEventDraining": true,
"enableRebalanceMonitoring": false,
"enableRebalanceDraining": false,
"prometheusEnable": false,
"excludeFromLoadBalancers": true,
"managedASGTag": "aws-node-termination-handler/managed",
"memoryRequest": "64Mi",
"cpuRequest": "50m",
"version": "v1.18.3"
}
}
},
"containerRuntime": "containerd",
"kubernetesVersion": "1.28.6",
"dnsZone": "Z050288919G22381WZFHT",
"clusterDNSDomain": "cluster.local",
"sshAccess": [
"0.0.0.0/0",
"::/0"
],
"etcdClusters": [
{
"name": "main",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "control-plane-us-east-1a",
"encryptedVolume": true
}
],
"version": "3.5.9",
"backups": {
"backupStore": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/main"
},
"manager": {
"backupRetentionDays": 90
},
"memoryRequest": "100Mi",
"cpuRequest": "200m"
},
{
"name": "events",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "control-plane-us-east-1a",
"encryptedVolume": true
}
],
"version": "3.5.9",
"backups": {
"backupStore": "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/events"
},
"manager": {
"backupRetentionDays": 90
},
"memoryRequest": "100Mi",
"cpuRequest": "100m"
}
],
"containerd": {
"logLevel": "info",
"version": "1.7.13",
"runc": {
"version": "1.1.12"
}
},
"docker": {
"skipInstall": true
},
"kubeDNS": {
"cacheMaxSize": 1000,
"cacheMaxConcurrent": 150,
"domain": "cluster.local",
"serverIP": "100.64.0.10",
"memoryRequest": "70Mi",
"cpuRequest": "100m",
"memoryLimit": "170Mi",
"nodeLocalDNS": {
"enabled": false,
"image": "registry.k8s.io/dns/k8s-dns-node-cache:1.22.20",
"memoryRequest": "5Mi",
"cpuRequest": "25m"
}
},
"kubeAPIServer": {
"image": "registry.k8s.io/kube-apiserver:v1.28.6@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68",
"logLevel": 2,
"cloudProvider": "external",
"securePort": 443,
"bindAddress": "0.0.0.0",
"enableAdmissionPlugins": [
"NamespaceLifecycle",
"LimitRanger",
"ServiceAccount",
"DefaultStorageClass",
"DefaultTolerationSeconds",
"MutatingAdmissionWebhook",
"ValidatingAdmissionWebhook",
"NodeRestriction",
"ResourceQuota"
],
"serviceClusterIPRange": "100.64.0.0/13",
"etcdServers": [
"https://127.0.0.1:4001"
],
"etcdServersOverrides": [
"/events#https://127.0.0.1:4002"
],
"allowPrivileged": true,
"apiServerCount": 1,
"anonymousAuth": false,
"kubeletPreferredAddressTypes": [
"InternalIP",
"Hostname",
"ExternalIP"
],
"storageBackend": "etcd3",
"authorizationMode": "Node,RBAC",
"requestheaderUsernameHeaders": [
"X-Remote-User"
],
"requestheaderGroupHeaders": [
"X-Remote-Group"
],
"requestheaderExtraHeaderPrefixes": [
"X-Remote-Extra-"
],
"requestheaderAllowedNames": [
"aggregator"
],
"featureGates": {
"InTreePluginAWSUnregister": "true"
},
"serviceAccountIssuer": "https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>",
"serviceAccountJWKSURI": "https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>/openid/v1/jwks",
"apiAudiences": [
"kubernetes.svc.default"
]
},
"kubeControllerManager": {
"logLevel": 2,
"image": "registry.k8s.io/kube-controller-manager:v1.28.6@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e",
"cloudProvider": "external",
"clusterName": "bug-report-cluster-public.<DOMAIN_REDACTED>",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": false,
"leaderElection": {
"leaderElect": true
},
"attachDetachReconcileSyncPeriod": "1m0s",
"useServiceAccountCredentials": true,
"featureGates": {
"InTreePluginAWSUnregister": "true"
}
},
"cloudControllerManager": {
"image": "registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1",
"clusterName": "bug-report-cluster-public.<DOMAIN_REDACTED>",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": false,
"leaderElection": {
"leaderElect": true
}
},
"kubeScheduler": {
"logLevel": 2,
"image": "registry.k8s.io/kube-scheduler:v1.28.6@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39",
"leaderElection": {
"leaderElect": true
},
"featureGates": {
"InTreePluginAWSUnregister": "true"
}
},
"kubeProxy": {
"image": "registry.k8s.io/kube-proxy:v1.28.6@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a",
"cpuRequest": "100m",
"logLevel": 2,
"clusterCIDR": "100.96.0.0/11",
"enabled": false
},
"kubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"podInfraContainerImage": "registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"cloudProvider": "external",
"cgroupRoot": "/",
"registerSchedulable": true,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"InTreePluginAWSUnregister": "true"
},
"protectKernelDefaults": true,
"cgroupDriver": "systemd",
"shutdownGracePeriod": "30s",
"shutdownGracePeriodCriticalPods": "10s"
},
"controlPlaneKubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"podInfraContainerImage": "registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"cloudProvider": "external",
"cgroupRoot": "/",
"registerSchedulable": true,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"InTreePluginAWSUnregister": "true"
},
"protectKernelDefaults": true,
"cgroupDriver": "systemd",
"shutdownGracePeriod": "30s",
"shutdownGracePeriodCriticalPods": "10s"
},
"cloudConfig": {
"manageStorageClasses": true
},
"externalDNS": {
"provider": "dns-controller"
},
"networking": {
"networkCIDR": "172.20.0.0/16",
"subnets": [
{
"name": "us-east-1a",
"cidr": "172.20.0.0/16",
"zone": "us-east-1a",
"type": "Public"
}
],
"topology": {
"dns": "Public"
},
"nonMasqueradeCIDR": "100.64.0.0/10",
"podCIDR": "100.96.0.0/11",
"serviceClusterIPRange": "100.64.0.0/13",
"cilium": {
"version": "v1.13.10",
"memoryRequest": "128Mi",
"cpuRequest": "25m",
"agentPrometheusPort": 9090,
"enableL7Proxy": true,
"enableBPFMasquerade": false,
"enableEndpointHealthChecking": true,
"identityAllocationMode": "crd",
"identityChangeGracePeriod": "5s",
"masquerade": true,
"tunnel": "vxlan",
"monitorAggregation": "medium",
"bpfCTGlobalTCPMax": 524288,
"bpfCTGlobalAnyMax": 262144,
"bpfLBAlgorithm": "random",
"bpfLBMaglevTableSize": "16381",
"bpfNATGlobalMax": 524288,
"bpfNeighGlobalMax": 524288,
"bpfPolicyMapMax": 16384,
"bpfLBMapMax": 65536,
"sidecarIstioProxyImage": "cilium/istio_proxy",
"clusterName": "default",
"toFQDNsDNSRejectResponseCode": "refused",
"ipam": "kubernetes",
"enableNodePort": true,
"enableRemoteNodeIdentity": true,
"enableUnreachableRoutes": false,
"hubble": {
"enabled": false
},
"disableCNPStatusUpdates": true
}
},
"api": {
"dns": {},
"publicName": "api.bug-report-cluster-public.<DOMAIN_REDACTED>",
"access": [
"0.0.0.0/0",
"::/0"
]
},
"authorization": {
"rbac": {}
},
"iam": {
"legacy": false,
"allowContainerRegistry": true
}
}
I0406 14:25:23.559008 745188 populate_instancegroup_spec.go:75] Populating instance group spec for "control-plane-us-east-1a"
I0406 14:25:23.559076 745188 populate_instancegroup_spec.go:75] Populating instance group spec for "nodes-us-east-1a"
I0406 14:25:23.559146 745188 channel.go:202] RecommendedVersion="1.28.0", Have="1.28.4". No upgrade needed.
I0406 14:25:23.559152 745188 channel.go:228] VersionRecommendationSpec does not specify RequiredVersion
I0406 14:25:23.559162 745188 channel.go:183] RecommendedVersion="1.28.6", Have="1.28.6". No upgrade needed.
I0406 14:25:23.559168 745188 channel.go:221] RequiredVersion="1.28.0", Have="1.28.6". No upgrade needed.
I0406 14:25:23.559181 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/kops-version.txt"
I0406 14:25:23.762358 745188 aws_cloud.go:2099] Calling DescribeImages to resolve name "099720109477/ubuntu/images/hvm-ssd/ubuntu-jammy-22.04-arm64-server-20240126"
I0406 14:25:23.762567 745188 request_logger.go:45] AWS request: ec2/DescribeImages
I0406 14:25:24.032411 745188 aws_cloud.go:2169] Resolved image "ami-0ccb3496f552e9547"
I0406 14:25:24.032458 745188 aws_cloud.go:2099] Calling DescribeImages to resolve name "099720109477/ubuntu/images/hvm-ssd/ubuntu-jammy-22.04-amd64-server-20240126"
I0406 14:25:24.032594 745188 request_logger.go:45] AWS request: ec2/DescribeImages
I0406 14:25:24.194786 745188 aws_cloud.go:2169] Resolved image "ami-04ab94c703fb30101"
I0406 14:25:24.194957 745188 request_logger.go:45] AWS request: ec2/DescribeInstanceTypes
I0406 14:25:24.270670 745188 clientset.go:108] Using keystore path: "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki"
I0406 14:25:24.270734 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/clusteraddons/default"
I0406 14:25:24.317390 745188 builder.go:340] Trying to read hash fie: "https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubelet.sha256"
I0406 14:25:24.317464 745188 context.go:242] Performing HTTP request: GET https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubelet.sha256
I0406 14:25:24.541259 745188 builder.go:348] Found hash "8506df1f20a5f8bba0592f5a4cf5d0cc541047708e664cb88580735400d0b26f" for "https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubelet"
I0406 14:25:24.541313 745188 builder.go:269] adding file: &{DownloadURL:https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubelet CanonicalURL:https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubelet SHAValue:8506df1f20a5f8bba0592f5a4cf5d0cc541047708e664cb88580735400d0b26f}
I0406 14:25:24.541333 745188 builder.go:340] Trying to read hash fie: "https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubectl.sha256"
I0406 14:25:24.541341 745188 context.go:242] Performing HTTP request: GET https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubectl.sha256
I0406 14:25:24.585043 745188 builder.go:348] Found hash "c8351fe0611119fd36634dd3f53eb94ec1a2d43ef9e78b92b4846df5cc7aa7e3" for "https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubectl"
I0406 14:25:24.585098 745188 builder.go:269] adding file: &{DownloadURL:https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubectl CanonicalURL:https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubectl SHAValue:c8351fe0611119fd36634dd3f53eb94ec1a2d43ef9e78b92b4846df5cc7aa7e3}
I0406 14:25:24.585129 745188 builder.go:340] Trying to read hash fie: "https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/amd64/ecr-credential-provider-linux-amd64.sha256"
I0406 14:25:24.585136 745188 context.go:242] Performing HTTP request: GET https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/amd64/ecr-credential-provider-linux-amd64.sha256
I0406 14:25:24.838049 745188 builder.go:348] Found hash "5035d7814c95cd3cedbc5efb447ef25a4942ef05caab2159746d55ce1698c74a" for "https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/amd64/ecr-credential-provider-linux-amd64"
I0406 14:25:24.838100 745188 builder.go:269] adding file: &{DownloadURL:https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/amd64/ecr-credential-provider-linux-amd64 CanonicalURL:https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/amd64/ecr-credential-provider-linux-amd64 SHAValue:5035d7814c95cd3cedbc5efb447ef25a4942ef05caab2159746d55ce1698c74a}
I0406 14:25:24.838140 745188 networking.go:84] Adding default ARM64 CNI plugin binaries asset: https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-amd64-v1.2.0.tgz
I0406 14:25:24.838153 745188 builder.go:340] Trying to read hash fie: "https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-amd64-v1.2.0.tgz.sha256"
I0406 14:25:24.838164 745188 context.go:242] Performing HTTP request: GET https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-amd64-v1.2.0.tgz.sha256
I0406 14:25:24.856457 745188 builder.go:348] Found hash "f3a841324845ca6bf0d4091b4fc7f97e18a623172158b72fc3fdcdb9d42d2d37 cni-plugins-linux-amd64-v1.2.0.tgz" for "https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-amd64-v1.2.0.tgz"
I0406 14:25:24.856511 745188 builder.go:269] adding file: &{DownloadURL:https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-amd64-v1.2.0.tgz CanonicalURL:https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-amd64-v1.2.0.tgz SHAValue:f3a841324845ca6bf0d4091b4fc7f97e18a623172158b72fc3fdcdb9d42d2d37}
I0406 14:25:24.856540 745188 builder.go:340] Trying to read hash fie: "https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz.sha256"
I0406 14:25:24.856548 745188 context.go:242] Performing HTTP request: GET https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz.sha256
I0406 14:25:25.335762 745188 context.go:314] hit maximum retries 1 with error file does not exist
I0406 14:25:25.335799 745188 builder.go:344] Unable to read hash file "https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz.sha256": file does not exist
I0406 14:25:25.335806 745188 builder.go:359] Unable to read new sha256 hash file (is this an older/unsupported kubernetes release?)
I0406 14:25:25.335814 745188 builder.go:340] Trying to read hash fie: "https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz.sha256sum"
I0406 14:25:25.335820 745188 context.go:242] Performing HTTP request: GET https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz.sha256sum
I0406 14:25:25.587243 745188 builder.go:348] Found hash "c2371c009dd8b7738663333d91e5ab50d204f8bcae24201f45d59060d12c3a23 containerd-1.7.13-linux-amd64.tar.gz" for "https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz"
I0406 14:25:25.587336 745188 builder.go:269] adding file: &{DownloadURL:https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz CanonicalURL:https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz SHAValue:c2371c009dd8b7738663333d91e5ab50d204f8bcae24201f45d59060d12c3a23}
I0406 14:25:25.587374 745188 builder.go:297] adding file: &{DownloadURL:https://github.com/opencontainers/runc/releases/download/v1.1.12/runc.amd64 CanonicalURL:https://github.com/opencontainers/runc/releases/download/v1.1.12/runc.amd64 SHAValue:aadeef400b8f05645768c1476d1023f7875b78f52c7ff1967a6dbce236b8cbd8}
I0406 14:25:25.587386 745188 urls.go:61] Using default base url: "https://artifacts.k8s.io/binaries/kops/1.28.4/"
I0406 14:25:25.587396 745188 builder.go:340] Trying to read hash fie: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/nodeup.sha256"
I0406 14:25:25.587404 745188 context.go:242] Performing HTTP request: GET https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/nodeup.sha256
I0406 14:25:25.658651 745188 builder.go:348] Found hash "feb93d1e05b0fd1f69aec6e6fe6117163026b39c267e36a5bef9fe6a2412a8a9" for "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/nodeup"
I0406 14:25:25.658739 745188 builder.go:269] adding file: &{DownloadURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/nodeup CanonicalURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/nodeup SHAValue:feb93d1e05b0fd1f69aec6e6fe6117163026b39c267e36a5bef9fe6a2412a8a9}
I0406 14:25:25.658760 745188 urls.go:102] Using default nodeup location for amd64: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/nodeup"
I0406 14:25:25.658772 745188 builder.go:340] Trying to read hash fie: "https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubelet.sha256"
I0406 14:25:25.658779 745188 context.go:242] Performing HTTP request: GET https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubelet.sha256
I0406 14:25:25.704098 745188 builder.go:348] Found hash "ee2c060deff330d3338e24aec9734c9e5d5aea4fea1905c0795bccff6997a65e" for "https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubelet"
I0406 14:25:25.704161 745188 builder.go:269] adding file: &{DownloadURL:https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubelet CanonicalURL:https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubelet SHAValue:ee2c060deff330d3338e24aec9734c9e5d5aea4fea1905c0795bccff6997a65e}
I0406 14:25:25.704192 745188 builder.go:340] Trying to read hash fie: "https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubectl.sha256"
I0406 14:25:25.704203 745188 context.go:242] Performing HTTP request: GET https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubectl.sha256
I0406 14:25:25.750060 745188 builder.go:348] Found hash "0de705659a80c3fef01df43cc0926610fe31482f728b0f992818abd9bdcd2cb9" for "https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubectl"
I0406 14:25:25.750109 745188 builder.go:269] adding file: &{DownloadURL:https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubectl CanonicalURL:https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubectl SHAValue:0de705659a80c3fef01df43cc0926610fe31482f728b0f992818abd9bdcd2cb9}
I0406 14:25:25.750136 745188 builder.go:340] Trying to read hash fie: "https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/arm64/ecr-credential-provider-linux-arm64.sha256"
I0406 14:25:25.750147 745188 context.go:242] Performing HTTP request: GET https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/arm64/ecr-credential-provider-linux-arm64.sha256
I0406 14:25:25.805612 745188 builder.go:348] Found hash "b3d567bda9e2996fc1fbd9d13506bd16763d3865b5c7b0b3c4b48c6088c04481" for "https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/arm64/ecr-credential-provider-linux-arm64"
I0406 14:25:25.805660 745188 builder.go:269] adding file: &{DownloadURL:https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/arm64/ecr-credential-provider-linux-arm64 CanonicalURL:https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/arm64/ecr-credential-provider-linux-arm64 SHAValue:b3d567bda9e2996fc1fbd9d13506bd16763d3865b5c7b0b3c4b48c6088c04481}
I0406 14:25:25.805688 745188 networking.go:91] Adding default AMD64 CNI plugin binaries asset: https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-arm64-v1.2.0.tgz
I0406 14:25:25.805696 745188 builder.go:340] Trying to read hash fie: "https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-arm64-v1.2.0.tgz.sha256"
I0406 14:25:25.805703 745188 context.go:242] Performing HTTP request: GET https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-arm64-v1.2.0.tgz.sha256
I0406 14:25:25.821181 745188 builder.go:348] Found hash "525e2b62ba92a1b6f3dc9612449a84aa61652e680f7ebf4eff579795fe464b57 cni-plugins-linux-arm64-v1.2.0.tgz" for "https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-arm64-v1.2.0.tgz"
I0406 14:25:25.821253 745188 builder.go:269] adding file: &{DownloadURL:https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-arm64-v1.2.0.tgz CanonicalURL:https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-arm64-v1.2.0.tgz SHAValue:525e2b62ba92a1b6f3dc9612449a84aa61652e680f7ebf4eff579795fe464b57}
I0406 14:25:25.821293 745188 builder.go:340] Trying to read hash fie: "https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz.sha256"
I0406 14:25:25.821304 745188 context.go:242] Performing HTTP request: GET https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz.sha256
I0406 14:25:25.987034 745188 context.go:314] hit maximum retries 1 with error file does not exist
I0406 14:25:25.987097 745188 builder.go:344] Unable to read hash file "https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz.sha256": file does not exist
I0406 14:25:25.987105 745188 builder.go:359] Unable to read new sha256 hash file (is this an older/unsupported kubernetes release?)
I0406 14:25:25.987113 745188 builder.go:340] Trying to read hash fie: "https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz.sha256sum"
I0406 14:25:25.987122 745188 context.go:242] Performing HTTP request: GET https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz.sha256sum
I0406 14:25:26.186372 745188 builder.go:348] Found hash "118759e398f35337109592b4d237538872dc12a207d38832b9d04515d0acbc4d containerd-1.7.13-linux-arm64.tar.gz" for "https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz"
I0406 14:25:26.186424 745188 builder.go:269] adding file: &{DownloadURL:https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz CanonicalURL:https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz SHAValue:118759e398f35337109592b4d237538872dc12a207d38832b9d04515d0acbc4d}
I0406 14:25:26.186453 745188 builder.go:297] adding file: &{DownloadURL:https://github.com/opencontainers/runc/releases/download/v1.1.12/runc.arm64 CanonicalURL:https://github.com/opencontainers/runc/releases/download/v1.1.12/runc.arm64 SHAValue:879f910a05c95c10c64ad8eb7d5e3aa8e4b30e65587b3d68e009a3565aed5bb8}
I0406 14:25:26.186490 745188 urls.go:53] Using cached kopsBaseUrl url: "https://artifacts.k8s.io/binaries/kops/1.28.4/"
I0406 14:25:26.186504 745188 builder.go:340] Trying to read hash fie: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/nodeup.sha256"
I0406 14:25:26.186513 745188 context.go:242] Performing HTTP request: GET https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/nodeup.sha256
I0406 14:25:26.241887 745188 builder.go:348] Found hash "731e47ff2571d4c3edd05d52e3ddc50decf4aaa5c3954e91d3e160119d0282f7" for "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/nodeup"
I0406 14:25:26.241950 745188 builder.go:269] adding file: &{DownloadURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/nodeup CanonicalURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/nodeup SHAValue:731e47ff2571d4c3edd05d52e3ddc50decf4aaa5c3954e91d3e160119d0282f7}
I0406 14:25:26.241970 745188 urls.go:102] Using default nodeup location for arm64: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/nodeup"
I0406 14:25:26.241986 745188 s3fs.go:409] Listing objects in S3 bucket "kops-state-store-public-terraform-missing-route53-api-endpoint" with prefix "bug-report-cluster-public.<DOMAIN_REDACTED>/pki/ssh/public/admin/"
I0406 14:25:26.294792 745188 s3fs.go:437] Listed files in s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/ssh/public/admin: []
I0406 14:25:26.557721 745188 request_logger.go:45] AWS request: sts/GetCallerIdentity
I0406 14:25:26.788966 745188 route53.go:53] AWS request: route53 ListHostedZones
I0406 14:25:27.349727 745188 dns.go:109] Doing DNS lookup to verify NS records for "bug-report-cluster-public.<DOMAIN_REDACTED>"
I0406 14:25:27.422865 745188 dns.go:125] Found NS records for "bug-report-cluster-public.<DOMAIN_REDACTED>": [ns-1041.awsdns-02.org. ns-1779.awsdns-30.co.uk. ns-257.awsdns-32.com. ns-528.awsdns-02.net.]
I0406 14:25:27.422972 745188 urls.go:53] Using cached kopsBaseUrl url: "https://artifacts.k8s.io/binaries/kops/1.28.4/"
I0406 14:25:27.422990 745188 builder.go:340] Trying to read hash fie: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/protokube.sha256"
I0406 14:25:27.422998 745188 context.go:242] Performing HTTP request: GET https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/protokube.sha256
I0406 14:25:27.491619 745188 builder.go:348] Found hash "327e4ec78626156d7e50f46b4f2cf3ad0c1f7022dd32b6a8ea85e08e5774a081" for "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/protokube"
I0406 14:25:27.491684 745188 builder.go:269] adding file: &{DownloadURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/protokube CanonicalURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/protokube SHAValue:327e4ec78626156d7e50f46b4f2cf3ad0c1f7022dd32b6a8ea85e08e5774a081}
I0406 14:25:27.491708 745188 urls.go:122] Using default protokube location for amd64: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/protokube"
I0406 14:25:27.491717 745188 urls.go:53] Using cached kopsBaseUrl url: "https://artifacts.k8s.io/binaries/kops/1.28.4/"
I0406 14:25:27.491726 745188 builder.go:340] Trying to read hash fie: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/protokube.sha256"
I0406 14:25:27.491733 745188 context.go:242] Performing HTTP request: GET https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/protokube.sha256
I0406 14:25:27.557956 745188 builder.go:348] Found hash "2e4dae59f499c7e1d314b47e8a9a4e10d9fcd6c15edd25bc9b691aceb319e3b0" for "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/protokube"
I0406 14:25:27.558003 745188 builder.go:269] adding file: &{DownloadURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/protokube CanonicalURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/protokube SHAValue:2e4dae59f499c7e1d314b47e8a9a4e10d9fcd6c15edd25bc9b691aceb319e3b0}
I0406 14:25:27.558022 745188 urls.go:122] Using default protokube location for arm64: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/protokube"
I0406 14:25:27.558035 745188 urls.go:53] Using cached kopsBaseUrl url: "https://artifacts.k8s.io/binaries/kops/1.28.4/"
I0406 14:25:27.558044 745188 builder.go:340] Trying to read hash fie: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/channels.sha256"
I0406 14:25:27.558051 745188 context.go:242] Performing HTTP request: GET https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/channels.sha256
I0406 14:25:27.616167 745188 builder.go:348] Found hash "2d6b8d804e29b0df7a570cf7285fed54195e9410c3e9ed7ce745af4c787a14ee" for "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/channels"
I0406 14:25:27.616271 745188 builder.go:269] adding file: &{DownloadURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/channels CanonicalURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/channels SHAValue:2d6b8d804e29b0df7a570cf7285fed54195e9410c3e9ed7ce745af4c787a14ee}
I0406 14:25:27.616313 745188 urls.go:142] Using default channels location for amd64: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/channels"
I0406 14:25:27.616322 745188 urls.go:53] Using cached kopsBaseUrl url: "https://artifacts.k8s.io/binaries/kops/1.28.4/"
I0406 14:25:27.616331 745188 builder.go:340] Trying to read hash fie: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/channels.sha256"
I0406 14:25:27.616338 745188 context.go:242] Performing HTTP request: GET https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/channels.sha256
I0406 14:25:27.676488 745188 builder.go:348] Found hash "e4045de5d7cb88437a1704ac7e3222bcdf5a9b7ee8b9f559ce07b44e577f3f00" for "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/channels"
I0406 14:25:27.676567 745188 builder.go:269] adding file: &{DownloadURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/channels CanonicalURL:https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/channels SHAValue:e4045de5d7cb88437a1704ac7e3222bcdf5a9b7ee8b9f559ce07b44e577f3f00}
I0406 14:25:27.676615 745188 urls.go:142] Using default channels location for arm64: "https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/channels"
I0406 14:25:27.676952 745188 templates.go:89] loading resource "addons/OWNERS"
I0406 14:25:27.676996 745188 templates.go:81] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml"
I0406 14:25:27.677009 745188 templates.go:89] loading resource "addons/authentication.kope.io/k8s-1.12.yaml"
I0406 14:25:27.677016 745188 templates.go:81] loading (templated) resource "addons/aws-cloud-controller.addons.k8s.io/k8s-1.18.yaml"
I0406 14:25:27.677032 745188 templates.go:81] loading (templated) resource "addons/aws-ebs-csi-driver.addons.k8s.io/k8s-1.17.yaml"
I0406 14:25:27.677163 745188 templates.go:81] loading (templated) resource "addons/aws-load-balancer-controller.addons.k8s.io/k8s-1.19.yaml"
I0406 14:25:27.678053 745188 templates.go:81] loading (templated) resource "addons/certmanager.io/k8s-1.16.yaml"
I0406 14:25:27.678133 745188 templates.go:81] loading (templated) resource "addons/cluster-autoscaler.addons.k8s.io/k8s-1.15.yaml"
I0406 14:25:27.678145 745188 templates.go:81] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml"
I0406 14:25:27.678152 745188 templates.go:81] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml"
I0406 14:25:27.678342 745188 templates.go:81] loading (templated) resource "addons/digitalocean-csi-driver.addons.k8s.io/k8s-1.22.yaml"
I0406 14:25:27.678496 745188 templates.go:81] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
I0406 14:25:27.678526 745188 templates.go:81] loading (templated) resource "addons/eks-pod-identity-webhook.addons.k8s.io/k8s-1.16.yaml"
I0406 14:25:27.678538 745188 templates.go:81] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.19.yaml"
I0406 14:25:27.678568 745188 templates.go:81] loading (templated) resource "addons/gcp-cloud-controller.addons.k8s.io/k8s-1.23.yaml"
I0406 14:25:27.678585 745188 templates.go:81] loading (templated) resource "addons/gcp-pd-csi-driver.addons.k8s.io/k8s-1.23.yaml"
I0406 14:25:27.678593 745188 templates.go:81] loading (templated) resource "addons/hcloud-cloud-controller.addons.k8s.io/k8s-1.22.yaml"
I0406 14:25:27.678600 745188 templates.go:81] loading (templated) resource "addons/hcloud-csi-driver.addons.k8s.io/k8s-1.22.yaml"
I0406 14:25:27.678661 745188 templates.go:81] loading (templated) resource "addons/karpenter.sh/k8s-1.19.yaml"
I0406 14:25:27.678700 745188 templates.go:81] loading (templated) resource "addons/kops-controller.addons.k8s.io/k8s-1.16.yaml"
I0406 14:25:27.678708 745188 templates.go:81] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml"
I0406 14:25:27.678716 745188 templates.go:89] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I0406 14:25:27.678721 745188 templates.go:89] loading resource "addons/leader-migration.rbac.addons.k8s.io/k8s-1.23.yaml"
I0406 14:25:27.678726 745188 templates.go:89] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I0406 14:25:27.678730 745188 templates.go:89] loading resource "addons/metadata-proxy.addons.k8s.io/v0.1.12.yaml"
I0406 14:25:27.678737 745188 templates.go:81] loading (templated) resource "addons/metrics-server.addons.k8s.io/k8s-1.11.yaml"
I0406 14:25:27.678749 745188 templates.go:81] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.16.yaml"
I0406 14:25:27.678782 745188 templates.go:81] loading (templated) resource "addons/networking.cilium.io/k8s-1.16-v1.13.yaml"
I0406 14:25:27.678794 745188 templates.go:81] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml"
I0406 14:25:27.678823 745188 templates.go:81] loading (templated) resource "addons/networking.flannel/k8s-1.25.yaml"
I0406 14:25:27.678850 745188 templates.go:89] loading resource "addons/networking.kope.io/k8s-1.12.yaml"
I0406 14:25:27.678856 745188 templates.go:81] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml"
I0406 14:25:27.680657 745188 templates.go:81] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.22.yaml"
I0406 14:25:27.681272 745188 templates.go:81] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.25.yaml"
I0406 14:25:27.681482 745188 templates.go:81] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.22.yaml"
I0406 14:25:27.681713 745188 templates.go:81] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.25.yaml"
I0406 14:25:27.681788 745188 templates.go:81] loading (templated) resource "addons/node-problem-detector.addons.k8s.io/k8s-1.17.yaml"
I0406 14:25:27.681819 745188 templates.go:81] loading (templated) resource "addons/node-termination-handler.aws/k8s-1.11.yaml"
I0406 14:25:27.681824 745188 templates.go:81] loading (templated) resource "addons/nodelocaldns.addons.k8s.io/k8s-1.12.yaml"
I0406 14:25:27.681831 745188 templates.go:81] loading (templated) resource "addons/nvidia.addons.k8s.io/k8s-1.16.yaml"
I0406 14:25:27.681837 745188 templates.go:81] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.13.yaml"
I0406 14:25:27.681842 745188 templates.go:81] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml"
I0406 14:25:27.681847 745188 templates.go:81] loading (templated) resource "addons/scaleway-cloud-controller.addons.k8s.io/k8s-1.24.yaml"
I0406 14:25:27.681867 745188 templates.go:81] loading (templated) resource "addons/scaleway-csi-driver.addons.k8s.io/k8s-1.24.yaml"
I0406 14:25:27.681880 745188 templates.go:89] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml"
I0406 14:25:27.681937 745188 templates.go:81] loading (templated) resource "addons/snapshot-controller.addons.k8s.io/k8s-1.20.yaml"
I0406 14:25:27.682013 745188 templates.go:81] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.14.0.yaml"
I0406 14:25:27.682021 745188 templates.go:81] loading (templated) resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I0406 14:25:27.682025 745188 templates.go:81] loading (templated) resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml"
I0406 14:25:27.682041 745188 templates.go:81] loading (templated) resource "addons/storage-openstack.addons.k8s.io/k8s-1.16.yaml"
I0406 14:25:27.682091 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/ciliumpassword"
I0406 14:25:27.751751 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-kops-controller.addons.k8s.io-k8s-1.16"
I0406 14:25:27.755342 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=data):map[%!f(string=config.yaml):%!f(string={"clusterName":"bug-report-cluster-public.<DOMAIN_REDACTED>","cloud":"aws","configBase":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>","secretStore":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets","server":{"Listen":":3988","provider":{"aws":{"nodesRoles":["nodes.bug-report-cluster-public.<DOMAIN_REDACTED>"],"Region":"us-east-1"}},"serverKeyPath":"/etc/kubernetes/kops-controller/pki/kops-controller.key","serverCertificatePath":"/etc/kubernetes/kops-controller/pki/kops-controller.crt","caBasePath":"/etc/kubernetes/kops-controller/pki","signingCAs":["kubernetes-ca"],"certNames":["kubelet","kubelet-server"],"useInstanceIDForNodeName":true}}
)] %!f(string=kind):%!f(string=ConfigMap) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:27.755407 745188 visitor.go:44] object value at data: map[%!f(string=config.yaml):%!f(string={"clusterName":"bug-report-cluster-public.<DOMAIN_REDACTED>","cloud":"aws","configBase":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>","secretStore":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets","server":{"Listen":":3988","provider":{"aws":{"nodesRoles":["nodes.bug-report-cluster-public.<DOMAIN_REDACTED>"],"Region":"us-east-1"}},"serverKeyPath":"/etc/kubernetes/kops-controller/pki/kops-controller.key","serverCertificatePath":"/etc/kubernetes/kops-controller/pki/kops-controller.crt","caBasePath":"/etc/kubernetes/kops-controller/pki","signingCAs":["kubernetes-ca"],"certNames":["kubelet","kubelet-server"],"useInstanceIDForNodeName":true}}
)]
I0406 14:25:27.755413 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:27.755419 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)]
I0406 14:25:27.755424 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=DaemonSet) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=kops-controller) %!f(string=version):%!f(string=v1.28.4)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kops-controller)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=annotations):map[%!f(string=dns.alpha.kubernetes.io/internal):%!f(string=kops-controller.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=kops-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--v=2) %!f(string=--conf=/etc/kubernetes/kops-controller/config/config.yaml)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/kops-controller:1.28.4) %!f(string=name):%!f(string=kops-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):10011.000000] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/config/) %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/pki/) %!f(string=name):%!f(string=kops-controller-pki)]]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccount):%!f(string=kops-controller) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=kops-controller)] %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/kops-controller/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kops-controller-pki)]]]] %!f(string=updateStrategy):map[%!f(string=type):%!f(string=OnDelete)]]]
I0406 14:25:27.755467 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=kops-controller) %!f(string=version):%!f(string=v1.28.4)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:27.755474 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=kops-controller) %!f(string=version):%!f(string=v1.28.4)]
I0406 14:25:27.755479 745188 visitor.go:44] object value at spec: map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kops-controller)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=annotations):map[%!f(string=dns.alpha.kubernetes.io/internal):%!f(string=kops-controller.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=kops-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--v=2) %!f(string=--conf=/etc/kubernetes/kops-controller/config/config.yaml)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/kops-controller:1.28.4) %!f(string=name):%!f(string=kops-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):10011.000000] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/config/) %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/pki/) %!f(string=name):%!f(string=kops-controller-pki)]]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccount):%!f(string=kops-controller) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=kops-controller)] %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/kops-controller/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kops-controller-pki)]]]] %!f(string=updateStrategy):map[%!f(string=type):%!f(string=OnDelete)]]
I0406 14:25:27.755510 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kops-controller)]]
I0406 14:25:27.755513 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=k8s-app):%!f(string=kops-controller)]
I0406 14:25:27.755516 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=annotations):map[%!f(string=dns.alpha.kubernetes.io/internal):%!f(string=kops-controller.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=kops-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--v=2) %!f(string=--conf=/etc/kubernetes/kops-controller/config/config.yaml)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/kops-controller:1.28.4) %!f(string=name):%!f(string=kops-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):10011.000000] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/config/) %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/pki/) %!f(string=name):%!f(string=kops-controller-pki)]]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccount):%!f(string=kops-controller) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=kops-controller)] %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/kops-controller/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kops-controller-pki)]]]]
I0406 14:25:27.755545 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=annotations):map[%!f(string=dns.alpha.kubernetes.io/internal):%!f(string=kops-controller.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=kops-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]]
I0406 14:25:27.755550 745188 visitor.go:44] object value at spec.template.metadata.annotations: map[%!f(string=dns.alpha.kubernetes.io/internal):%!f(string=kops-controller.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)]
I0406 14:25:27.755553 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=kops-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]
I0406 14:25:27.755557 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--v=2) %!f(string=--conf=/etc/kubernetes/kops-controller/config/config.yaml)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/kops-controller:1.28.4) %!f(string=name):%!f(string=kops-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):10011.000000] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/config/) %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/pki/) %!f(string=name):%!f(string=kops-controller-pki)]]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccount):%!f(string=kops-controller) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=kops-controller)] %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/kops-controller/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kops-controller-pki)]]]
I0406 14:25:27.755580 745188 visitor.go:44] object value at spec.template.spec.affinity: map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]]]]]
I0406 14:25:27.755591 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity: map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]]]]
I0406 14:25:27.755598 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution: map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]]]
I0406 14:25:27.755606 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:27.755611 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:27.755614 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[1]: map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:27.755617 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:27.755622 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:27.755626 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1].matchExpressions.[1]: map[%!f(string=key):%!f(string=kops.k8s.io/kops-controller-pki) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:27.755630 745188 visitor.go:44] object value at spec.template.spec.volumes.[0]: map[%!f(string=configMap):map[%!f(string=name):%!f(string=kops-controller)] %!f(string=name):%!f(string=kops-controller-config)]
I0406 14:25:27.755633 745188 visitor.go:44] object value at spec.template.spec.volumes.[0].configMap: map[%!f(string=name):%!f(string=kops-controller)]
I0406 14:25:27.755636 745188 visitor.go:44] object value at spec.template.spec.volumes.[1]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/kops-controller/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kops-controller-pki)]
I0406 14:25:27.755640 745188 visitor.go:44] object value at spec.template.spec.volumes.[1].hostPath: map[%!f(string=path):%!f(string=/etc/kubernetes/kops-controller/) %!f(string=type):%!f(string=Directory)]
I0406 14:25:27.755644 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=args):[%!f(string=--v=2) %!f(string=--conf=/etc/kubernetes/kops-controller/config/config.yaml)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/kops-controller:1.28.4) %!f(string=name):%!f(string=kops-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):10011.000000] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/config/) %!f(string=name):%!f(string=kops-controller-config)] map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/pki/) %!f(string=name):%!f(string=kops-controller-pki)]]]
I0406 14:25:27.755654 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources: map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]]
I0406 14:25:27.755657 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.requests: map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]
I0406 14:25:27.755682 745188 visitor.go:44] object value at spec.template.spec.containers.[0].securityContext: map[%!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):10011.000000]
I0406 14:25:27.755690 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.runAsNonRoot: true
I0406 14:25:27.755693 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].securityContext.runAsUser: 10011.000000
I0406 14:25:27.755696 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/config/) %!f(string=name):%!f(string=kops-controller-config)]
I0406 14:25:27.755699 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[1]: map[%!f(string=mountPath):%!f(string=/etc/kubernetes/kops-controller/pki/) %!f(string=name):%!f(string=kops-controller-pki)]
I0406 14:25:27.755703 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0]: map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]
I0406 14:25:27.755708 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/kops/kops-controller:1.28.4"
I0406 14:25:28.322784 745188 visitor.go:34] string value at spec.template.spec.hostNetwork: true
I0406 14:25:28.322825 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:28.322841 745188 visitor.go:44] object value at spec.template.spec.tolerations.[1]: map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:28.322845 745188 visitor.go:44] object value at spec.template.spec.tolerations.[2]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:28.322848 745188 visitor.go:44] object value at spec.template.spec.tolerations.[3]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:28.322851 745188 visitor.go:44] object value at spec.updateStrategy: map[%!f(string=type):%!f(string=OnDelete)]
I0406 14:25:28.322877 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:28.322887 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.322893 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)]
I0406 14:25:28.322898 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=patch)]]]]
I0406 14:25:28.322925 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller)]
I0406 14:25:28.322930 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)]
I0406 14:25:28.322934 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=patch)]]
I0406 14:25:28.322938 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=kops-controller)] %!f(string=subjects):[map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=User) %!f(string=name):%!f(string=system:serviceaccount:kube-system:kops-controller)]]]
I0406 14:25:28.322948 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller)]
I0406 14:25:28.322953 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)]
I0406 14:25:28.322956 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=kops-controller)]
I0406 14:25:28.322960 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=User) %!f(string=name):%!f(string=system:serviceaccount:kube-system:kops-controller)]
I0406 14:25:28.322966 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=Role) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=create)]] map[%!f(string=apiGroups):[%!f(string=) %!f(string=coordination.k8s.io)] %!f(string=resourceNames):[%!f(string=kops-controller-leader)] %!f(string=resources):[%!f(string=configmaps) %!f(string=leases)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=patch) %!f(string=update) %!f(string=delete)]] map[%!f(string=apiGroups):[%!f(string=) %!f(string=coordination.k8s.io)] %!f(string=resources):[%!f(string=configmaps) %!f(string=leases)] %!f(string=verbs):[%!f(string=create)]]]]
I0406 14:25:28.322981 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.322988 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)]
I0406 14:25:28.322992 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=create)]]
I0406 14:25:28.322997 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=) %!f(string=coordination.k8s.io)] %!f(string=resourceNames):[%!f(string=kops-controller-leader)] %!f(string=resources):[%!f(string=configmaps) %!f(string=leases)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=patch) %!f(string=update) %!f(string=delete)]]
I0406 14:25:28.323031 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=) %!f(string=coordination.k8s.io)] %!f(string=resources):[%!f(string=configmaps) %!f(string=leases)] %!f(string=verbs):[%!f(string=create)]]
I0406 14:25:28.323036 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=RoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=Role) %!f(string=name):%!f(string=kops-controller)] %!f(string=subjects):[map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=User) %!f(string=name):%!f(string=system:serviceaccount:kube-system:kops-controller)]]]
I0406 14:25:28.323044 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.323049 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=kops-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kops-controller.addons.k8s.io)]
I0406 14:25:28.323080 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=Role) %!f(string=name):%!f(string=kops-controller)]
I0406 14:25:28.323086 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=User) %!f(string=name):%!f(string=system:serviceaccount:kube-system:kops-controller)]
I0406 14:25:28.324188 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: v1
data:
config.yaml: |
{"clusterName":"bug-report-cluster-public.<DOMAIN_REDACTED>","cloud":"aws","configBase":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>","secretStore":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets","server":{"Listen":":3988","provider":{"aws":{"nodesRoles":["nodes.bug-report-cluster-public.<DOMAIN_REDACTED>"],"Region":"us-east-1"}},"serverKeyPath":"/etc/kubernetes/kops-controller/pki/kops-controller.key","serverCertificatePath":"/etc/kubernetes/kops-controller/pki/kops-controller.crt","caBasePath":"/etc/kubernetes/kops-controller/pki","signingCAs":["kubernetes-ca"],"certNames":["kubelet","kubelet-server"],"useInstanceIDForNodeName":true}}
kind: ConfigMap
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: kops-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: kops-controller.addons.k8s.io
name: kops-controller
namespace: kube-system
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: kops-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: kops-controller.addons.k8s.io
k8s-app: kops-controller
version: v1.28.4
name: kops-controller
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kops-controller
template:
metadata:
annotations:
dns.alpha.kubernetes.io/internal: kops-controller.internal.bug-report-cluster-public.<DOMAIN_REDACTED>
creationTimestamp: null
labels:
k8s-addon: kops-controller.addons.k8s.io
k8s-app: kops-controller
kops.k8s.io/managed-by: kops
version: v1.28.4
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
- key: kops.k8s.io/kops-controller-pki
operator: Exists
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
- key: kops.k8s.io/kops-controller-pki
operator: Exists
containers:
- args:
- --v=2
- --conf=/etc/kubernetes/kops-controller/config/config.yaml
command: null
env:
- name: KUBERNETES_SERVICE_HOST
value: 127.0.0.1
image: registry.k8s.io/kops/kops-controller:1.28.4@sha256:884c953b4b13c9f2f54f9f65775025769257a87c0c904728c15df7f87ef26b75
name: kops-controller
resources:
requests:
cpu: 50m
memory: 50Mi
securityContext:
runAsNonRoot: true
runAsUser: 10011
volumeMounts:
- mountPath: /etc/kubernetes/kops-controller/config/
name: kops-controller-config
- mountPath: /etc/kubernetes/kops-controller/pki/
name: kops-controller-pki
dnsPolicy: Default
hostNetwork: true
nodeSelector: null
priorityClassName: system-cluster-critical
serviceAccount: kops-controller
tolerations:
- key: node.cloudprovider.kubernetes.io/uninitialized
operator: Exists
- key: node.kubernetes.io/not-ready
operator: Exists
- key: node-role.kubernetes.io/master
operator: Exists
- key: node-role.kubernetes.io/control-plane
operator: Exists
volumes:
- configMap:
name: kops-controller
name: kops-controller-config
- hostPath:
path: /etc/kubernetes/kops-controller/
type: Directory
name: kops-controller-pki
updateStrategy:
type: OnDelete
---
apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: kops-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: kops-controller.addons.k8s.io
name: kops-controller
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: kops-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: kops-controller.addons.k8s.io
name: kops-controller
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
- list
- watch
- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: kops-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: kops-controller.addons.k8s.io
name: kops-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kops-controller
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: system:serviceaccount:kube-system:kops-controller
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: kops-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: kops-controller.addons.k8s.io
name: kops-controller
namespace: kube-system
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- get
- list
- watch
- create
- apiGroups:
- ""
- coordination.k8s.io
resourceNames:
- kops-controller-leader
resources:
- configmaps
- leases
verbs:
- get
- list
- watch
- patch
- update
- delete
- apiGroups:
- ""
- coordination.k8s.io
resources:
- configmaps
- leases
verbs:
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: kops-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: kops-controller.addons.k8s.io
name: kops-controller
namespace: kube-system
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: kops-controller
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: system:serviceaccount:kube-system:kops-controller
I0406 14:25:28.324235 745188 bootstrapchannelbuilder.go:149] hash 6e08752d93123203d6175e24f75926bb614d18a9bf084409f1807a4e4eb167aa
I0406 14:25:28.324246 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-coredns.addons.k8s.io-k8s-1.12"
I0406 14:25:28.329730 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/cluster-service):%!f(string=true)] %!f(string=name):%!f(string=coredns) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:28.329778 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/cluster-service):%!f(string=true)] %!f(string=name):%!f(string=coredns) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.329786 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]
I0406 14:25:28.329791 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/bootstrapping):%!f(string=rbac-defaults)] %!f(string=name):%!f(string=system:coredns)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=endpoints) %!f(string=services) %!f(string=pods) %!f(string=namespaces)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=discovery.k8s.io)] %!f(string=resources):[%!f(string=endpointslices)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]]]]
I0406 14:25:28.329801 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/bootstrapping):%!f(string=rbac-defaults)] %!f(string=name):%!f(string=system:coredns)]
I0406 14:25:28.329806 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/bootstrapping):%!f(string=rbac-defaults)]
I0406 14:25:28.329811 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=endpoints) %!f(string=services) %!f(string=pods) %!f(string=namespaces)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]]
I0406 14:25:28.330045 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=discovery.k8s.io)] %!f(string=resources):[%!f(string=endpointslices)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]]
I0406 14:25:28.330053 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=annotations):map[%!f(string=rbac.authorization.kubernetes.io/autoupdate):%!f(string=true)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/bootstrapping):%!f(string=rbac-defaults)] %!f(string=name):%!f(string=system:coredns)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=system:coredns)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=coredns) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:28.330065 745188 visitor.go:44] object value at metadata: map[%!f(string=annotations):map[%!f(string=rbac.authorization.kubernetes.io/autoupdate):%!f(string=true)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/bootstrapping):%!f(string=rbac-defaults)] %!f(string=name):%!f(string=system:coredns)]
I0406 14:25:28.330090 745188 visitor.go:44] object value at metadata.annotations: map[%!f(string=rbac.authorization.kubernetes.io/autoupdate):%!f(string=true)]
I0406 14:25:28.330094 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=kubernetes.io/bootstrapping):%!f(string=rbac-defaults)]
I0406 14:25:28.330098 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=system:coredns)]
I0406 14:25:28.330102 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=coredns) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.330106 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=data):map[%!f(string=Corefile):%!f(string=.:53 {
errors
health {
lameduck 5s
}
ready
kubernetes cluster.local. in-addr.arpa ip6.arpa {
pods insecure
fallthrough in-addr.arpa ip6.arpa
ttl 30
}
prometheus :9153
forward . /etc/resolv.conf {
max_concurrent 1000
}
cache 30
loop
reload
loadbalance
})] %!f(string=kind):%!f(string=ConfigMap) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=addonmanager.kubernetes.io/mode):%!f(string=EnsureExists) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=coredns) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:28.330148 745188 visitor.go:44] object value at data: map[%!f(string=Corefile):%!f(string=.:53 {
errors
health {
lameduck 5s
}
ready
kubernetes cluster.local. in-addr.arpa ip6.arpa {
pods insecure
fallthrough in-addr.arpa ip6.arpa
ttl 30
}
prometheus :9153
forward . /etc/resolv.conf {
max_concurrent 1000
}
cache 30
loop
reload
loadbalance
})]
I0406 14:25:28.330154 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=addonmanager.kubernetes.io/mode):%!f(string=EnsureExists) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=coredns) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.330160 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=addonmanager.kubernetes.io/mode):%!f(string=EnsureExists) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)]
I0406 14:25:28.330164 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=Deployment) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=kubernetes.io/name):%!f(string=CoreDNS)] %!f(string=name):%!f(string=coredns) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=strategy):map[%!f(string=rollingUpdate):map[%!f(string=maxSurge):%!f(string=10%) %!f(string=maxUnavailable):1.000000] %!f(string=type):%!f(string=RollingUpdate)] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=args):[%!f(string=-conf) %!f(string=/etc/coredns/Corefile)] %!f(string=image):%!f(string=registry.k8s.io/coredns/coredns:v1.10.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/health) %!f(string=port):8080.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=coredns) %!f(string=ports):[map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns) %!f(string=protocol):%!f(string=UDP)] map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns-tcp) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9153.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/ready) %!f(string=port):8181.000000 %!f(string=scheme):%!f(string=HTTP)]] %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=170Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=70Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=capabilities):map[%!f(string=add):[%!f(string=NET_BIND_SERVICE)] %!f(string=drop):[%!f(string=all)]] %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/coredns) %!f(string=name):%!f(string=config-volume) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=coredns) %!f(string=tolerations):[map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=coredns)] %!f(string=name):%!f(string=config-volume)]]]]]]
I0406 14:25:28.330252 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=kubernetes.io/name):%!f(string=CoreDNS)] %!f(string=name):%!f(string=coredns) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.330275 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=kubernetes.io/name):%!f(string=CoreDNS)]
I0406 14:25:28.330280 745188 visitor.go:44] object value at spec: map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=strategy):map[%!f(string=rollingUpdate):map[%!f(string=maxSurge):%!f(string=10%) %!f(string=maxUnavailable):1.000000] %!f(string=type):%!f(string=RollingUpdate)] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=args):[%!f(string=-conf) %!f(string=/etc/coredns/Corefile)] %!f(string=image):%!f(string=registry.k8s.io/coredns/coredns:v1.10.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/health) %!f(string=port):8080.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=coredns) %!f(string=ports):[map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns) %!f(string=protocol):%!f(string=UDP)] map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns-tcp) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9153.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/ready) %!f(string=port):8181.000000 %!f(string=scheme):%!f(string=HTTP)]] %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=170Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=70Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=capabilities):map[%!f(string=add):[%!f(string=NET_BIND_SERVICE)] %!f(string=drop):[%!f(string=all)]] %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/coredns) %!f(string=name):%!f(string=config-volume) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=coredns) %!f(string=tolerations):[map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=coredns)] %!f(string=name):%!f(string=config-volume)]]]]]
I0406 14:25:28.330339 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]]
I0406 14:25:28.330343 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=k8s-app):%!f(string=kube-dns)]
I0406 14:25:28.330346 745188 visitor.go:44] object value at spec.strategy: map[%!f(string=rollingUpdate):map[%!f(string=maxSurge):%!f(string=10%) %!f(string=maxUnavailable):1.000000] %!f(string=type):%!f(string=RollingUpdate)]
I0406 14:25:28.330349 745188 visitor.go:44] object value at spec.strategy.rollingUpdate: map[%!f(string=maxSurge):%!f(string=10%) %!f(string=maxUnavailable):1.000000]
I0406 14:25:28.330353 745188 visitor.go:39] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 1.000000
I0406 14:25:28.330356 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=args):[%!f(string=-conf) %!f(string=/etc/coredns/Corefile)] %!f(string=image):%!f(string=registry.k8s.io/coredns/coredns:v1.10.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/health) %!f(string=port):8080.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=coredns) %!f(string=ports):[map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns) %!f(string=protocol):%!f(string=UDP)] map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns-tcp) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9153.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/ready) %!f(string=port):8181.000000 %!f(string=scheme):%!f(string=HTTP)]] %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=170Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=70Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=capabilities):map[%!f(string=add):[%!f(string=NET_BIND_SERVICE)] %!f(string=drop):[%!f(string=all)]] %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/coredns) %!f(string=name):%!f(string=config-volume) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=coredns) %!f(string=tolerations):[map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=coredns)] %!f(string=name):%!f(string=config-volume)]]]]
I0406 14:25:28.330386 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]]
I0406 14:25:28.330389 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]
I0406 14:25:28.330392 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=containers):[map[%!f(string=args):[%!f(string=-conf) %!f(string=/etc/coredns/Corefile)] %!f(string=image):%!f(string=registry.k8s.io/coredns/coredns:v1.10.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/health) %!f(string=port):8080.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=coredns) %!f(string=ports):[map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns) %!f(string=protocol):%!f(string=UDP)] map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns-tcp) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9153.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/ready) %!f(string=port):8181.000000 %!f(string=scheme):%!f(string=HTTP)]] %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=170Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=70Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=capabilities):map[%!f(string=add):[%!f(string=NET_BIND_SERVICE)] %!f(string=drop):[%!f(string=all)]] %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/coredns) %!f(string=name):%!f(string=config-volume) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=coredns) %!f(string=tolerations):[map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=coredns)] %!f(string=name):%!f(string=config-volume)]]]
I0406 14:25:28.330420 745188 visitor.go:44] object value at spec.template.spec.nodeSelector: map[%!f(string=kubernetes.io/os):%!f(string=linux)]
I0406 14:25:28.330424 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:28.330427 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0]: map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]
I0406 14:25:28.330432 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0].labelSelector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]]
I0406 14:25:28.330435 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0].labelSelector.matchLabels: map[%!f(string=k8s-app):%!f(string=kube-dns)]
I0406 14:25:28.330438 745188 visitor.go:39] float64 value at spec.template.spec.topologySpreadConstraints.[0].maxSkew: 1.000000
I0406 14:25:28.330440 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1]: map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]
I0406 14:25:28.330460 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1].labelSelector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]]
I0406 14:25:28.330462 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1].labelSelector.matchLabels: map[%!f(string=k8s-app):%!f(string=kube-dns)]
I0406 14:25:28.330465 745188 visitor.go:39] float64 value at spec.template.spec.topologySpreadConstraints.[1].maxSkew: 1.000000
I0406 14:25:28.330467 745188 visitor.go:44] object value at spec.template.spec.volumes.[0]: map[%!f(string=configMap):map[%!f(string=name):%!f(string=coredns)] %!f(string=name):%!f(string=config-volume)]
I0406 14:25:28.330470 745188 visitor.go:44] object value at spec.template.spec.volumes.[0].configMap: map[%!f(string=name):%!f(string=coredns)]
I0406 14:25:28.330473 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=args):[%!f(string=-conf) %!f(string=/etc/coredns/Corefile)] %!f(string=image):%!f(string=registry.k8s.io/coredns/coredns:v1.10.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/health) %!f(string=port):8080.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=coredns) %!f(string=ports):[map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns) %!f(string=protocol):%!f(string=UDP)] map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns-tcp) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9153.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/ready) %!f(string=port):8181.000000 %!f(string=scheme):%!f(string=HTTP)]] %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=170Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=70Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=capabilities):map[%!f(string=add):[%!f(string=NET_BIND_SERVICE)] %!f(string=drop):[%!f(string=all)]] %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/coredns) %!f(string=name):%!f(string=config-volume) %!f(string=readOnly):%!f(bool=true)]]]
I0406 14:25:28.330493 745188 visitor.go:44] object value at spec.template.spec.containers.[0].ports.[0]: map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns) %!f(string=protocol):%!f(string=UDP)]
I0406 14:25:28.330496 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 53.000000
I0406 14:25:28.330499 745188 visitor.go:44] object value at spec.template.spec.containers.[0].ports.[1]: map[%!f(string=containerPort):53.000000 %!f(string=name):%!f(string=dns-tcp) %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:28.330502 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 53.000000
I0406 14:25:28.330504 745188 visitor.go:44] object value at spec.template.spec.containers.[0].ports.[2]: map[%!f(string=containerPort):9153.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:28.330527 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 9153.000000
I0406 14:25:28.330530 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources: map[%!f(string=limits):map[%!f(string=memory):%!f(string=170Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=70Mi)]]
I0406 14:25:28.330534 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.limits: map[%!f(string=memory):%!f(string=170Mi)]
I0406 14:25:28.330536 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.requests: map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=70Mi)]
I0406 14:25:28.330540 745188 visitor.go:44] object value at spec.template.spec.containers.[0].readinessProbe: map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/ready) %!f(string=port):8181.000000 %!f(string=scheme):%!f(string=HTTP)]]
I0406 14:25:28.330543 745188 visitor.go:44] object value at spec.template.spec.containers.[0].readinessProbe.httpGet: map[%!f(string=path):%!f(string=/ready) %!f(string=port):8181.000000 %!f(string=scheme):%!f(string=HTTP)]
I0406 14:25:28.330546 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8181.000000
I0406 14:25:28.330548 745188 visitor.go:44] object value at spec.template.spec.containers.[0].securityContext: map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=capabilities):map[%!f(string=add):[%!f(string=NET_BIND_SERVICE)] %!f(string=drop):[%!f(string=all)]] %!f(string=readOnlyRootFilesystem):%!f(bool=true)]
I0406 14:25:28.330554 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.allowPrivilegeEscalation: false
I0406 14:25:28.330557 745188 visitor.go:44] object value at spec.template.spec.containers.[0].securityContext.capabilities: map[%!f(string=add):[%!f(string=NET_BIND_SERVICE)] %!f(string=drop):[%!f(string=all)]]
I0406 14:25:28.330561 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.readOnlyRootFilesystem: true
I0406 14:25:28.330563 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/etc/coredns) %!f(string=name):%!f(string=config-volume) %!f(string=readOnly):%!f(bool=true)]
I0406 14:25:28.330566 745188 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[0].readOnly: true
I0406 14:25:28.330570 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/coredns/coredns:v1.10.1"
I0406 14:25:28.802482 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe: map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/health) %!f(string=port):8080.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000]
I0406 14:25:28.802574 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I0406 14:25:28.802593 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe.httpGet: map[%!f(string=path):%!f(string=/health) %!f(string=port):8080.000000 %!f(string=scheme):%!f(string=HTTP)]
I0406 14:25:28.802602 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 8080.000000
I0406 14:25:28.802605 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000
I0406 14:25:28.802607 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000
I0406 14:25:28.802609 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000
I0406 14:25:28.802627 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=Service) %!f(string=metadata):map[%!f(string=annotations):map[%!f(string=prometheus.io/port):%!f(string=9153) %!f(string=prometheus.io/scrape):%!f(string=true)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=kubernetes.io/name):%!f(string=CoreDNS)] %!f(string=name):%!f(string=kube-dns) %!f(string=namespace):%!f(string=kube-system) %!f(string=resourceVersion):%!f(string=0)] %!f(string=spec):map[%!f(string=clusterIP):%!f(string=100.64.0.10) %!f(string=ports):[map[%!f(string=name):%!f(string=dns) %!f(string=port):53.000000 %!f(string=protocol):%!f(string=UDP)] map[%!f(string=name):%!f(string=dns-tcp) %!f(string=port):53.000000 %!f(string=protocol):%!f(string=TCP)] map[%!f(string=name):%!f(string=metrics) %!f(string=port):9153.000000 %!f(string=protocol):%!f(string=TCP)]] %!f(string=selector):map[%!f(string=k8s-app):%!f(string=kube-dns)]]]
I0406 14:25:28.802673 745188 visitor.go:44] object value at metadata: map[%!f(string=annotations):map[%!f(string=prometheus.io/port):%!f(string=9153) %!f(string=prometheus.io/scrape):%!f(string=true)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=kubernetes.io/name):%!f(string=CoreDNS)] %!f(string=name):%!f(string=kube-dns) %!f(string=namespace):%!f(string=kube-system) %!f(string=resourceVersion):%!f(string=0)]
I0406 14:25:28.802682 745188 visitor.go:44] object value at metadata.annotations: map[%!f(string=prometheus.io/port):%!f(string=9153) %!f(string=prometheus.io/scrape):%!f(string=true)]
I0406 14:25:28.802687 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=kube-dns) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=kubernetes.io/name):%!f(string=CoreDNS)]
I0406 14:25:28.802694 745188 visitor.go:44] object value at spec: map[%!f(string=clusterIP):%!f(string=100.64.0.10) %!f(string=ports):[map[%!f(string=name):%!f(string=dns) %!f(string=port):53.000000 %!f(string=protocol):%!f(string=UDP)] map[%!f(string=name):%!f(string=dns-tcp) %!f(string=port):53.000000 %!f(string=protocol):%!f(string=TCP)] map[%!f(string=name):%!f(string=metrics) %!f(string=port):9153.000000 %!f(string=protocol):%!f(string=TCP)]] %!f(string=selector):map[%!f(string=k8s-app):%!f(string=kube-dns)]]
I0406 14:25:28.802704 745188 visitor.go:44] object value at spec.ports.[0]: map[%!f(string=name):%!f(string=dns) %!f(string=port):53.000000 %!f(string=protocol):%!f(string=UDP)]
I0406 14:25:28.802709 745188 visitor.go:39] float64 value at spec.ports.[0].port: 53.000000
I0406 14:25:28.802711 745188 visitor.go:44] object value at spec.ports.[1]: map[%!f(string=name):%!f(string=dns-tcp) %!f(string=port):53.000000 %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:28.802715 745188 visitor.go:39] float64 value at spec.ports.[1].port: 53.000000
I0406 14:25:28.802717 745188 visitor.go:44] object value at spec.ports.[2]: map[%!f(string=name):%!f(string=metrics) %!f(string=port):9153.000000 %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:28.802722 745188 visitor.go:39] float64 value at spec.ports.[2].port: 9153.000000
I0406 14:25:28.802724 745188 visitor.go:44] object value at spec.selector: map[%!f(string=k8s-app):%!f(string=kube-dns)]
I0406 14:25:28.802727 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=policy/v1) %!f(string=kind):%!f(string=PodDisruptionBudget) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=kube-dns) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=maxUnavailable):%!f(string=50%) %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]]]]
I0406 14:25:28.802737 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=kube-dns) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.802741 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)]
I0406 14:25:28.802745 745188 visitor.go:44] object value at spec: map[%!f(string=maxUnavailable):%!f(string=50%) %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]]]
I0406 14:25:28.802749 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=kube-dns)]]
I0406 14:25:28.802752 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=k8s-app):%!f(string=kube-dns)]
I0406 14:25:28.802755 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=coredns-autoscaler) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:28.802763 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=coredns-autoscaler) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.802769 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)]
I0406 14:25:28.802773 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=coredns-autoscaler)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=replicationcontrollers/scale)] %!f(string=verbs):[%!f(string=get) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=extensions) %!f(string=apps)] %!f(string=resources):[%!f(string=deployments/scale) %!f(string=replicasets/scale)] %!f(string=verbs):[%!f(string=get) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=configmaps)] %!f(string=verbs):[%!f(string=get) %!f(string=create)]]]]
I0406 14:25:28.802790 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=coredns-autoscaler)]
I0406 14:25:28.802795 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)]
I0406 14:25:28.802799 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]]
I0406 14:25:28.802804 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=replicationcontrollers/scale)] %!f(string=verbs):[%!f(string=get) %!f(string=update)]]
I0406 14:25:28.802809 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=extensions) %!f(string=apps)] %!f(string=resources):[%!f(string=deployments/scale) %!f(string=replicasets/scale)] %!f(string=verbs):[%!f(string=get) %!f(string=update)]]
I0406 14:25:28.802814 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=configmaps)] %!f(string=verbs):[%!f(string=get) %!f(string=create)]]
I0406 14:25:28.802818 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=coredns-autoscaler)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=coredns-autoscaler)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=coredns-autoscaler) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:28.802828 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=coredns-autoscaler) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:28.802831 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)] %!f(string=name):%!f(string=coredns-autoscaler)]
I0406 14:25:28.802836 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io)]
I0406 14:25:28.802839 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=coredns-autoscaler)]
I0406 14:25:28.802842 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=Deployment) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=coredns-autoscaler) %!f(string=kubernetes.io/cluster-service):%!f(string=true)] %!f(string=name):%!f(string=coredns-autoscaler) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=coredns-autoscaler)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=coredns-autoscaler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=command):[%!f(string=/cluster-proportional-autoscaler) %!f(string=--namespace=kube-system) %!f(string=--configmap=coredns-autoscaler) %!f(string=--target=Deployment/coredns) %!f(string=--default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}) %!f(string=--logtostderr=true) %!f(string=--v=2)] %!f(string=image):%!f(string=registry.k8s.io/cpa/cluster-proportional-autoscaler:v1.8.8) %!f(string=name):%!f(string=autoscaler) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=20m) %!f(string=memory):%!f(string=10Mi)]]]] %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=coredns-autoscaler) %!f(string=tolerations):[map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]]]]]]
I0406 14:25:28.802862 745188 visitor.go:44] object value at spec: map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=coredns-autoscaler)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=coredns-autoscaler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=command):[%!f(string=/cluster-proportional-autoscaler) %!f(string=--namespace=kube-system) %!f(string=--configmap=coredns-autoscaler) %!f(string=--target=Deployment/coredns) %!f(string=--default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}) %!f(string=--logtostderr=true) %!f(string=--v=2)] %!f(string=image):%!f(string=registry.k8s.io/cpa/cluster-proportional-autoscaler:v1.8.8) %!f(string=name):%!f(string=autoscaler) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=20m) %!f(string=memory):%!f(string=10Mi)]]]] %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=coredns-autoscaler) %!f(string=tolerations):[map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]]]]]
I0406 14:25:28.802883 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=coredns-autoscaler)]]
I0406 14:25:28.802889 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=k8s-app):%!f(string=coredns-autoscaler)]
I0406 14:25:28.802893 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=coredns-autoscaler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=command):[%!f(string=/cluster-proportional-autoscaler) %!f(string=--namespace=kube-system) %!f(string=--configmap=coredns-autoscaler) %!f(string=--target=Deployment/coredns) %!f(string=--default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}) %!f(string=--logtostderr=true) %!f(string=--v=2)] %!f(string=image):%!f(string=registry.k8s.io/cpa/cluster-proportional-autoscaler:v1.8.8) %!f(string=name):%!f(string=autoscaler) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=20m) %!f(string=memory):%!f(string=10Mi)]]]] %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=coredns-autoscaler) %!f(string=tolerations):[map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]]]]
I0406 14:25:28.802910 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=coredns-autoscaler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]]
I0406 14:25:28.802929 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=k8s-app):%!f(string=coredns-autoscaler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]
I0406 14:25:28.802933 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=containers):[map[%!f(string=command):[%!f(string=/cluster-proportional-autoscaler) %!f(string=--namespace=kube-system) %!f(string=--configmap=coredns-autoscaler) %!f(string=--target=Deployment/coredns) %!f(string=--default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}) %!f(string=--logtostderr=true) %!f(string=--v=2)] %!f(string=image):%!f(string=registry.k8s.io/cpa/cluster-proportional-autoscaler:v1.8.8) %!f(string=name):%!f(string=autoscaler) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=20m) %!f(string=memory):%!f(string=10Mi)]]]] %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=coredns-autoscaler) %!f(string=tolerations):[map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:28.802942 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=command):[%!f(string=/cluster-proportional-autoscaler) %!f(string=--namespace=kube-system) %!f(string=--configmap=coredns-autoscaler) %!f(string=--target=Deployment/coredns) %!f(string=--default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}) %!f(string=--logtostderr=true) %!f(string=--v=2)] %!f(string=image):%!f(string=registry.k8s.io/cpa/cluster-proportional-autoscaler:v1.8.8) %!f(string=name):%!f(string=autoscaler) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=20m) %!f(string=memory):%!f(string=10Mi)]]]
I0406 14:25:28.802950 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/cpa/cluster-proportional-autoscaler:v1.8.8"
I0406 14:25:29.273478 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources: map[%!f(string=requests):map[%!f(string=cpu):%!f(string=20m) %!f(string=memory):%!f(string=10Mi)]]
I0406 14:25:29.273528 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.requests: map[%!f(string=cpu):%!f(string=20m) %!f(string=memory):%!f(string=10Mi)]
I0406 14:25:29.273541 745188 visitor.go:44] object value at spec.template.spec.nodeSelector: map[%!f(string=kubernetes.io/os):%!f(string=linux)]
I0406 14:25:29.273548 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=key):%!f(string=CriticalAddonsOnly) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.273554 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=coredns-autoscaler) %!f(string=kubernetes.io/cluster-service):%!f(string=true)] %!f(string=name):%!f(string=coredns-autoscaler) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:29.273587 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=coredns.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=coredns.addons.k8s.io) %!f(string=k8s-app):%!f(string=coredns-autoscaler) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]
I0406 14:25:29.276739 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
kubernetes.io/cluster-service: "true"
name: coredns
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
kubernetes.io/bootstrapping: rbac-defaults
name: system:coredns
rules:
- apiGroups:
- ""
resources:
- endpoints
- services
- pods
- namespaces
verbs:
- list
- watch
- apiGroups:
- discovery.k8s.io
resources:
- endpointslices
verbs:
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
annotations:
rbac.authorization.kubernetes.io/autoupdate: "true"
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
kubernetes.io/bootstrapping: rbac-defaults
name: system:coredns
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:coredns
subjects:
- kind: ServiceAccount
name: coredns
namespace: kube-system
---
apiVersion: v1
data:
Corefile: |-
.:53 {
errors
health {
lameduck 5s
}
ready
kubernetes cluster.local. in-addr.arpa ip6.arpa {
pods insecure
fallthrough in-addr.arpa ip6.arpa
ttl 30
}
prometheus :9153
forward . /etc/resolv.conf {
max_concurrent 1000
}
cache 30
loop
reload
loadbalance
}
kind: ConfigMap
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
addonmanager.kubernetes.io/mode: EnsureExists
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
name: coredns
namespace: kube-system
---
apiVersion: apps/v1
kind: Deployment
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: CoreDNS
name: coredns
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns
strategy:
rollingUpdate:
maxSurge: 10%
maxUnavailable: 1
type: RollingUpdate
template:
metadata:
creationTimestamp: null
labels:
k8s-app: kube-dns
kops.k8s.io/managed-by: kops
spec:
containers:
- args:
- -conf
- /etc/coredns/Corefile
image: registry.k8s.io/coredns/coredns:v1.10.1@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e
imagePullPolicy: IfNotPresent
livenessProbe:
failureThreshold: 5
httpGet:
path: /health
port: 8080
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: coredns
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
- containerPort: 9153
name: metrics
protocol: TCP
readinessProbe:
httpGet:
path: /ready
port: 8181
scheme: HTTP
resources:
limits:
memory: 170Mi
requests:
cpu: 100m
memory: 70Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
add:
- NET_BIND_SERVICE
drop:
- all
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /etc/coredns
name: config-volume
readOnly: true
dnsPolicy: Default
nodeSelector:
kubernetes.io/os: linux
priorityClassName: system-cluster-critical
serviceAccountName: coredns
tolerations:
- key: CriticalAddonsOnly
operator: Exists
topologySpreadConstraints:
- labelSelector:
matchLabels:
k8s-app: kube-dns
maxSkew: 1
topologyKey: topology.kubernetes.io/zone
whenUnsatisfiable: ScheduleAnyway
- labelSelector:
matchLabels:
k8s-app: kube-dns
maxSkew: 1
topologyKey: kubernetes.io/hostname
whenUnsatisfiable: ScheduleAnyway
volumes:
- configMap:
name: coredns
name: config-volume
---
apiVersion: v1
kind: Service
metadata:
annotations:
prometheus.io/port: "9153"
prometheus.io/scrape: "true"
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: CoreDNS
name: kube-dns
namespace: kube-system
resourceVersion: "0"
spec:
clusterIP: 100.64.0.10
ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
- name: metrics
port: 9153
protocol: TCP
selector:
k8s-app: kube-dns
---
apiVersion: policy/v1
kind: PodDisruptionBudget
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
name: kube-dns
namespace: kube-system
spec:
maxUnavailable: 50%
selector:
matchLabels:
k8s-app: kube-dns
---
apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
name: coredns-autoscaler
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
name: coredns-autoscaler
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- replicationcontrollers/scale
verbs:
- get
- update
- apiGroups:
- extensions
- apps
resources:
- deployments/scale
- replicasets/scale
verbs:
- get
- update
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
name: coredns-autoscaler
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: coredns-autoscaler
subjects:
- kind: ServiceAccount
name: coredns-autoscaler
namespace: kube-system
---
apiVersion: apps/v1
kind: Deployment
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: coredns.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: coredns.addons.k8s.io
k8s-app: coredns-autoscaler
kubernetes.io/cluster-service: "true"
name: coredns-autoscaler
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: coredns-autoscaler
template:
metadata:
creationTimestamp: null
labels:
k8s-app: coredns-autoscaler
kops.k8s.io/managed-by: kops
spec:
containers:
- command:
- /cluster-proportional-autoscaler
- --namespace=kube-system
- --configmap=coredns-autoscaler
- --target=Deployment/coredns
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}
- --logtostderr=true
- --v=2
image: registry.k8s.io/cpa/cluster-proportional-autoscaler:v1.8.8@sha256:69bf675e356770c651864305f2ce17ec25623ac0ff77a040f9396e72daba2d5f
name: autoscaler
resources:
requests:
cpu: 20m
memory: 10Mi
nodeSelector:
kubernetes.io/os: linux
priorityClassName: system-cluster-critical
serviceAccountName: coredns-autoscaler
tolerations:
- key: CriticalAddonsOnly
operator: Exists
I0406 14:25:29.276795 745188 bootstrapchannelbuilder.go:149] hash 9e04bbb03f9e5e62e8a246a96f73e8aaa31bf1d3284346c335774df5f7c3495d
I0406 14:25:29.276804 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9"
I0406 14:25:29.277214 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kubelet-api.rbac.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kubelet-api.rbac.addons.k8s.io)] %!f(string=name):%!f(string=kops:system:kubelet-api-admin)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=system:kubelet-api-admin)] %!f(string=subjects):[map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=User) %!f(string=name):%!f(string=kubelet-api)]]]
I0406 14:25:29.277250 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=User) %!f(string=name):%!f(string=kubelet-api)]
I0406 14:25:29.277257 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=kubelet-api.rbac.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kubelet-api.rbac.addons.k8s.io)] %!f(string=name):%!f(string=kops:system:kubelet-api-admin)]
I0406 14:25:29.277263 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=kubelet-api.rbac.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=kubelet-api.rbac.addons.k8s.io)]
I0406 14:25:29.277267 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=system:kubelet-api-admin)]
I0406 14:25:29.277391 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: kubelet-api.rbac.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: kubelet-api.rbac.addons.k8s.io
name: kops:system:kubelet-api-admin
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:kubelet-api-admin
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: kubelet-api
I0406 14:25:29.277420 745188 bootstrapchannelbuilder.go:149] hash 01c120e887bd98d82ef57983ad58a0b22bc85efb48108092a24c4b82e4c9ea81
I0406 14:25:29.277427 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-limit-range.addons.k8s.io"
I0406 14:25:29.277781 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=LimitRange) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=limit-range.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=limit-range.addons.k8s.io)] %!f(string=name):%!f(string=limits) %!f(string=namespace):%!f(string=default)] %!f(string=spec):map[%!f(string=limits):[map[%!f(string=defaultRequest):map[%!f(string=cpu):%!f(string=100m)] %!f(string=type):%!f(string=Container)]]]]
I0406 14:25:29.277812 745188 visitor.go:44] object value at spec: map[%!f(string=limits):[map[%!f(string=defaultRequest):map[%!f(string=cpu):%!f(string=100m)] %!f(string=type):%!f(string=Container)]]]
I0406 14:25:29.277819 745188 visitor.go:44] object value at spec.limits.[0]: map[%!f(string=defaultRequest):map[%!f(string=cpu):%!f(string=100m)] %!f(string=type):%!f(string=Container)]
I0406 14:25:29.277822 745188 visitor.go:44] object value at spec.limits.[0].defaultRequest: map[%!f(string=cpu):%!f(string=100m)]
I0406 14:25:29.277825 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=limit-range.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=limit-range.addons.k8s.io)] %!f(string=name):%!f(string=limits) %!f(string=namespace):%!f(string=default)]
I0406 14:25:29.277830 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=limit-range.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=limit-range.addons.k8s.io)]
I0406 14:25:29.277945 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: v1
kind: LimitRange
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: limit-range.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: limit-range.addons.k8s.io
name: limits
namespace: default
spec:
limits:
- defaultRequest:
cpu: 100m
type: Container
I0406 14:25:29.277972 745188 bootstrapchannelbuilder.go:149] hash 2d55c3bc5e354e84a3730a65b42f39aba630a59dc8d32b30859fcce3d3178bc2
I0406 14:25:29.277977 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-dns-controller.addons.k8s.io-k8s-1.12"
I0406 14:25:29.279874 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=Deployment) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=dns-controller) %!f(string=version):%!f(string=v1.28.4)] %!f(string=name):%!f(string=dns-controller) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=replicas):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=dns-controller)]] %!f(string=strategy):map[%!f(string=type):%!f(string=Recreate)] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=dns-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--watch-ingress=false) %!f(string=--dns=aws-route53) %!f(string=--zone=*/Z050288919G22381WZFHT) %!f(string=--internal-ipv4) %!f(string=--zone=*/*) %!f(string=-v=2)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/dns-controller:1.28.4) %!f(string=name):%!f(string=dns-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true)]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccount):%!f(string=dns-controller) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]
I0406 14:25:29.279959 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=dns-controller) %!f(string=version):%!f(string=v1.28.4)] %!f(string=name):%!f(string=dns-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:29.279969 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=dns-controller) %!f(string=version):%!f(string=v1.28.4)]
I0406 14:25:29.279974 745188 visitor.go:44] object value at spec: map[%!f(string=replicas):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=dns-controller)]] %!f(string=strategy):map[%!f(string=type):%!f(string=Recreate)] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=dns-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--watch-ingress=false) %!f(string=--dns=aws-route53) %!f(string=--zone=*/Z050288919G22381WZFHT) %!f(string=--internal-ipv4) %!f(string=--zone=*/*) %!f(string=-v=2)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/dns-controller:1.28.4) %!f(string=name):%!f(string=dns-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true)]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccount):%!f(string=dns-controller) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]
I0406 14:25:29.279998 745188 visitor.go:39] float64 value at spec.replicas: 1.000000
I0406 14:25:29.280001 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=dns-controller)]]
I0406 14:25:29.280004 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=k8s-app):%!f(string=dns-controller)]
I0406 14:25:29.280006 745188 visitor.go:44] object value at spec.strategy: map[%!f(string=type):%!f(string=Recreate)]
I0406 14:25:29.280009 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=dns-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--watch-ingress=false) %!f(string=--dns=aws-route53) %!f(string=--zone=*/Z050288919G22381WZFHT) %!f(string=--internal-ipv4) %!f(string=--zone=*/*) %!f(string=-v=2)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/dns-controller:1.28.4) %!f(string=name):%!f(string=dns-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true)]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccount):%!f(string=dns-controller) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]
I0406 14:25:29.280030 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=dns-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]]
I0406 14:25:29.280035 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=dns-controller) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=version):%!f(string=v1.28.4)]
I0406 14:25:29.280039 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--watch-ingress=false) %!f(string=--dns=aws-route53) %!f(string=--zone=*/Z050288919G22381WZFHT) %!f(string=--internal-ipv4) %!f(string=--zone=*/*) %!f(string=-v=2)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/dns-controller:1.28.4) %!f(string=name):%!f(string=dns-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true)]]] %!f(string=dnsPolicy):%!f(string=Default) %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccount):%!f(string=dns-controller) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:29.280070 745188 visitor.go:34] string value at spec.template.spec.hostNetwork: true
I0406 14:25:29.280087 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.280094 745188 visitor.go:44] object value at spec.template.spec.tolerations.[1]: map[%!f(string=key):%!f(string=node.kubernetes.io/not-ready) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.280097 745188 visitor.go:44] object value at spec.template.spec.tolerations.[2]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.280100 745188 visitor.go:44] object value at spec.template.spec.tolerations.[3]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.280103 745188 visitor.go:44] object value at spec.template.spec.affinity: map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]]
I0406 14:25:29.280110 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity: map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]
I0406 14:25:29.280116 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution: map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]
I0406 14:25:29.280122 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:29.280126 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.280144 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:29.280150 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.280154 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=args):[%!f(string=--watch-ingress=false) %!f(string=--dns=aws-route53) %!f(string=--zone=*/Z050288919G22381WZFHT) %!f(string=--internal-ipv4) %!f(string=--zone=*/*) %!f(string=-v=2)] %!f(string=command):<nil> %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/kops/dns-controller:1.28.4) %!f(string=name):%!f(string=dns-controller) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]] %!f(string=securityContext):map[%!f(string=runAsNonRoot):%!f(bool=true)]]
I0406 14:25:29.280164 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/kops/dns-controller:1.28.4"
I0406 14:25:29.766860 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources: map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]]
I0406 14:25:29.766908 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.requests: map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=50Mi)]
I0406 14:25:29.766915 745188 visitor.go:44] object value at spec.template.spec.containers.[0].securityContext: map[%!f(string=runAsNonRoot):%!f(bool=true)]
I0406 14:25:29.766919 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.runAsNonRoot: true
I0406 14:25:29.766924 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0]: map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]
I0406 14:25:29.766929 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)] %!f(string=name):%!f(string=dns-controller) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:29.766941 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)] %!f(string=name):%!f(string=dns-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:29.766946 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)]
I0406 14:25:29.766952 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops:dns-controller)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=endpoints) %!f(string=services) %!f(string=pods) %!f(string=ingress) %!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=networking.k8s.io)] %!f(string=resources):[%!f(string=ingresses)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]]]
I0406 14:25:29.766965 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops:dns-controller)]
I0406 14:25:29.766969 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)]
I0406 14:25:29.766996 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=endpoints) %!f(string=services) %!f(string=pods) %!f(string=ingress) %!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:29.767001 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=networking.k8s.io)] %!f(string=resources):[%!f(string=ingresses)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:29.767007 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops:dns-controller)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=kops:dns-controller)] %!f(string=subjects):[map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=User) %!f(string=name):%!f(string=system:serviceaccount:kube-system:dns-controller)]]]
I0406 14:25:29.767020 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)] %!f(string=name):%!f(string=kops:dns-controller)]
I0406 14:25:29.767025 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=dns-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=dns-controller.addons.k8s.io)]
I0406 14:25:29.767028 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=kops:dns-controller)]
I0406 14:25:29.767033 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=User) %!f(string=name):%!f(string=system:serviceaccount:kube-system:dns-controller)]
I0406 14:25:29.767760 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: apps/v1
kind: Deployment
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: dns-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.28.4
name: dns-controller
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
k8s-app: dns-controller
strategy:
type: Recreate
template:
metadata:
creationTimestamp: null
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
kops.k8s.io/managed-by: kops
version: v1.28.4
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
containers:
- args:
- --watch-ingress=false
- --dns=aws-route53
- --zone=*/Z050288919G22381WZFHT
- --internal-ipv4
- --zone=*/*
- -v=2
command: null
env:
- name: KUBERNETES_SERVICE_HOST
value: 127.0.0.1
image: registry.k8s.io/kops/dns-controller:1.28.4@sha256:b38651b81f80378f538625b381e0d9b6781033b1a21daf303eff20232bb03779
name: dns-controller
resources:
requests:
cpu: 50m
memory: 50Mi
securityContext:
runAsNonRoot: true
dnsPolicy: Default
hostNetwork: true
nodeSelector: null
priorityClassName: system-cluster-critical
serviceAccount: dns-controller
tolerations:
- key: node.cloudprovider.kubernetes.io/uninitialized
operator: Exists
- key: node.kubernetes.io/not-ready
operator: Exists
- key: node-role.kubernetes.io/control-plane
operator: Exists
- key: node-role.kubernetes.io/master
operator: Exists
---
apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: dns-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: dns-controller.addons.k8s.io
name: dns-controller
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: dns-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
rules:
- apiGroups:
- ""
resources:
- endpoints
- services
- pods
- ingress
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- networking.k8s.io
resources:
- ingresses
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: dns-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kops:dns-controller
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: system:serviceaccount:kube-system:dns-controller
I0406 14:25:29.767839 745188 bootstrapchannelbuilder.go:149] hash d564f931763d782836bb027963fd40b2c65d70d7eb108e8afebb73fb1b8402a9
I0406 14:25:29.767850 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-node-termination-handler.aws-k8s-1.11"
I0406 14:25:29.771485 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws) %!f(string=k8s-app):%!f(string=aws-node-termination-handler)] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:29.771531 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws) %!f(string=k8s-app):%!f(string=aws-node-termination-handler)] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:29.771543 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws) %!f(string=k8s-app):%!f(string=aws-node-termination-handler)]
I0406 14:25:29.771549 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)] %!f(string=name):%!f(string=aws-node-termination-handler)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=patch) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=pods)] %!f(string=verbs):[%!f(string=list) %!f(string=get)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=pods/eviction)] %!f(string=verbs):[%!f(string=create)]] map[%!f(string=apiGroups):[%!f(string=extensions)] %!f(string=resources):[%!f(string=daemonsets)] %!f(string=verbs):[%!f(string=get)]] map[%!f(string=apiGroups):[%!f(string=apps)] %!f(string=resources):[%!f(string=daemonsets)] %!f(string=verbs):[%!f(string=get)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=create) %!f(string=patch)]]]]
I0406 14:25:29.771565 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)] %!f(string=name):%!f(string=aws-node-termination-handler)]
I0406 14:25:29.771571 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)]
I0406 14:25:29.771580 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=patch) %!f(string=update)]]
I0406 14:25:29.771586 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=pods)] %!f(string=verbs):[%!f(string=list) %!f(string=get)]]
I0406 14:25:29.771591 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=pods/eviction)] %!f(string=verbs):[%!f(string=create)]]
I0406 14:25:29.771595 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=extensions)] %!f(string=resources):[%!f(string=daemonsets)] %!f(string=verbs):[%!f(string=get)]]
I0406 14:25:29.771599 745188 visitor.go:44] object value at rules.[4]: map[%!f(string=apiGroups):[%!f(string=apps)] %!f(string=resources):[%!f(string=daemonsets)] %!f(string=verbs):[%!f(string=get)]]
I0406 14:25:29.771603 745188 visitor.go:44] object value at rules.[5]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=create) %!f(string=patch)]]
I0406 14:25:29.771607 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)] %!f(string=name):%!f(string=aws-node-termination-handler)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=aws-node-termination-handler)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:29.771617 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)] %!f(string=name):%!f(string=aws-node-termination-handler)]
I0406 14:25:29.771623 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)]
I0406 14:25:29.771628 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=aws-node-termination-handler)]
I0406 14:25:29.771632 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:29.771635 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=Deployment) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/component):%!f(string=deployment) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws) %!f(string=k8s-app):%!f(string=aws-node-termination-handler)] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=replicas):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kubernetes.io/os):%!f(string=linux)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app.kubernetes.io/component):%!f(string=deployment) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=k8s-app):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs) %!f(string=kubernetes.io/os):%!f(string=linux)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=env):[map[%!f(string=name):%!f(string=NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=POD_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.name)]]] map[%!f(string=name):%!f(string=NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=ENABLE_PROBES_SERVER) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=PROBES_SERVER_PORT) %!f(string=value):%!f(string=8080)] map[%!f(string=name):%!f(string=PROBES_SERVER_ENDPOINT) %!f(string=value):%!f(string=/healthz)] map[%!f(string=name):%!f(string=LOG_LEVEL) %!f(string=value):%!f(string=info)] map[%!f(string=name):%!f(string=JSON_LOGGING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=LOG_FORMAT_VERSION) %!f(string=value):%!f(string=2)] map[%!f(string=name):%!f(string=ENABLE_PROMETHEUS_SERVER) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=PROMETHEUS_SERVER_PORT) %!f(string=value):%!f(string=9092)] map[%!f(string=name):%!f(string=CHECK_TAG_BEFORE_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=MANAGED_TAG) %!f(string=value):%!f(string=aws-node-termination-handler/managed)] map[%!f(string=name):%!f(string=USE_PROVIDER_ID) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DRY_RUN) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=CORDON_ONLY) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=TAINT_NODE) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=EXCLUDE_FROM_LOAD_BALANCERS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DELETE_LOCAL_DATA) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=IGNORE_DAEMON_SETS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=POD_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=NODE_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=120)] map[%!f(string=name):%!f(string=EMIT_KUBERNETES_EVENTS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=COMPLETE_LIFECYCLE_ACTION_DELAY_SECONDS) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=ENABLE_SQS_TERMINATION_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=QUEUE_URL) %!f(string=value):%!f(string=https://sqs.us-east-1.amazonaws.com/<ACCOUNTID_REDACTED>/bug-report-cluster-public-<DOMAIN_REDACTED>-nth)] map[%!f(string=name):%!f(string=WORKERS) %!f(string=value):%!f(string=10)]] %!f(string=image):%!f(string=public.ecr.aws/aws-ec2/aws-node-termination-handler:v1.18.3) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):8080.000000] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):5.000000] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=ports):[map[%!f(string=containerPort):8080.000000 %!f(string=name):%!f(string=liveness-probe) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9092.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=64Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true) %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=securityContext):map[%!f(string=fsGroup):1000.000000] %!f(string=serviceAccountName):%!f(string=aws-node-termination-handler) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]]]]]]
I0406 14:25:29.771739 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/component):%!f(string=deployment) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws) %!f(string=k8s-app):%!f(string=aws-node-termination-handler)] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:29.771754 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/component):%!f(string=deployment) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/part-of):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/version):%!f(string=v1.18.3) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws) %!f(string=k8s-app):%!f(string=aws-node-termination-handler)]
I0406 14:25:29.771764 745188 visitor.go:44] object value at spec: map[%!f(string=replicas):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kubernetes.io/os):%!f(string=linux)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app.kubernetes.io/component):%!f(string=deployment) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=k8s-app):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs) %!f(string=kubernetes.io/os):%!f(string=linux)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=env):[map[%!f(string=name):%!f(string=NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=POD_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.name)]]] map[%!f(string=name):%!f(string=NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=ENABLE_PROBES_SERVER) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=PROBES_SERVER_PORT) %!f(string=value):%!f(string=8080)] map[%!f(string=name):%!f(string=PROBES_SERVER_ENDPOINT) %!f(string=value):%!f(string=/healthz)] map[%!f(string=name):%!f(string=LOG_LEVEL) %!f(string=value):%!f(string=info)] map[%!f(string=name):%!f(string=JSON_LOGGING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=LOG_FORMAT_VERSION) %!f(string=value):%!f(string=2)] map[%!f(string=name):%!f(string=ENABLE_PROMETHEUS_SERVER) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=PROMETHEUS_SERVER_PORT) %!f(string=value):%!f(string=9092)] map[%!f(string=name):%!f(string=CHECK_TAG_BEFORE_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=MANAGED_TAG) %!f(string=value):%!f(string=aws-node-termination-handler/managed)] map[%!f(string=name):%!f(string=USE_PROVIDER_ID) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DRY_RUN) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=CORDON_ONLY) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=TAINT_NODE) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=EXCLUDE_FROM_LOAD_BALANCERS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DELETE_LOCAL_DATA) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=IGNORE_DAEMON_SETS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=POD_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=NODE_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=120)] map[%!f(string=name):%!f(string=EMIT_KUBERNETES_EVENTS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=COMPLETE_LIFECYCLE_ACTION_DELAY_SECONDS) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=ENABLE_SQS_TERMINATION_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=QUEUE_URL) %!f(string=value):%!f(string=https://sqs.us-east-1.amazonaws.com/<ACCOUNTID_REDACTED>/bug-report-cluster-public-<DOMAIN_REDACTED>-nth)] map[%!f(string=name):%!f(string=WORKERS) %!f(string=value):%!f(string=10)]] %!f(string=image):%!f(string=public.ecr.aws/aws-ec2/aws-node-termination-handler:v1.18.3) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):8080.000000] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):5.000000] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=ports):[map[%!f(string=containerPort):8080.000000 %!f(string=name):%!f(string=liveness-probe) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9092.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=64Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true) %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=securityContext):map[%!f(string=fsGroup):1000.000000] %!f(string=serviceAccountName):%!f(string=aws-node-termination-handler) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]]]]]
I0406 14:25:29.771828 745188 visitor.go:39] float64 value at spec.replicas: 1.000000
I0406 14:25:29.771831 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kubernetes.io/os):%!f(string=linux)]]
I0406 14:25:29.771835 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kubernetes.io/os):%!f(string=linux)]
I0406 14:25:29.771839 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app.kubernetes.io/component):%!f(string=deployment) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=k8s-app):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs) %!f(string=kubernetes.io/os):%!f(string=linux)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=env):[map[%!f(string=name):%!f(string=NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=POD_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.name)]]] map[%!f(string=name):%!f(string=NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=ENABLE_PROBES_SERVER) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=PROBES_SERVER_PORT) %!f(string=value):%!f(string=8080)] map[%!f(string=name):%!f(string=PROBES_SERVER_ENDPOINT) %!f(string=value):%!f(string=/healthz)] map[%!f(string=name):%!f(string=LOG_LEVEL) %!f(string=value):%!f(string=info)] map[%!f(string=name):%!f(string=JSON_LOGGING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=LOG_FORMAT_VERSION) %!f(string=value):%!f(string=2)] map[%!f(string=name):%!f(string=ENABLE_PROMETHEUS_SERVER) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=PROMETHEUS_SERVER_PORT) %!f(string=value):%!f(string=9092)] map[%!f(string=name):%!f(string=CHECK_TAG_BEFORE_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=MANAGED_TAG) %!f(string=value):%!f(string=aws-node-termination-handler/managed)] map[%!f(string=name):%!f(string=USE_PROVIDER_ID) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DRY_RUN) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=CORDON_ONLY) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=TAINT_NODE) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=EXCLUDE_FROM_LOAD_BALANCERS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DELETE_LOCAL_DATA) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=IGNORE_DAEMON_SETS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=POD_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=NODE_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=120)] map[%!f(string=name):%!f(string=EMIT_KUBERNETES_EVENTS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=COMPLETE_LIFECYCLE_ACTION_DELAY_SECONDS) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=ENABLE_SQS_TERMINATION_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=QUEUE_URL) %!f(string=value):%!f(string=https://sqs.us-east-1.amazonaws.com/<ACCOUNTID_REDACTED>/bug-report-cluster-public-<DOMAIN_REDACTED>-nth)] map[%!f(string=name):%!f(string=WORKERS) %!f(string=value):%!f(string=10)]] %!f(string=image):%!f(string=public.ecr.aws/aws-ec2/aws-node-termination-handler:v1.18.3) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):8080.000000] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):5.000000] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=ports):[map[%!f(string=containerPort):8080.000000 %!f(string=name):%!f(string=liveness-probe) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9092.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=64Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true) %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=securityContext):map[%!f(string=fsGroup):1000.000000] %!f(string=serviceAccountName):%!f(string=aws-node-termination-handler) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]]]]
I0406 14:25:29.771904 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app.kubernetes.io/component):%!f(string=deployment) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=k8s-app):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs) %!f(string=kubernetes.io/os):%!f(string=linux)]]
I0406 14:25:29.771910 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=app.kubernetes.io/component):%!f(string=deployment) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=k8s-app):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs) %!f(string=kubernetes.io/os):%!f(string=linux)]
I0406 14:25:29.771915 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=env):[map[%!f(string=name):%!f(string=NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=POD_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.name)]]] map[%!f(string=name):%!f(string=NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=ENABLE_PROBES_SERVER) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=PROBES_SERVER_PORT) %!f(string=value):%!f(string=8080)] map[%!f(string=name):%!f(string=PROBES_SERVER_ENDPOINT) %!f(string=value):%!f(string=/healthz)] map[%!f(string=name):%!f(string=LOG_LEVEL) %!f(string=value):%!f(string=info)] map[%!f(string=name):%!f(string=JSON_LOGGING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=LOG_FORMAT_VERSION) %!f(string=value):%!f(string=2)] map[%!f(string=name):%!f(string=ENABLE_PROMETHEUS_SERVER) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=PROMETHEUS_SERVER_PORT) %!f(string=value):%!f(string=9092)] map[%!f(string=name):%!f(string=CHECK_TAG_BEFORE_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=MANAGED_TAG) %!f(string=value):%!f(string=aws-node-termination-handler/managed)] map[%!f(string=name):%!f(string=USE_PROVIDER_ID) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DRY_RUN) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=CORDON_ONLY) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=TAINT_NODE) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=EXCLUDE_FROM_LOAD_BALANCERS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DELETE_LOCAL_DATA) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=IGNORE_DAEMON_SETS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=POD_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=NODE_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=120)] map[%!f(string=name):%!f(string=EMIT_KUBERNETES_EVENTS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=COMPLETE_LIFECYCLE_ACTION_DELAY_SECONDS) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=ENABLE_SQS_TERMINATION_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=QUEUE_URL) %!f(string=value):%!f(string=https://sqs.us-east-1.amazonaws.com/<ACCOUNTID_REDACTED>/bug-report-cluster-public-<DOMAIN_REDACTED>-nth)] map[%!f(string=name):%!f(string=WORKERS) %!f(string=value):%!f(string=10)]] %!f(string=image):%!f(string=public.ecr.aws/aws-ec2/aws-node-termination-handler:v1.18.3) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):8080.000000] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):5.000000] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=ports):[map[%!f(string=containerPort):8080.000000 %!f(string=name):%!f(string=liveness-probe) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9092.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=64Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true) %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=securityContext):map[%!f(string=fsGroup):1000.000000] %!f(string=serviceAccountName):%!f(string=aws-node-termination-handler) %!f(string=tolerations):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]]]
I0406 14:25:29.771985 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0]: map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]
I0406 14:25:29.771992 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0].labelSelector: map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]]
I0406 14:25:29.771996 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0].labelSelector.matchLabels: map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]
I0406 14:25:29.772000 745188 visitor.go:39] float64 value at spec.template.spec.topologySpreadConstraints.[0].maxSkew: 1.000000
I0406 14:25:29.772003 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1]: map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]
I0406 14:25:29.772008 745188 visitor.go:39] float64 value at spec.template.spec.topologySpreadConstraints.[1].maxSkew: 1.000000
I0406 14:25:29.772010 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1].labelSelector: map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]]
I0406 14:25:29.772014 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1].labelSelector.matchLabels: map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]
I0406 14:25:29.772036 745188 visitor.go:44] object value at spec.template.spec.affinity: map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]]
I0406 14:25:29.772043 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity: map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]
I0406 14:25:29.772050 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution: map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]
I0406 14:25:29.772057 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:29.772061 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.772066 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:29.772070 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.772073 745188 visitor.go:44] object value at spec.template.spec.securityContext: map[%!f(string=fsGroup):1000.000000]
I0406 14:25:29.772076 745188 visitor.go:39] float64 value at spec.template.spec.securityContext.fsGroup: 1000.000000
I0406 14:25:29.772079 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.772082 745188 visitor.go:44] object value at spec.template.spec.tolerations.[1]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:29.772086 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=env):[map[%!f(string=name):%!f(string=NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=POD_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.name)]]] map[%!f(string=name):%!f(string=NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=ENABLE_PROBES_SERVER) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=PROBES_SERVER_PORT) %!f(string=value):%!f(string=8080)] map[%!f(string=name):%!f(string=PROBES_SERVER_ENDPOINT) %!f(string=value):%!f(string=/healthz)] map[%!f(string=name):%!f(string=LOG_LEVEL) %!f(string=value):%!f(string=info)] map[%!f(string=name):%!f(string=JSON_LOGGING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=LOG_FORMAT_VERSION) %!f(string=value):%!f(string=2)] map[%!f(string=name):%!f(string=ENABLE_PROMETHEUS_SERVER) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=PROMETHEUS_SERVER_PORT) %!f(string=value):%!f(string=9092)] map[%!f(string=name):%!f(string=CHECK_TAG_BEFORE_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=MANAGED_TAG) %!f(string=value):%!f(string=aws-node-termination-handler/managed)] map[%!f(string=name):%!f(string=USE_PROVIDER_ID) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DRY_RUN) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=CORDON_ONLY) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=TAINT_NODE) %!f(string=value):%!f(string=false)] map[%!f(string=name):%!f(string=EXCLUDE_FROM_LOAD_BALANCERS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=DELETE_LOCAL_DATA) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=IGNORE_DAEMON_SETS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=POD_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=NODE_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=120)] map[%!f(string=name):%!f(string=EMIT_KUBERNETES_EVENTS) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=COMPLETE_LIFECYCLE_ACTION_DELAY_SECONDS) %!f(string=value):%!f(string=-1)] map[%!f(string=name):%!f(string=ENABLE_SQS_TERMINATION_DRAINING) %!f(string=value):%!f(string=true)] map[%!f(string=name):%!f(string=QUEUE_URL) %!f(string=value):%!f(string=https://sqs.us-east-1.amazonaws.com/<ACCOUNTID_REDACTED>/bug-report-cluster-public-<DOMAIN_REDACTED>-nth)] map[%!f(string=name):%!f(string=WORKERS) %!f(string=value):%!f(string=10)]] %!f(string=image):%!f(string=public.ecr.aws/aws-ec2/aws-node-termination-handler:v1.18.3) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):8080.000000] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):5.000000] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=ports):[map[%!f(string=containerPort):8080.000000 %!f(string=name):%!f(string=liveness-probe) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):9092.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=64Mi)]] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true) %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000]]
I0406 14:25:29.772124 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe: map[%!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):8080.000000] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):5.000000]
I0406 14:25:29.772129 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe.httpGet: map[%!f(string=path):%!f(string=/healthz) %!f(string=port):8080.000000]
I0406 14:25:29.772132 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 8080.000000
I0406 14:25:29.772135 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 5.000000
I0406 14:25:29.772137 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.periodSeconds: 5.000000
I0406 14:25:29.772139 745188 visitor.go:44] object value at spec.template.spec.containers.[0].ports.[0]: map[%!f(string=containerPort):8080.000000 %!f(string=name):%!f(string=liveness-probe) %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:29.772145 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 8080.000000
I0406 14:25:29.772148 745188 visitor.go:44] object value at spec.template.spec.containers.[0].ports.[1]: map[%!f(string=containerPort):9092.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:29.772151 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 9092.000000
I0406 14:25:29.772153 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources: map[%!f(string=requests):map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=64Mi)]]
I0406 14:25:29.772156 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.requests: map[%!f(string=cpu):%!f(string=50m) %!f(string=memory):%!f(string=64Mi)]
I0406 14:25:29.772159 745188 visitor.go:44] object value at spec.template.spec.containers.[0].securityContext: map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true) %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000]
I0406 14:25:29.772164 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].securityContext.runAsUser: 1000.000000
I0406 14:25:29.772166 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.allowPrivilegeEscalation: false
I0406 14:25:29.772168 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.readOnlyRootFilesystem: true
I0406 14:25:29.772170 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].securityContext.runAsGroup: 1000.000000
I0406 14:25:29.772173 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.runAsNonRoot: true
I0406 14:25:29.772175 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0]: map[%!f(string=name):%!f(string=NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]]
I0406 14:25:29.772179 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0].valueFrom: map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]
I0406 14:25:29.772182 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0].valueFrom.fieldRef: map[%!f(string=fieldPath):%!f(string=spec.nodeName)]
I0406 14:25:29.772185 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1]: map[%!f(string=name):%!f(string=POD_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.name)]]]
I0406 14:25:29.772188 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom: map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.name)]]
I0406 14:25:29.772192 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom.fieldRef: map[%!f(string=fieldPath):%!f(string=metadata.name)]
I0406 14:25:29.772195 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2]: map[%!f(string=name):%!f(string=NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.namespace)]]]
I0406 14:25:29.772198 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2].valueFrom: map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=metadata.namespace)]]
I0406 14:25:29.772201 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2].valueFrom.fieldRef: map[%!f(string=fieldPath):%!f(string=metadata.namespace)]
I0406 14:25:29.772204 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[3]: map[%!f(string=name):%!f(string=ENABLE_PROBES_SERVER) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772208 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[4]: map[%!f(string=name):%!f(string=PROBES_SERVER_PORT) %!f(string=value):%!f(string=8080)]
I0406 14:25:29.772211 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[5]: map[%!f(string=name):%!f(string=PROBES_SERVER_ENDPOINT) %!f(string=value):%!f(string=/healthz)]
I0406 14:25:29.772213 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[6]: map[%!f(string=name):%!f(string=LOG_LEVEL) %!f(string=value):%!f(string=info)]
I0406 14:25:29.772216 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[7]: map[%!f(string=name):%!f(string=JSON_LOGGING) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772219 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[8]: map[%!f(string=name):%!f(string=LOG_FORMAT_VERSION) %!f(string=value):%!f(string=2)]
I0406 14:25:29.772222 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[9]: map[%!f(string=name):%!f(string=ENABLE_PROMETHEUS_SERVER) %!f(string=value):%!f(string=false)]
I0406 14:25:29.772225 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[10]: map[%!f(string=name):%!f(string=PROMETHEUS_SERVER_PORT) %!f(string=value):%!f(string=9092)]
I0406 14:25:29.772228 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[11]: map[%!f(string=name):%!f(string=CHECK_TAG_BEFORE_DRAINING) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772231 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[12]: map[%!f(string=name):%!f(string=MANAGED_TAG) %!f(string=value):%!f(string=aws-node-termination-handler/managed)]
I0406 14:25:29.772234 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[13]: map[%!f(string=name):%!f(string=USE_PROVIDER_ID) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772237 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[14]: map[%!f(string=name):%!f(string=DRY_RUN) %!f(string=value):%!f(string=false)]
I0406 14:25:29.772239 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[15]: map[%!f(string=name):%!f(string=CORDON_ONLY) %!f(string=value):%!f(string=false)]
I0406 14:25:29.772242 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[16]: map[%!f(string=name):%!f(string=TAINT_NODE) %!f(string=value):%!f(string=false)]
I0406 14:25:29.772245 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[17]: map[%!f(string=name):%!f(string=EXCLUDE_FROM_LOAD_BALANCERS) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772248 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[18]: map[%!f(string=name):%!f(string=DELETE_LOCAL_DATA) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772251 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[19]: map[%!f(string=name):%!f(string=IGNORE_DAEMON_SETS) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772255 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[20]: map[%!f(string=name):%!f(string=POD_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=-1)]
I0406 14:25:29.772257 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[21]: map[%!f(string=name):%!f(string=NODE_TERMINATION_GRACE_PERIOD) %!f(string=value):%!f(string=120)]
I0406 14:25:29.772260 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[22]: map[%!f(string=name):%!f(string=EMIT_KUBERNETES_EVENTS) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772263 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[23]: map[%!f(string=name):%!f(string=COMPLETE_LIFECYCLE_ACTION_DELAY_SECONDS) %!f(string=value):%!f(string=-1)]
I0406 14:25:29.772266 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[24]: map[%!f(string=name):%!f(string=ENABLE_SQS_TERMINATION_DRAINING) %!f(string=value):%!f(string=true)]
I0406 14:25:29.772269 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[25]: map[%!f(string=name):%!f(string=QUEUE_URL) %!f(string=value):%!f(string=https://sqs.us-east-1.amazonaws.com/<ACCOUNTID_REDACTED>/bug-report-cluster-public-<DOMAIN_REDACTED>-nth)]
I0406 14:25:29.772273 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[26]: map[%!f(string=name):%!f(string=WORKERS) %!f(string=value):%!f(string=10)]
I0406 14:25:29.772277 745188 images.go:59] Consider image for re-mapping: "public.ecr.aws/aws-ec2/aws-node-termination-handler:v1.18.3"
I0406 14:25:30.433214 745188 visitor.go:34] string value at spec.template.spec.hostNetwork: true
I0406 14:25:30.433287 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=policy/v1) %!f(string=kind):%!f(string=PodDisruptionBudget) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=maxUnavailable):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]]]]
I0406 14:25:30.433319 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)] %!f(string=name):%!f(string=aws-node-termination-handler) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:30.433331 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=node-termination-handler.aws) %!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=k8s-addon):%!f(string=node-termination-handler.aws)]
I0406 14:25:30.433338 745188 visitor.go:44] object value at spec: map[%!f(string=maxUnavailable):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]]]
I0406 14:25:30.433361 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]]
I0406 14:25:30.433370 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=app.kubernetes.io/instance):%!f(string=aws-node-termination-handler) %!f(string=app.kubernetes.io/name):%!f(string=aws-node-termination-handler) %!f(string=kops.k8s.io/nth-mode):%!f(string=sqs)]
I0406 14:25:30.433378 745188 visitor.go:39] float64 value at spec.maxUnavailable: 1.000000
I0406 14:25:30.434523 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: node-termination-handler.aws
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-node-termination-handler
app.kubernetes.io/part-of: aws-node-termination-handler
app.kubernetes.io/version: v1.18.3
k8s-addon: node-termination-handler.aws
k8s-app: aws-node-termination-handler
name: aws-node-termination-handler
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: node-termination-handler.aws
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-node-termination-handler
app.kubernetes.io/part-of: aws-node-termination-handler
app.kubernetes.io/version: v1.18.3
k8s-addon: node-termination-handler.aws
name: aws-node-termination-handler
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
- list
- patch
- update
- apiGroups:
- ""
resources:
- pods
verbs:
- list
- get
- apiGroups:
- ""
resources:
- pods/eviction
verbs:
- create
- apiGroups:
- extensions
resources:
- daemonsets
verbs:
- get
- apiGroups:
- apps
resources:
- daemonsets
verbs:
- get
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: node-termination-handler.aws
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-node-termination-handler
app.kubernetes.io/part-of: aws-node-termination-handler
app.kubernetes.io/version: v1.18.3
k8s-addon: node-termination-handler.aws
name: aws-node-termination-handler
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: aws-node-termination-handler
subjects:
- kind: ServiceAccount
name: aws-node-termination-handler
namespace: kube-system
---
apiVersion: apps/v1
kind: Deployment
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: node-termination-handler.aws
app.kubernetes.io/component: deployment
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-node-termination-handler
app.kubernetes.io/part-of: aws-node-termination-handler
app.kubernetes.io/version: v1.18.3
k8s-addon: node-termination-handler.aws
k8s-app: aws-node-termination-handler
name: aws-node-termination-handler
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/name: aws-node-termination-handler
kubernetes.io/os: linux
template:
metadata:
creationTimestamp: null
labels:
app.kubernetes.io/component: deployment
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/name: aws-node-termination-handler
k8s-app: aws-node-termination-handler
kops.k8s.io/managed-by: kops
kops.k8s.io/nth-mode: sqs
kubernetes.io/os: linux
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
containers:
- env:
- name: NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: ENABLE_PROBES_SERVER
value: "true"
- name: PROBES_SERVER_PORT
value: "8080"
- name: PROBES_SERVER_ENDPOINT
value: /healthz
- name: LOG_LEVEL
value: info
- name: JSON_LOGGING
value: "true"
- name: LOG_FORMAT_VERSION
value: "2"
- name: ENABLE_PROMETHEUS_SERVER
value: "false"
- name: PROMETHEUS_SERVER_PORT
value: "9092"
- name: CHECK_TAG_BEFORE_DRAINING
value: "true"
- name: MANAGED_TAG
value: aws-node-termination-handler/managed
- name: USE_PROVIDER_ID
value: "true"
- name: DRY_RUN
value: "false"
- name: CORDON_ONLY
value: "false"
- name: TAINT_NODE
value: "false"
- name: EXCLUDE_FROM_LOAD_BALANCERS
value: "true"
- name: DELETE_LOCAL_DATA
value: "true"
- name: IGNORE_DAEMON_SETS
value: "true"
- name: POD_TERMINATION_GRACE_PERIOD
value: "-1"
- name: NODE_TERMINATION_GRACE_PERIOD
value: "120"
- name: EMIT_KUBERNETES_EVENTS
value: "true"
- name: COMPLETE_LIFECYCLE_ACTION_DELAY_SECONDS
value: "-1"
- name: ENABLE_SQS_TERMINATION_DRAINING
value: "true"
- name: QUEUE_URL
value: https://sqs.us-east-1.amazonaws.com/<ACCOUNTID_REDACTED>/bug-report-cluster-public-<DOMAIN_REDACTED>-nth
- name: WORKERS
value: "10"
image: public.ecr.aws/aws-ec2/aws-node-termination-handler:v1.18.3@sha256:f02ff16999b287a952b96be35b078cbe2f9adf9d5c444db4b909563c47958bd9
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
path: /healthz
port: 8080
initialDelaySeconds: 5
periodSeconds: 5
name: aws-node-termination-handler
ports:
- containerPort: 8080
name: liveness-probe
protocol: TCP
- containerPort: 9092
name: metrics
protocol: TCP
resources:
requests:
cpu: 50m
memory: 64Mi
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
runAsGroup: 1000
runAsNonRoot: true
runAsUser: 1000
hostNetwork: true
nodeSelector: null
priorityClassName: system-cluster-critical
securityContext:
fsGroup: 1000
serviceAccountName: aws-node-termination-handler
tolerations:
- key: node-role.kubernetes.io/control-plane
operator: Exists
- key: node-role.kubernetes.io/master
operator: Exists
topologySpreadConstraints:
- labelSelector:
matchLabels:
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/name: aws-node-termination-handler
kops.k8s.io/nth-mode: sqs
maxSkew: 1
topologyKey: topology.kubernetes.io/zone
whenUnsatisfiable: ScheduleAnyway
- labelSelector:
matchLabels:
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/name: aws-node-termination-handler
kops.k8s.io/nth-mode: sqs
maxSkew: 1
topologyKey: kubernetes.io/hostname
whenUnsatisfiable: DoNotSchedule
---
apiVersion: policy/v1
kind: PodDisruptionBudget
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: node-termination-handler.aws
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-node-termination-handler
k8s-addon: node-termination-handler.aws
name: aws-node-termination-handler
namespace: kube-system
spec:
maxUnavailable: 1
selector:
matchLabels:
app.kubernetes.io/instance: aws-node-termination-handler
app.kubernetes.io/name: aws-node-termination-handler
kops.k8s.io/nth-mode: sqs
I0406 14:25:30.434579 745188 bootstrapchannelbuilder.go:149] hash 2b4eab69128c76544d1f11eed3575ed058def4125f663311f99c05facea8f6c5
I0406 14:25:30.434588 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-storage-aws.addons.k8s.io-v1.15.0"
I0406 14:25:30.436404 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=storage.k8s.io/v1) %!f(string=kind):%!f(string=StorageClass) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=default)] %!f(string=parameters):map[%!f(string=type):%!f(string=gp2)] %!f(string=provisioner):%!f(string=kubernetes.io/aws-ebs)]
I0406 14:25:30.436442 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=default)]
I0406 14:25:30.436452 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)]
I0406 14:25:30.436456 745188 visitor.go:44] object value at parameters: map[%!f(string=type):%!f(string=gp2)]
I0406 14:25:30.436462 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=storage.k8s.io/v1) %!f(string=kind):%!f(string=StorageClass) %!f(string=metadata):map[%!f(string=annotations):map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=false)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=gp2)] %!f(string=parameters):map[%!f(string=type):%!f(string=gp2)] %!f(string=provisioner):%!f(string=kubernetes.io/aws-ebs)]
I0406 14:25:30.436501 745188 visitor.go:44] object value at metadata: map[%!f(string=annotations):map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=false)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=gp2)]
I0406 14:25:30.436508 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)]
I0406 14:25:30.436512 745188 visitor.go:44] object value at metadata.annotations: map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=false)]
I0406 14:25:30.436514 745188 visitor.go:44] object value at parameters: map[%!f(string=type):%!f(string=gp2)]
I0406 14:25:30.436517 745188 visitor.go:44] object value at : map[%!f(string=allowVolumeExpansion):%!f(bool=true) %!f(string=apiVersion):%!f(string=storage.k8s.io/v1) %!f(string=kind):%!f(string=StorageClass) %!f(string=metadata):map[%!f(string=annotations):map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=false)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=kops-ssd-1-17)] %!f(string=parameters):map[%!f(string=encrypted):%!f(string=true) %!f(string=type):%!f(string=gp2)] %!f(string=provisioner):%!f(string=kubernetes.io/aws-ebs) %!f(string=volumeBindingMode):%!f(string=WaitForFirstConsumer)]
I0406 14:25:30.436527 745188 visitor.go:44] object value at parameters: map[%!f(string=encrypted):%!f(string=true) %!f(string=type):%!f(string=gp2)]
I0406 14:25:30.436531 745188 visitor.go:34] string value at allowVolumeExpansion: true
I0406 14:25:30.436533 745188 visitor.go:44] object value at metadata: map[%!f(string=annotations):map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=false)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=kops-ssd-1-17)]
I0406 14:25:30.436538 745188 visitor.go:44] object value at metadata.annotations: map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=false)]
I0406 14:25:30.436541 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)]
I0406 14:25:30.436544 745188 visitor.go:44] object value at : map[%!f(string=allowVolumeExpansion):%!f(bool=true) %!f(string=apiVersion):%!f(string=storage.k8s.io/v1) %!f(string=kind):%!f(string=StorageClass) %!f(string=metadata):map[%!f(string=annotations):map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=true)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=kops-csi-1-21)] %!f(string=parameters):map[%!f(string=encrypted):%!f(string=true) %!f(string=type):%!f(string=gp3)] %!f(string=provisioner):%!f(string=ebs.csi.aws.com) %!f(string=volumeBindingMode):%!f(string=WaitForFirstConsumer)]
I0406 14:25:30.436553 745188 visitor.go:44] object value at parameters: map[%!f(string=encrypted):%!f(string=true) %!f(string=type):%!f(string=gp3)]
I0406 14:25:30.436556 745188 visitor.go:34] string value at allowVolumeExpansion: true
I0406 14:25:30.436558 745188 visitor.go:44] object value at metadata: map[%!f(string=annotations):map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=true)] %!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=kops-csi-1-21)]
I0406 14:25:30.436563 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)]
I0406 14:25:30.436567 745188 visitor.go:44] object value at metadata.annotations: map[%!f(string=storageclass.kubernetes.io/is-default-class):%!f(string=true)]
I0406 14:25:30.436569 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=system:aws-cloud-provider)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=create) %!f(string=patch) %!f(string=update)]]]]
I0406 14:25:30.436581 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=patch)]]
I0406 14:25:30.436586 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=create) %!f(string=patch) %!f(string=update)]]
I0406 14:25:30.436592 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=system:aws-cloud-provider)]
I0406 14:25:30.436596 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)]
I0406 14:25:30.436615 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=system:aws-cloud-provider)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=system:aws-cloud-provider)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=aws-cloud-provider) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:30.436662 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)] %!f(string=name):%!f(string=system:aws-cloud-provider)]
I0406 14:25:30.436669 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=storage-aws.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=storage-aws.addons.k8s.io)]
I0406 14:25:30.436673 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=system:aws-cloud-provider)]
I0406 14:25:30.436677 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=aws-cloud-provider) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:30.437129 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: storage-aws.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: storage-aws.addons.k8s.io
name: default
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.kubernetes.io/is-default-class: "false"
creationTimestamp: null
labels:
addon.kops.k8s.io/name: storage-aws.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: storage-aws.addons.k8s.io
name: gp2
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
allowVolumeExpansion: true
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.kubernetes.io/is-default-class: "false"
creationTimestamp: null
labels:
addon.kops.k8s.io/name: storage-aws.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: storage-aws.addons.k8s.io
name: kops-ssd-1-17
parameters:
encrypted: "true"
type: gp2
provisioner: kubernetes.io/aws-ebs
volumeBindingMode: WaitForFirstConsumer
---
allowVolumeExpansion: true
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.kubernetes.io/is-default-class: "true"
creationTimestamp: null
labels:
addon.kops.k8s.io/name: storage-aws.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: storage-aws.addons.k8s.io
name: kops-csi-1-21
parameters:
encrypted: "true"
type: gp3
provisioner: ebs.csi.aws.com
volumeBindingMode: WaitForFirstConsumer
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: storage-aws.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: storage-aws.addons.k8s.io
name: system:aws-cloud-provider
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
- list
- patch
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- update
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: storage-aws.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: storage-aws.addons.k8s.io
name: system:aws-cloud-provider
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:aws-cloud-provider
subjects:
- kind: ServiceAccount
name: aws-cloud-provider
namespace: kube-system
I0406 14:25:30.437165 745188 bootstrapchannelbuilder.go:149] hash 4e2cda50cd5048133aad1b5e28becb60f4629d3f9e09c514a2757c27998b4200
I0406 14:25:30.437193 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-networking.cilium.io-k8s-1.16"
I0406 14:25:30.451635 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:30.451729 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:30.451744 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:30.451754 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:30.451790 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:30.451797 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:30.451804 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=data):map[%!f(string=agent-health-port):%!f(string=9879) %!f(string=auto-direct-node-routes):%!f(string=false) %!f(string=bpf-ct-global-any-max):%!f(string=262144) %!f(string=bpf-ct-global-tcp-max):%!f(string=524288) %!f(string=bpf-lb-algorithm):%!f(string=random) %!f(string=bpf-lb-maglev-table-size):%!f(string=16381) %!f(string=bpf-lb-map-max):%!f(string=65536) %!f(string=bpf-lb-sock-hostns-only):%!f(string=false) %!f(string=bpf-nat-global-max):%!f(string=524288) %!f(string=bpf-neigh-global-max):%!f(string=524288) %!f(string=bpf-policy-map-max):%!f(string=16384) %!f(string=cgroup-root):%!f(string=/run/cilium/cgroupv2) %!f(string=cluster-name):%!f(string=default) %!f(string=debug):%!f(string=false) %!f(string=disable-cnp-status-updates):%!f(string=true) %!f(string=disable-endpoint-crd):%!f(string=false) %!f(string=enable-bpf-masquerade):%!f(string=false) %!f(string=enable-endpoint-health-checking):%!f(string=true) %!f(string=enable-ipv4):%!f(string=true) %!f(string=enable-ipv4-masquerade):%!f(string=true) %!f(string=enable-ipv6):%!f(string=false) %!f(string=enable-ipv6-masquerade):%!f(string=false) %!f(string=enable-l7-proxy):%!f(string=true) %!f(string=enable-node-port):%!f(string=true) %!f(string=enable-remote-node-identity):%!f(string=true) %!f(string=enable-service-topology):%!f(string=false) %!f(string=enable-unreachable-routes):%!f(string=false) %!f(string=identity-allocation-mode):%!f(string=crd) %!f(string=identity-change-grace-period):%!f(string=5s) %!f(string=install-iptables-rules):%!f(string=true) %!f(string=ipam):%!f(string=kubernetes) %!f(string=kube-proxy-replacement):%!f(string=strict) %!f(string=monitor-aggregation):%!f(string=medium) %!f(string=nodes-gc-interval):%!f(string=5m0s) %!f(string=preallocate-bpf-maps):%!f(string=false) %!f(string=sidecar-istio-proxy-image):%!f(string=cilium/istio_proxy) %!f(string=tofqdns-dns-reject-response-code):%!f(string=refused) %!f(string=tofqdns-enable-poller):%!f(string=false) %!f(string=tunnel):%!f(string=vxlan)] %!f(string=kind):%!f(string=ConfigMap) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-config) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:30.451862 745188 visitor.go:44] object value at data: map[%!f(string=agent-health-port):%!f(string=9879) %!f(string=auto-direct-node-routes):%!f(string=false) %!f(string=bpf-ct-global-any-max):%!f(string=262144) %!f(string=bpf-ct-global-tcp-max):%!f(string=524288) %!f(string=bpf-lb-algorithm):%!f(string=random) %!f(string=bpf-lb-maglev-table-size):%!f(string=16381) %!f(string=bpf-lb-map-max):%!f(string=65536) %!f(string=bpf-lb-sock-hostns-only):%!f(string=false) %!f(string=bpf-nat-global-max):%!f(string=524288) %!f(string=bpf-neigh-global-max):%!f(string=524288) %!f(string=bpf-policy-map-max):%!f(string=16384) %!f(string=cgroup-root):%!f(string=/run/cilium/cgroupv2) %!f(string=cluster-name):%!f(string=default) %!f(string=debug):%!f(string=false) %!f(string=disable-cnp-status-updates):%!f(string=true) %!f(string=disable-endpoint-crd):%!f(string=false) %!f(string=enable-bpf-masquerade):%!f(string=false) %!f(string=enable-endpoint-health-checking):%!f(string=true) %!f(string=enable-ipv4):%!f(string=true) %!f(string=enable-ipv4-masquerade):%!f(string=true) %!f(string=enable-ipv6):%!f(string=false) %!f(string=enable-ipv6-masquerade):%!f(string=false) %!f(string=enable-l7-proxy):%!f(string=true) %!f(string=enable-node-port):%!f(string=true) %!f(string=enable-remote-node-identity):%!f(string=true) %!f(string=enable-service-topology):%!f(string=false) %!f(string=enable-unreachable-routes):%!f(string=false) %!f(string=identity-allocation-mode):%!f(string=crd) %!f(string=identity-change-grace-period):%!f(string=5s) %!f(string=install-iptables-rules):%!f(string=true) %!f(string=ipam):%!f(string=kubernetes) %!f(string=kube-proxy-replacement):%!f(string=strict) %!f(string=monitor-aggregation):%!f(string=medium) %!f(string=nodes-gc-interval):%!f(string=5m0s) %!f(string=preallocate-bpf-maps):%!f(string=false) %!f(string=sidecar-istio-proxy-image):%!f(string=cilium/istio_proxy) %!f(string=tofqdns-dns-reject-response-code):%!f(string=refused) %!f(string=tofqdns-enable-poller):%!f(string=false) %!f(string=tunnel):%!f(string=vxlan)]
I0406 14:25:30.451911 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-config) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:30.451917 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:30.451921 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=networking.k8s.io)] %!f(string=resources):[%!f(string=networkpolicies)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=discovery.k8s.io)] %!f(string=resources):[%!f(string=endpointslices)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=namespaces) %!f(string=services) %!f(string=pods) %!f(string=endpoints) %!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=apiextensions.k8s.io)] %!f(string=resources):[%!f(string=customresourcedefinitions)] %!f(string=verbs):[%!f(string=list) %!f(string=watch) %!f(string=get)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumloadbalancerippools) %!f(string=ciliumbgppeeringpolicies) %!f(string=ciliumclusterwideenvoyconfigs) %!f(string=ciliumclusterwidenetworkpolicies) %!f(string=ciliumegressgatewaypolicies) %!f(string=ciliumegressnatpolicies) %!f(string=ciliumendpoints) %!f(string=ciliumendpointslices) %!f(string=ciliumenvoyconfigs) %!f(string=ciliumidentities) %!f(string=ciliumlocalredirectpolicies) %!f(string=ciliumnetworkpolicies) %!f(string=ciliumnodes)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumidentities) %!f(string=ciliumendpoints) %!f(string=ciliumnodes)] %!f(string=verbs):[%!f(string=create)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumidentities)] %!f(string=verbs):[%!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumendpoints)] %!f(string=verbs):[%!f(string=delete) %!f(string=get)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnodes) %!f(string=ciliumnodes/status)] %!f(string=verbs):[%!f(string=get) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnetworkpolicies/status) %!f(string=ciliumclusterwidenetworkpolicies/status) %!f(string=ciliumendpoints/status) %!f(string=ciliumendpoints)] %!f(string=verbs):[%!f(string=patch)]]]]
I0406 14:25:30.452039 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium)]
I0406 14:25:30.452050 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:30.452059 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=networking.k8s.io)] %!f(string=resources):[%!f(string=networkpolicies)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452065 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=discovery.k8s.io)] %!f(string=resources):[%!f(string=endpointslices)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452069 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=namespaces) %!f(string=services) %!f(string=pods) %!f(string=endpoints) %!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452077 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=apiextensions.k8s.io)] %!f(string=resources):[%!f(string=customresourcedefinitions)] %!f(string=verbs):[%!f(string=list) %!f(string=watch) %!f(string=get)]]
I0406 14:25:30.452083 745188 visitor.go:44] object value at rules.[4]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumloadbalancerippools) %!f(string=ciliumbgppeeringpolicies) %!f(string=ciliumclusterwideenvoyconfigs) %!f(string=ciliumclusterwidenetworkpolicies) %!f(string=ciliumegressgatewaypolicies) %!f(string=ciliumegressnatpolicies) %!f(string=ciliumendpoints) %!f(string=ciliumendpointslices) %!f(string=ciliumenvoyconfigs) %!f(string=ciliumidentities) %!f(string=ciliumlocalredirectpolicies) %!f(string=ciliumnetworkpolicies) %!f(string=ciliumnodes)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452094 745188 visitor.go:44] object value at rules.[5]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumidentities) %!f(string=ciliumendpoints) %!f(string=ciliumnodes)] %!f(string=verbs):[%!f(string=create)]]
I0406 14:25:30.452099 745188 visitor.go:44] object value at rules.[6]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumidentities)] %!f(string=verbs):[%!f(string=update)]]
I0406 14:25:30.452104 745188 visitor.go:44] object value at rules.[7]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumendpoints)] %!f(string=verbs):[%!f(string=delete) %!f(string=get)]]
I0406 14:25:30.452109 745188 visitor.go:44] object value at rules.[8]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnodes) %!f(string=ciliumnodes/status)] %!f(string=verbs):[%!f(string=get) %!f(string=update)]]
I0406 14:25:30.452114 745188 visitor.go:44] object value at rules.[9]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnetworkpolicies/status) %!f(string=ciliumclusterwidenetworkpolicies/status) %!f(string=ciliumendpoints/status) %!f(string=ciliumendpoints)] %!f(string=verbs):[%!f(string=patch)]]
I0406 14:25:30.452120 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=pods)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=discovery.k8s.io)] %!f(string=resources):[%!f(string=endpointslices)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=services) %!f(string=endpoints) %!f(string=namespaces)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnetworkpolicies) %!f(string=ciliumclusterwidenetworkpolicies)] %!f(string=verbs):[%!f(string=create) %!f(string=update) %!f(string=deletecollection) %!f(string=patch) %!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnetworkpolicies/status) %!f(string=ciliumclusterwidenetworkpolicies/status)] %!f(string=verbs):[%!f(string=patch) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumendpoints) %!f(string=ciliumidentities)] %!f(string=verbs):[%!f(string=delete) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumidentities)] %!f(string=verbs):[%!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnodes)] %!f(string=verbs):[%!f(string=create) %!f(string=update) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=delete)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnodes/status)] %!f(string=verbs):[%!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumendpointslices) %!f(string=ciliumenvoyconfigs)] %!f(string=verbs):[%!f(string=create) %!f(string=update) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=delete) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=apiextensions.k8s.io)] %!f(string=resources):[%!f(string=customresourcedefinitions)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=apiextensions.k8s.io)] %!f(string=resourceNames):[%!f(string=ciliumloadbalancerippools.cilium.io) %!f(string=ciliumbgppeeringpolicies.cilium.io) %!f(string=ciliumclusterwideenvoyconfigs.cilium.io) %!f(string=ciliumclusterwidenetworkpolicies.cilium.io) %!f(string=ciliumegressgatewaypolicies.cilium.io) %!f(string=ciliumegressnatpolicies.cilium.io) %!f(string=ciliumendpoints.cilium.io) %!f(string=ciliumendpointslices.cilium.io) %!f(string=ciliumenvoyconfigs.cilium.io) %!f(string=ciliumexternalworkloads.cilium.io) %!f(string=ciliumidentities.cilium.io) %!f(string=ciliumlocalredirectpolicies.cilium.io) %!f(string=ciliumnetworkpolicies.cilium.io) %!f(string=ciliumnodes.cilium.io)] %!f(string=resources):[%!f(string=customresourcedefinitions)] %!f(string=verbs):[%!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumloadbalancerippools)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumloadbalancerippools/status)] %!f(string=verbs):[%!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=coordination.k8s.io)] %!f(string=resources):[%!f(string=leases)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=update)]]]]
I0406 14:25:30.452225 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator)]
I0406 14:25:30.452233 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:30.452237 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=pods)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452243 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=discovery.k8s.io)] %!f(string=resources):[%!f(string=endpointslices)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452267 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452271 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=services) %!f(string=endpoints) %!f(string=namespaces)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452302 745188 visitor.go:44] object value at rules.[4]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnetworkpolicies) %!f(string=ciliumclusterwidenetworkpolicies)] %!f(string=verbs):[%!f(string=create) %!f(string=update) %!f(string=deletecollection) %!f(string=patch) %!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452309 745188 visitor.go:44] object value at rules.[5]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnetworkpolicies/status) %!f(string=ciliumclusterwidenetworkpolicies/status)] %!f(string=verbs):[%!f(string=patch) %!f(string=update)]]
I0406 14:25:30.452315 745188 visitor.go:44] object value at rules.[6]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumendpoints) %!f(string=ciliumidentities)] %!f(string=verbs):[%!f(string=delete) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452320 745188 visitor.go:44] object value at rules.[7]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumidentities)] %!f(string=verbs):[%!f(string=update)]]
I0406 14:25:30.452324 745188 visitor.go:44] object value at rules.[8]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnodes)] %!f(string=verbs):[%!f(string=create) %!f(string=update) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=delete)]]
I0406 14:25:30.452330 745188 visitor.go:44] object value at rules.[9]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumnodes/status)] %!f(string=verbs):[%!f(string=update)]]
I0406 14:25:30.452334 745188 visitor.go:44] object value at rules.[10]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumendpointslices) %!f(string=ciliumenvoyconfigs)] %!f(string=verbs):[%!f(string=create) %!f(string=update) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=delete) %!f(string=patch)]]
I0406 14:25:30.452340 745188 visitor.go:44] object value at rules.[11]: map[%!f(string=apiGroups):[%!f(string=apiextensions.k8s.io)] %!f(string=resources):[%!f(string=customresourcedefinitions)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452345 745188 visitor.go:44] object value at rules.[12]: map[%!f(string=apiGroups):[%!f(string=apiextensions.k8s.io)] %!f(string=resourceNames):[%!f(string=ciliumloadbalancerippools.cilium.io) %!f(string=ciliumbgppeeringpolicies.cilium.io) %!f(string=ciliumclusterwideenvoyconfigs.cilium.io) %!f(string=ciliumclusterwidenetworkpolicies.cilium.io) %!f(string=ciliumegressgatewaypolicies.cilium.io) %!f(string=ciliumegressnatpolicies.cilium.io) %!f(string=ciliumendpoints.cilium.io) %!f(string=ciliumendpointslices.cilium.io) %!f(string=ciliumenvoyconfigs.cilium.io) %!f(string=ciliumexternalworkloads.cilium.io) %!f(string=ciliumidentities.cilium.io) %!f(string=ciliumlocalredirectpolicies.cilium.io) %!f(string=ciliumnetworkpolicies.cilium.io) %!f(string=ciliumnodes.cilium.io)] %!f(string=resources):[%!f(string=customresourcedefinitions)] %!f(string=verbs):[%!f(string=update)]]
I0406 14:25:30.452354 745188 visitor.go:44] object value at rules.[13]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumloadbalancerippools)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:30.452360 745188 visitor.go:44] object value at rules.[14]: map[%!f(string=apiGroups):[%!f(string=cilium.io)] %!f(string=resources):[%!f(string=ciliumloadbalancerippools/status)] %!f(string=verbs):[%!f(string=patch)]]
I0406 14:25:30.452366 745188 visitor.go:44] object value at rules.[15]: map[%!f(string=apiGroups):[%!f(string=coordination.k8s.io)] %!f(string=resources):[%!f(string=leases)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=update)]]
I0406 14:25:30.452371 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=cilium)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=cilium) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:30.452381 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=cilium) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:30.452385 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium)]
I0406 14:25:30.452389 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:30.452394 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=cilium)]
I0406 14:25:30.452397 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=cilium-operator)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=cilium-operator) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:30.452408 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator)]
I0406 14:25:30.452412 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:30.452416 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=cilium-operator)]
I0406 14:25:30.452419 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=cilium-operator) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:30.452423 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=DaemonSet) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-app):%!f(string=cilium) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map)] %!f(string=command):[%!f(string=cilium-agent)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_CLUSTERMESH_CONFIG) %!f(string=value):%!f(string=/var/lib/cilium/clustermesh/)] map[%!f(string=name):%!f(string=CILIUM_CNI_CHAINING_MODE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=cni-chaining-mode) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_CUSTOM_CNI_CONF) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=custom-cni-conf) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=lifecycle):map[%!f(string=postStart):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-install.sh) %!f(string=--cni-exclusive=true)]]] %!f(string=preStop):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-uninstall.sh)]]]] %!f(string=livenessProbe):map[%!f(string=failureThreshold):10.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=cilium-agent) %!f(string=readinessProbe):map[%!f(string=failureThreshold):3.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=startupProbe):map[%!f(string=failureThreshold):105.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):2.000000 %!f(string=successThreshold):<nil>] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)] map[%!f(string=mountPath):%!f(string=/host/etc/cni/net.d) %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=mountPath):%!f(string=/var/lib/cilium/clustermesh) %!f(string=name):%!f(string=clustermesh-secrets) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/lib/modules) %!f(string=name):%!f(string=lib-modules) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/run/xtables.lock) %!f(string=name):%!f(string=xtables-lock)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=initContainers):[map[%!f(string=command):[%!f(string=/install-plugin.sh)] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=install-cni-binaries) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=10Mi)]] %!f(string=securityContext):map[%!f(string=capabilities):map[%!f(string=drop):[%!f(string=ALL)]]] %!f(string=terminationMessagePath):%!f(string=/dev/termination-log) %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/host/opt/cni/bin) %!f(string=name):%!f(string=cni-path)]]] map[%!f(string=command):[%!f(string=/init-container.sh)] %!f(string=env):[map[%!f(string=name):%!f(string=CILIUM_ALL_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_BPF_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-bpf-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=clean-cilium-state) %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=100Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=100Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/run/cilium/cgroupv2) %!f(string=mountPropagation):%!f(string=HostToContainer) %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)]]]] %!f(string=priorityClassName):%!f(string=system-node-critical) %!f(string=restartPolicy):%!f(string=Always) %!f(string=serviceAccount):%!f(string=cilium) %!f(string=serviceAccountName):%!f(string=cilium) %!f(string=terminationGracePeriodSeconds):1.000000 %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/run/cilium) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cilium-run)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/sys/fs/bpf) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/opt/cni/bin) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cni-path)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/cilium/cgroupv2) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/cni/net.d) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/lib/modules)] %!f(string=name):%!f(string=lib-modules)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/xtables.lock) %!f(string=type):%!f(string=FileOrCreate)] %!f(string=name):%!f(string=xtables-lock)] map[%!f(string=name):%!f(string=clustermesh-secrets) %!f(string=secret):map[%!f(string=defaultMode):420.000000 %!f(string=optional):%!f(bool=true) %!f(string=secretName):%!f(string=cilium-clustermesh)]] map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]]]] %!f(string=updateStrategy):map[%!f(string=type):%!f(string=OnDelete)]]]
I0406 14:25:30.452576 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-app):%!f(string=cilium) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:30.452586 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-app):%!f(string=cilium) %!f(string=kubernetes.io/cluster-service):%!f(string=true) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:30.452591 745188 visitor.go:44] object value at spec: map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map)] %!f(string=command):[%!f(string=cilium-agent)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_CLUSTERMESH_CONFIG) %!f(string=value):%!f(string=/var/lib/cilium/clustermesh/)] map[%!f(string=name):%!f(string=CILIUM_CNI_CHAINING_MODE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=cni-chaining-mode) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_CUSTOM_CNI_CONF) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=custom-cni-conf) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=lifecycle):map[%!f(string=postStart):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-install.sh) %!f(string=--cni-exclusive=true)]]] %!f(string=preStop):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-uninstall.sh)]]]] %!f(string=livenessProbe):map[%!f(string=failureThreshold):10.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=cilium-agent) %!f(string=readinessProbe):map[%!f(string=failureThreshold):3.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=startupProbe):map[%!f(string=failureThreshold):105.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):2.000000 %!f(string=successThreshold):<nil>] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)] map[%!f(string=mountPath):%!f(string=/host/etc/cni/net.d) %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=mountPath):%!f(string=/var/lib/cilium/clustermesh) %!f(string=name):%!f(string=clustermesh-secrets) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/lib/modules) %!f(string=name):%!f(string=lib-modules) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/run/xtables.lock) %!f(string=name):%!f(string=xtables-lock)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=initContainers):[map[%!f(string=command):[%!f(string=/install-plugin.sh)] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=install-cni-binaries) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=10Mi)]] %!f(string=securityContext):map[%!f(string=capabilities):map[%!f(string=drop):[%!f(string=ALL)]]] %!f(string=terminationMessagePath):%!f(string=/dev/termination-log) %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/host/opt/cni/bin) %!f(string=name):%!f(string=cni-path)]]] map[%!f(string=command):[%!f(string=/init-container.sh)] %!f(string=env):[map[%!f(string=name):%!f(string=CILIUM_ALL_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_BPF_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-bpf-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=clean-cilium-state) %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=100Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=100Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/run/cilium/cgroupv2) %!f(string=mountPropagation):%!f(string=HostToContainer) %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)]]]] %!f(string=priorityClassName):%!f(string=system-node-critical) %!f(string=restartPolicy):%!f(string=Always) %!f(string=serviceAccount):%!f(string=cilium) %!f(string=serviceAccountName):%!f(string=cilium) %!f(string=terminationGracePeriodSeconds):1.000000 %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/run/cilium) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cilium-run)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/sys/fs/bpf) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/opt/cni/bin) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cni-path)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/cilium/cgroupv2) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/cni/net.d) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/lib/modules)] %!f(string=name):%!f(string=lib-modules)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/xtables.lock) %!f(string=type):%!f(string=FileOrCreate)] %!f(string=name):%!f(string=xtables-lock)] map[%!f(string=name):%!f(string=clustermesh-secrets) %!f(string=secret):map[%!f(string=defaultMode):420.000000 %!f(string=optional):%!f(bool=true) %!f(string=secretName):%!f(string=cilium-clustermesh)]] map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]]]] %!f(string=updateStrategy):map[%!f(string=type):%!f(string=OnDelete)]]
I0406 14:25:30.452707 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]]
I0406 14:25:30.452711 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]
I0406 14:25:30.452714 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map)] %!f(string=command):[%!f(string=cilium-agent)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_CLUSTERMESH_CONFIG) %!f(string=value):%!f(string=/var/lib/cilium/clustermesh/)] map[%!f(string=name):%!f(string=CILIUM_CNI_CHAINING_MODE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=cni-chaining-mode) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_CUSTOM_CNI_CONF) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=custom-cni-conf) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=lifecycle):map[%!f(string=postStart):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-install.sh) %!f(string=--cni-exclusive=true)]]] %!f(string=preStop):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-uninstall.sh)]]]] %!f(string=livenessProbe):map[%!f(string=failureThreshold):10.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=cilium-agent) %!f(string=readinessProbe):map[%!f(string=failureThreshold):3.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=startupProbe):map[%!f(string=failureThreshold):105.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):2.000000 %!f(string=successThreshold):<nil>] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)] map[%!f(string=mountPath):%!f(string=/host/etc/cni/net.d) %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=mountPath):%!f(string=/var/lib/cilium/clustermesh) %!f(string=name):%!f(string=clustermesh-secrets) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/lib/modules) %!f(string=name):%!f(string=lib-modules) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/run/xtables.lock) %!f(string=name):%!f(string=xtables-lock)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=initContainers):[map[%!f(string=command):[%!f(string=/install-plugin.sh)] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=install-cni-binaries) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=10Mi)]] %!f(string=securityContext):map[%!f(string=capabilities):map[%!f(string=drop):[%!f(string=ALL)]]] %!f(string=terminationMessagePath):%!f(string=/dev/termination-log) %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/host/opt/cni/bin) %!f(string=name):%!f(string=cni-path)]]] map[%!f(string=command):[%!f(string=/init-container.sh)] %!f(string=env):[map[%!f(string=name):%!f(string=CILIUM_ALL_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_BPF_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-bpf-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=clean-cilium-state) %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=100Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=100Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/run/cilium/cgroupv2) %!f(string=mountPropagation):%!f(string=HostToContainer) %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)]]]] %!f(string=priorityClassName):%!f(string=system-node-critical) %!f(string=restartPolicy):%!f(string=Always) %!f(string=serviceAccount):%!f(string=cilium) %!f(string=serviceAccountName):%!f(string=cilium) %!f(string=terminationGracePeriodSeconds):1.000000 %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/run/cilium) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cilium-run)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/sys/fs/bpf) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/opt/cni/bin) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cni-path)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/cilium/cgroupv2) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/cni/net.d) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/lib/modules)] %!f(string=name):%!f(string=lib-modules)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/xtables.lock) %!f(string=type):%!f(string=FileOrCreate)] %!f(string=name):%!f(string=xtables-lock)] map[%!f(string=name):%!f(string=clustermesh-secrets) %!f(string=secret):map[%!f(string=defaultMode):420.000000 %!f(string=optional):%!f(bool=true) %!f(string=secretName):%!f(string=cilium-clustermesh)]] map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]]]]
I0406 14:25:30.452820 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]]
I0406 14:25:30.452825 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=k8s-app):%!f(string=cilium) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=kubernetes.io/cluster-service):%!f(string=true)]
I0406 14:25:30.452829 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map)] %!f(string=command):[%!f(string=cilium-agent)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_CLUSTERMESH_CONFIG) %!f(string=value):%!f(string=/var/lib/cilium/clustermesh/)] map[%!f(string=name):%!f(string=CILIUM_CNI_CHAINING_MODE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=cni-chaining-mode) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_CUSTOM_CNI_CONF) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=custom-cni-conf) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=lifecycle):map[%!f(string=postStart):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-install.sh) %!f(string=--cni-exclusive=true)]]] %!f(string=preStop):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-uninstall.sh)]]]] %!f(string=livenessProbe):map[%!f(string=failureThreshold):10.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=cilium-agent) %!f(string=readinessProbe):map[%!f(string=failureThreshold):3.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=startupProbe):map[%!f(string=failureThreshold):105.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):2.000000 %!f(string=successThreshold):<nil>] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)] map[%!f(string=mountPath):%!f(string=/host/etc/cni/net.d) %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=mountPath):%!f(string=/var/lib/cilium/clustermesh) %!f(string=name):%!f(string=clustermesh-secrets) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/lib/modules) %!f(string=name):%!f(string=lib-modules) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/run/xtables.lock) %!f(string=name):%!f(string=xtables-lock)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=initContainers):[map[%!f(string=command):[%!f(string=/install-plugin.sh)] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=install-cni-binaries) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=10Mi)]] %!f(string=securityContext):map[%!f(string=capabilities):map[%!f(string=drop):[%!f(string=ALL)]]] %!f(string=terminationMessagePath):%!f(string=/dev/termination-log) %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/host/opt/cni/bin) %!f(string=name):%!f(string=cni-path)]]] map[%!f(string=command):[%!f(string=/init-container.sh)] %!f(string=env):[map[%!f(string=name):%!f(string=CILIUM_ALL_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_BPF_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-bpf-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=clean-cilium-state) %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=100Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=100Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/run/cilium/cgroupv2) %!f(string=mountPropagation):%!f(string=HostToContainer) %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)]]]] %!f(string=priorityClassName):%!f(string=system-node-critical) %!f(string=restartPolicy):%!f(string=Always) %!f(string=serviceAccount):%!f(string=cilium) %!f(string=serviceAccountName):%!f(string=cilium) %!f(string=terminationGracePeriodSeconds):1.000000 %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/run/cilium) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cilium-run)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/sys/fs/bpf) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/opt/cni/bin) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cni-path)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/cilium/cgroupv2) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/cni/net.d) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/lib/modules)] %!f(string=name):%!f(string=lib-modules)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/xtables.lock) %!f(string=type):%!f(string=FileOrCreate)] %!f(string=name):%!f(string=xtables-lock)] map[%!f(string=name):%!f(string=clustermesh-secrets) %!f(string=secret):map[%!f(string=defaultMode):420.000000 %!f(string=optional):%!f(bool=true) %!f(string=secretName):%!f(string=cilium-clustermesh)]] map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]]]
I0406 14:25:30.452957 745188 visitor.go:39] float64 value at spec.template.spec.terminationGracePeriodSeconds: 1.000000
I0406 14:25:30.452963 745188 visitor.go:44] object value at spec.template.spec.volumes.[0]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/run/cilium) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cilium-run)]
I0406 14:25:30.452969 745188 visitor.go:44] object value at spec.template.spec.volumes.[0].hostPath: map[%!f(string=path):%!f(string=/var/run/cilium) %!f(string=type):%!f(string=DirectoryOrCreate)]
I0406 14:25:30.452973 745188 visitor.go:44] object value at spec.template.spec.volumes.[1]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/sys/fs/bpf) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=bpf-maps)]
I0406 14:25:30.452979 745188 visitor.go:44] object value at spec.template.spec.volumes.[1].hostPath: map[%!f(string=path):%!f(string=/sys/fs/bpf) %!f(string=type):%!f(string=DirectoryOrCreate)]
I0406 14:25:30.452983 745188 visitor.go:44] object value at spec.template.spec.volumes.[2]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/opt/cni/bin) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=cni-path)]
I0406 14:25:30.452988 745188 visitor.go:44] object value at spec.template.spec.volumes.[2].hostPath: map[%!f(string=path):%!f(string=/opt/cni/bin) %!f(string=type):%!f(string=DirectoryOrCreate)]
I0406 14:25:30.452995 745188 visitor.go:44] object value at spec.template.spec.volumes.[3]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/cilium/cgroupv2) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=cilium-cgroup)]
I0406 14:25:30.453001 745188 visitor.go:44] object value at spec.template.spec.volumes.[3].hostPath: map[%!f(string=path):%!f(string=/run/cilium/cgroupv2) %!f(string=type):%!f(string=Directory)]
I0406 14:25:30.453006 745188 visitor.go:44] object value at spec.template.spec.volumes.[4]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/cni/net.d) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=etc-cni-netd)]
I0406 14:25:30.453027 745188 visitor.go:44] object value at spec.template.spec.volumes.[4].hostPath: map[%!f(string=path):%!f(string=/etc/cni/net.d) %!f(string=type):%!f(string=DirectoryOrCreate)]
I0406 14:25:30.453053 745188 visitor.go:44] object value at spec.template.spec.volumes.[5]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/lib/modules)] %!f(string=name):%!f(string=lib-modules)]
I0406 14:25:30.453058 745188 visitor.go:44] object value at spec.template.spec.volumes.[5].hostPath: map[%!f(string=path):%!f(string=/lib/modules)]
I0406 14:25:30.453062 745188 visitor.go:44] object value at spec.template.spec.volumes.[6]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/run/xtables.lock) %!f(string=type):%!f(string=FileOrCreate)] %!f(string=name):%!f(string=xtables-lock)]
I0406 14:25:30.453067 745188 visitor.go:44] object value at spec.template.spec.volumes.[6].hostPath: map[%!f(string=path):%!f(string=/run/xtables.lock) %!f(string=type):%!f(string=FileOrCreate)]
I0406 14:25:30.453072 745188 visitor.go:44] object value at spec.template.spec.volumes.[7]: map[%!f(string=name):%!f(string=clustermesh-secrets) %!f(string=secret):map[%!f(string=defaultMode):420.000000 %!f(string=optional):%!f(bool=true) %!f(string=secretName):%!f(string=cilium-clustermesh)]]
I0406 14:25:30.453080 745188 visitor.go:44] object value at spec.template.spec.volumes.[7].secret: map[%!f(string=defaultMode):420.000000 %!f(string=optional):%!f(bool=true) %!f(string=secretName):%!f(string=cilium-clustermesh)]
I0406 14:25:30.453086 745188 visitor.go:39] float64 value at spec.template.spec.volumes.[7].secret.defaultMode: 420.000000
I0406 14:25:30.453090 745188 visitor.go:34] string value at spec.template.spec.volumes.[7].secret.optional: true
I0406 14:25:30.453131 745188 visitor.go:44] object value at spec.template.spec.volumes.[8]: map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]
I0406 14:25:30.453142 745188 visitor.go:44] object value at spec.template.spec.volumes.[8].configMap: map[%!f(string=name):%!f(string=cilium-config)]
I0406 14:25:30.453145 745188 visitor.go:44] object value at spec.template.spec.affinity: map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]]
I0406 14:25:30.453154 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity: map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]
I0406 14:25:30.453159 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution: map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]
I0406 14:25:30.453167 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]
I0406 14:25:30.453175 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[0]: map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]
I0406 14:25:30.453185 745188 visitor.go:34] string value at spec.template.spec.hostNetwork: true
I0406 14:25:30.453189 745188 visitor.go:44] object value at spec.template.spec.initContainers.[0]: map[%!f(string=command):[%!f(string=/install-plugin.sh)] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=install-cni-binaries) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=10Mi)]] %!f(string=securityContext):map[%!f(string=capabilities):map[%!f(string=drop):[%!f(string=ALL)]]] %!f(string=terminationMessagePath):%!f(string=/dev/termination-log) %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/host/opt/cni/bin) %!f(string=name):%!f(string=cni-path)]]]
I0406 14:25:30.453203 745188 visitor.go:44] object value at spec.template.spec.initContainers.[0].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/host/opt/cni/bin) %!f(string=name):%!f(string=cni-path)]
I0406 14:25:30.453212 745188 images.go:59] Consider image for re-mapping: "quay.io/cilium/cilium:v1.13.10"
I0406 14:25:31.132473 745188 visitor.go:44] object value at spec.template.spec.initContainers.[0].resources: map[%!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=10Mi)]]
I0406 14:25:31.132551 745188 visitor.go:44] object value at spec.template.spec.initContainers.[0].resources.requests: map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=10Mi)]
I0406 14:25:31.132559 745188 visitor.go:44] object value at spec.template.spec.initContainers.[0].securityContext: map[%!f(string=capabilities):map[%!f(string=drop):[%!f(string=ALL)]]]
I0406 14:25:31.132566 745188 visitor.go:44] object value at spec.template.spec.initContainers.[0].securityContext.capabilities: map[%!f(string=drop):[%!f(string=ALL)]]
I0406 14:25:31.132573 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1]: map[%!f(string=command):[%!f(string=/init-container.sh)] %!f(string=env):[map[%!f(string=name):%!f(string=CILIUM_ALL_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_BPF_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-bpf-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=clean-cilium-state) %!f(string=resources):map[%!f(string=limits):map[%!f(string=memory):%!f(string=100Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=100Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/run/cilium/cgroupv2) %!f(string=mountPropagation):%!f(string=HostToContainer) %!f(string=name):%!f(string=cilium-cgroup)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)]]]
I0406 14:25:31.132605 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].env.[0]: map[%!f(string=name):%!f(string=CILIUM_ALL_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]
I0406 14:25:31.132612 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].env.[0].valueFrom: map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]
I0406 14:25:31.132618 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].env.[0].valueFrom.configMapKeyRef: map[%!f(string=key):%!f(string=clean-cilium-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]
I0406 14:25:31.132624 745188 visitor.go:34] string value at spec.template.spec.initContainers.[1].env.[0].valueFrom.configMapKeyRef.optional: true
I0406 14:25:31.132628 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].env.[1]: map[%!f(string=name):%!f(string=CILIUM_BPF_STATE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-bpf-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]
I0406 14:25:31.132634 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].env.[1].valueFrom: map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=clean-cilium-bpf-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]
I0406 14:25:31.132639 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].env.[1].valueFrom.configMapKeyRef: map[%!f(string=key):%!f(string=clean-cilium-bpf-state) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]
I0406 14:25:31.132644 745188 visitor.go:34] string value at spec.template.spec.initContainers.[1].env.[1].valueFrom.configMapKeyRef.optional: true
I0406 14:25:31.132647 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].securityContext: map[%!f(string=privileged):%!f(bool=true)]
I0406 14:25:31.132653 745188 visitor.go:34] string value at spec.template.spec.initContainers.[1].securityContext.privileged: true
I0406 14:25:31.132659 745188 images.go:59] Consider image for re-mapping: "quay.io/cilium/cilium:v1.13.10"
I0406 14:25:31.747317 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].resources: map[%!f(string=limits):map[%!f(string=memory):%!f(string=100Mi)] %!f(string=requests):map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=100Mi)]]
I0406 14:25:31.747413 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].resources.limits: map[%!f(string=memory):%!f(string=100Mi)]
I0406 14:25:31.747424 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].resources.requests: map[%!f(string=cpu):%!f(string=100m) %!f(string=memory):%!f(string=100Mi)]
I0406 14:25:31.747433 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=name):%!f(string=bpf-maps)]
I0406 14:25:31.747437 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].volumeMounts.[1]: map[%!f(string=mountPath):%!f(string=/run/cilium/cgroupv2) %!f(string=mountPropagation):%!f(string=HostToContainer) %!f(string=name):%!f(string=cilium-cgroup)]
I0406 14:25:31.747442 745188 visitor.go:44] object value at spec.template.spec.initContainers.[1].volumeMounts.[2]: map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)]
I0406 14:25:31.747449 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=operator):%!f(string=Exists)]
I0406 14:25:31.747452 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map)] %!f(string=command):[%!f(string=cilium-agent)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_CLUSTERMESH_CONFIG) %!f(string=value):%!f(string=/var/lib/cilium/clustermesh/)] map[%!f(string=name):%!f(string=CILIUM_CNI_CHAINING_MODE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=cni-chaining-mode) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=CILIUM_CUSTOM_CNI_CONF) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=custom-cni-conf) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/cilium:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=lifecycle):map[%!f(string=postStart):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-install.sh) %!f(string=--cni-exclusive=true)]]] %!f(string=preStop):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-uninstall.sh)]]]] %!f(string=livenessProbe):map[%!f(string=failureThreshold):10.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=name):%!f(string=cilium-agent) %!f(string=readinessProbe):map[%!f(string=failureThreshold):3.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000] %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true)] %!f(string=startupProbe):map[%!f(string=failureThreshold):105.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):2.000000 %!f(string=successThreshold):<nil>] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=bpf-maps)] map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)] map[%!f(string=mountPath):%!f(string=/host/etc/cni/net.d) %!f(string=name):%!f(string=etc-cni-netd)] map[%!f(string=mountPath):%!f(string=/var/lib/cilium/clustermesh) %!f(string=name):%!f(string=clustermesh-secrets) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/lib/modules) %!f(string=name):%!f(string=lib-modules) %!f(string=readOnly):%!f(bool=true)] map[%!f(string=mountPath):%!f(string=/run/xtables.lock) %!f(string=name):%!f(string=xtables-lock)]]]
I0406 14:25:31.747702 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources: map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]]
I0406 14:25:31.747721 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.requests: map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]
I0406 14:25:31.747727 745188 visitor.go:44] object value at spec.template.spec.containers.[0].startupProbe: map[%!f(string=failureThreshold):105.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):2.000000 %!f(string=successThreshold):<nil>]
I0406 14:25:31.747740 745188 visitor.go:44] object value at spec.template.spec.containers.[0].startupProbe.httpGet: map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)]
I0406 14:25:31.747752 745188 visitor.go:44] object value at spec.template.spec.containers.[0].startupProbe.httpGet.httpHeaders.[0]: map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]
I0406 14:25:31.747757 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].startupProbe.httpGet.port: 9879.000000
I0406 14:25:31.747762 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].startupProbe.periodSeconds: 2.000000
I0406 14:25:31.747765 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].startupProbe.failureThreshold: 105.000000
I0406 14:25:31.747769 745188 visitor.go:44] object value at spec.template.spec.containers.[0].securityContext: map[%!f(string=privileged):%!f(bool=true)]
I0406 14:25:31.747776 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.privileged: true
I0406 14:25:31.747780 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/sys/fs/bpf) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=bpf-maps)]
I0406 14:25:31.747790 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[1]: map[%!f(string=mountPath):%!f(string=/var/run/cilium) %!f(string=name):%!f(string=cilium-run)]
I0406 14:25:31.747796 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[2]: map[%!f(string=mountPath):%!f(string=/host/etc/cni/net.d) %!f(string=name):%!f(string=etc-cni-netd)]
I0406 14:25:31.747805 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[3]: map[%!f(string=mountPath):%!f(string=/var/lib/cilium/clustermesh) %!f(string=name):%!f(string=clustermesh-secrets) %!f(string=readOnly):%!f(bool=true)]
I0406 14:25:31.747812 745188 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[3].readOnly: true
I0406 14:25:31.747816 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[4]: map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)]
I0406 14:25:31.747821 745188 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[4].readOnly: true
I0406 14:25:31.747824 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[5]: map[%!f(string=mountPath):%!f(string=/lib/modules) %!f(string=name):%!f(string=lib-modules) %!f(string=readOnly):%!f(bool=true)]
I0406 14:25:31.747834 745188 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[5].readOnly: true
I0406 14:25:31.747838 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[6]: map[%!f(string=mountPath):%!f(string=/run/xtables.lock) %!f(string=name):%!f(string=xtables-lock)]
I0406 14:25:31.747849 745188 images.go:59] Consider image for re-mapping: "quay.io/cilium/cilium:v1.13.10"
I0406 14:25:32.550943 745188 visitor.go:44] object value at spec.template.spec.containers.[0].lifecycle: map[%!f(string=postStart):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-install.sh) %!f(string=--cni-exclusive=true)]]] %!f(string=preStop):map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-uninstall.sh)]]]]
I0406 14:25:32.551008 745188 visitor.go:44] object value at spec.template.spec.containers.[0].lifecycle.postStart: map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-install.sh) %!f(string=--cni-exclusive=true)]]]
I0406 14:25:32.551023 745188 visitor.go:44] object value at spec.template.spec.containers.[0].lifecycle.postStart.exec: map[%!f(string=command):[%!f(string=/cni-install.sh) %!f(string=--cni-exclusive=true)]]
I0406 14:25:32.551030 745188 visitor.go:44] object value at spec.template.spec.containers.[0].lifecycle.preStop: map[%!f(string=exec):map[%!f(string=command):[%!f(string=/cni-uninstall.sh)]]]
I0406 14:25:32.551033 745188 visitor.go:44] object value at spec.template.spec.containers.[0].lifecycle.preStop.exec: map[%!f(string=command):[%!f(string=/cni-uninstall.sh)]]
I0406 14:25:32.551036 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe: map[%!f(string=failureThreshold):10.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000]
I0406 14:25:32.551051 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.periodSeconds: 30.000000
I0406 14:25:32.551054 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000
I0406 14:25:32.551056 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000
I0406 14:25:32.551058 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 10.000000
I0406 14:25:32.551060 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe.httpGet: map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)]
I0406 14:25:32.551067 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe.httpGet.httpHeaders.[0]: map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]
I0406 14:25:32.551073 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 9879.000000
I0406 14:25:32.551075 745188 visitor.go:44] object value at spec.template.spec.containers.[0].readinessProbe: map[%!f(string=failureThreshold):3.000000 %!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):5.000000 %!f(string=periodSeconds):30.000000 %!f(string=successThreshold):1.000000 %!f(string=timeoutSeconds):5.000000]
I0406 14:25:32.551084 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.failureThreshold: 3.000000
I0406 14:25:32.551086 745188 visitor.go:44] object value at spec.template.spec.containers.[0].readinessProbe.httpGet: map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=httpHeaders):[map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]] %!f(string=path):%!f(string=/healthz) %!f(string=port):9879.000000 %!f(string=scheme):%!f(string=HTTP)]
I0406 14:25:32.551091 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 9879.000000
I0406 14:25:32.551094 745188 visitor.go:44] object value at spec.template.spec.containers.[0].readinessProbe.httpGet.httpHeaders.[0]: map[%!f(string=name):%!f(string=brief) %!f(string=value):%!f(string=true)]
I0406 14:25:32.551100 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 5.000000
I0406 14:25:32.551103 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.periodSeconds: 30.000000
I0406 14:25:32.551105 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.successThreshold: 1.000000
I0406 14:25:32.551107 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000
I0406 14:25:32.551111 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0]: map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]]
I0406 14:25:32.551119 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0].valueFrom: map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]
I0406 14:25:32.551125 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0].valueFrom.fieldRef: map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]
I0406 14:25:32.551131 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1]: map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]]
I0406 14:25:32.551139 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom: map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]
I0406 14:25:32.551144 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom.fieldRef: map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]
I0406 14:25:32.551148 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2]: map[%!f(string=name):%!f(string=CILIUM_CLUSTERMESH_CONFIG) %!f(string=value):%!f(string=/var/lib/cilium/clustermesh/)]
I0406 14:25:32.551151 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[3]: map[%!f(string=name):%!f(string=CILIUM_CNI_CHAINING_MODE) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=cni-chaining-mode) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]
I0406 14:25:32.551159 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[3].valueFrom: map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=cni-chaining-mode) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]
I0406 14:25:32.551165 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[3].valueFrom.configMapKeyRef: map[%!f(string=key):%!f(string=cni-chaining-mode) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]
I0406 14:25:32.551172 745188 visitor.go:34] string value at spec.template.spec.containers.[0].env.[3].valueFrom.configMapKeyRef.optional: true
I0406 14:25:32.551175 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[4]: map[%!f(string=name):%!f(string=CILIUM_CUSTOM_CNI_CONF) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=custom-cni-conf) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]
I0406 14:25:32.551186 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[4].valueFrom: map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=custom-cni-conf) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]
I0406 14:25:32.551192 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[4].valueFrom.configMapKeyRef: map[%!f(string=key):%!f(string=custom-cni-conf) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]
I0406 14:25:32.551200 745188 visitor.go:34] string value at spec.template.spec.containers.[0].env.[4].valueFrom.configMapKeyRef.optional: true
I0406 14:25:32.551203 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[5]: map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)]
I0406 14:25:32.551208 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[6]: map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]
I0406 14:25:32.551213 745188 visitor.go:44] object value at spec.updateStrategy: map[%!f(string=type):%!f(string=OnDelete)]
I0406 14:25:32.551220 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=Deployment) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=replicas):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=strategy):map[%!f(string=rollingUpdate):map[%!f(string=maxSurge):1.000000 %!f(string=maxUnavailable):1.000000] %!f(string=type):%!f(string=RollingUpdate)] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map) %!f(string=--debug=$(CILIUM_DEBUG)) %!f(string=--eni-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=command):[%!f(string=cilium-operator)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_DEBUG) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=debug) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/operator:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=path):%!f(string=/healthz) %!f(string=port):9234.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=cilium-operator) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=restartPolicy):%!f(string=Always) %!f(string=serviceAccount):%!f(string=cilium-operator) %!f(string=serviceAccountName):%!f(string=cilium-operator) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]]]]]]
I0406 14:25:32.551353 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:32.551368 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:32.551376 745188 visitor.go:44] object value at spec: map[%!f(string=replicas):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=strategy):map[%!f(string=rollingUpdate):map[%!f(string=maxSurge):1.000000 %!f(string=maxUnavailable):1.000000] %!f(string=type):%!f(string=RollingUpdate)] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map) %!f(string=--debug=$(CILIUM_DEBUG)) %!f(string=--eni-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=command):[%!f(string=cilium-operator)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_DEBUG) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=debug) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/operator:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=path):%!f(string=/healthz) %!f(string=port):9234.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=cilium-operator) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=restartPolicy):%!f(string=Always) %!f(string=serviceAccount):%!f(string=cilium-operator) %!f(string=serviceAccountName):%!f(string=cilium-operator) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]]]]]
I0406 14:25:32.551444 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]]
I0406 14:25:32.551451 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]
I0406 14:25:32.551457 745188 visitor.go:44] object value at spec.strategy: map[%!f(string=rollingUpdate):map[%!f(string=maxSurge):1.000000 %!f(string=maxUnavailable):1.000000] %!f(string=type):%!f(string=RollingUpdate)]
I0406 14:25:32.551464 745188 visitor.go:44] object value at spec.strategy.rollingUpdate: map[%!f(string=maxSurge):1.000000 %!f(string=maxUnavailable):1.000000]
I0406 14:25:32.551470 745188 visitor.go:39] float64 value at spec.strategy.rollingUpdate.maxSurge: 1.000000
I0406 14:25:32.551473 745188 visitor.go:39] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 1.000000
I0406 14:25:32.551476 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map) %!f(string=--debug=$(CILIUM_DEBUG)) %!f(string=--eni-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=command):[%!f(string=cilium-operator)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_DEBUG) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=debug) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/operator:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=path):%!f(string=/healthz) %!f(string=port):9234.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=cilium-operator) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=restartPolicy):%!f(string=Always) %!f(string=serviceAccount):%!f(string=cilium-operator) %!f(string=serviceAccountName):%!f(string=cilium-operator) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]]]]
I0406 14:25:32.551566 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map) %!f(string=--debug=$(CILIUM_DEBUG)) %!f(string=--eni-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=command):[%!f(string=cilium-operator)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_DEBUG) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=debug) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/operator:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=path):%!f(string=/healthz) %!f(string=port):9234.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=cilium-operator) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=restartPolicy):%!f(string=Always) %!f(string=serviceAccount):%!f(string=cilium-operator) %!f(string=serviceAccountName):%!f(string=cilium-operator) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]] %!f(string=volumes):[map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]]]
I0406 14:25:32.551626 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=args):[%!f(string=--config-dir=/tmp/cilium/config-map) %!f(string=--debug=$(CILIUM_DEBUG)) %!f(string=--eni-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>)] %!f(string=command):[%!f(string=cilium-operator)] %!f(string=env):[map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]] map[%!f(string=name):%!f(string=CILIUM_DEBUG) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=debug) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)] map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]] %!f(string=image):%!f(string=quay.io/cilium/operator:v1.13.10) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=path):%!f(string=/healthz) %!f(string=port):9234.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=cilium-operator) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]] %!f(string=terminationMessagePolicy):%!f(string=FallbackToLogsOnError) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)]]]
I0406 14:25:32.551649 745188 images.go:59] Consider image for re-mapping: "quay.io/cilium/operator:v1.13.10"
I0406 14:25:33.139223 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe: map[%!f(string=httpGet):map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=path):%!f(string=/healthz) %!f(string=port):9234.000000 %!f(string=scheme):%!f(string=HTTP)] %!f(string=initialDelaySeconds):60.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000]
I0406 14:25:33.139297 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.periodSeconds: 10.000000
I0406 14:25:33.139305 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 3.000000
I0406 14:25:33.139310 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe.httpGet: map[%!f(string=host):%!f(string=127.0.0.1) %!f(string=path):%!f(string=/healthz) %!f(string=port):9234.000000 %!f(string=scheme):%!f(string=HTTP)]
I0406 14:25:33.139320 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 9234.000000
I0406 14:25:33.139323 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000
I0406 14:25:33.139329 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/tmp/cilium/config-map) %!f(string=name):%!f(string=cilium-config-path) %!f(string=readOnly):%!f(bool=true)]
I0406 14:25:33.139345 745188 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[0].readOnly: true
I0406 14:25:33.139352 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0]: map[%!f(string=name):%!f(string=K8S_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]]
I0406 14:25:33.139361 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0].valueFrom: map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]
I0406 14:25:33.139372 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0].valueFrom.fieldRef: map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]
I0406 14:25:33.139378 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1]: map[%!f(string=name):%!f(string=CILIUM_K8S_NAMESPACE) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]]
I0406 14:25:33.139385 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom: map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]]
I0406 14:25:33.139391 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom.fieldRef: map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=metadata.namespace)]
I0406 14:25:33.139396 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2]: map[%!f(string=name):%!f(string=CILIUM_DEBUG) %!f(string=valueFrom):map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=debug) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]]
I0406 14:25:33.139404 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2].valueFrom: map[%!f(string=configMapKeyRef):map[%!f(string=key):%!f(string=debug) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]]
I0406 14:25:33.139412 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2].valueFrom.configMapKeyRef: map[%!f(string=key):%!f(string=debug) %!f(string=name):%!f(string=cilium-config) %!f(string=optional):%!f(bool=true)]
I0406 14:25:33.139419 745188 visitor.go:34] string value at spec.template.spec.containers.[0].env.[2].valueFrom.configMapKeyRef.optional: true
I0406 14:25:33.139423 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[3]: map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>)]
I0406 14:25:33.139428 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[4]: map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_PORT) %!f(string=value):%!f(string=443)]
I0406 14:25:33.139433 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources: map[%!f(string=requests):map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]]
I0406 14:25:33.139439 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.requests: map[%!f(string=cpu):%!f(string=25m) %!f(string=memory):%!f(string=128Mi)]
I0406 14:25:33.139446 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0]: map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]
I0406 14:25:33.139457 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0].labelSelector: map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]]
I0406 14:25:33.139462 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0].labelSelector.matchLabels: map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]
I0406 14:25:33.139467 745188 visitor.go:39] float64 value at spec.template.spec.topologySpreadConstraints.[0].maxSkew: 1.000000
I0406 14:25:33.139471 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1]: map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]
I0406 14:25:33.139515 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1].labelSelector: map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]]
I0406 14:25:33.139522 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1].labelSelector.matchLabels: map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]
I0406 14:25:33.139527 745188 visitor.go:39] float64 value at spec.template.spec.topologySpreadConstraints.[1].maxSkew: 1.000000
I0406 14:25:33.139532 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=operator):%!f(string=Exists)]
I0406 14:25:33.139536 745188 visitor.go:44] object value at spec.template.spec.affinity: map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]]
I0406 14:25:33.139548 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity: map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]
I0406 14:25:33.139558 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution: map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]
I0406 14:25:33.139568 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:33.139573 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:33.139584 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:33.139604 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:33.139608 745188 visitor.go:34] string value at spec.template.spec.hostNetwork: true
I0406 14:25:33.139610 745188 visitor.go:44] object value at spec.template.spec.volumes.[0]: map[%!f(string=configMap):map[%!f(string=name):%!f(string=cilium-config)] %!f(string=name):%!f(string=cilium-config-path)]
I0406 14:25:33.139635 745188 visitor.go:44] object value at spec.template.spec.volumes.[0].configMap: map[%!f(string=name):%!f(string=cilium-config)]
I0406 14:25:33.139638 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=name):%!f(string=cilium-operator)]]
I0406 14:25:33.139642 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=kops.k8s.io/managed-by):%!f(string=kops) %!f(string=name):%!f(string=cilium-operator)]
I0406 14:25:33.139647 745188 visitor.go:39] float64 value at spec.replicas: 1.000000
I0406 14:25:33.139651 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=policy/v1) %!f(string=kind):%!f(string=PodDisruptionBudget) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=maxUnavailable):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]]]]
I0406 14:25:33.139664 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator) %!f(string=role.kubernetes.io/networking):%!f(string=1)] %!f(string=name):%!f(string=cilium-operator) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.139673 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=networking.cilium.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator) %!f(string=role.kubernetes.io/networking):%!f(string=1)]
I0406 14:25:33.139683 745188 visitor.go:44] object value at spec: map[%!f(string=maxUnavailable):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]]]
I0406 14:25:33.139707 745188 visitor.go:39] float64 value at spec.maxUnavailable: 1.000000
I0406 14:25:33.139710 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]]
I0406 14:25:33.139715 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=io.cilium/app):%!f(string=operator) %!f(string=name):%!f(string=cilium-operator)]
I0406 14:25:33.142838 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
role.kubernetes.io/networking: "1"
name: cilium
namespace: kube-system
---
apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
role.kubernetes.io/networking: "1"
name: cilium-operator
namespace: kube-system
---
apiVersion: v1
data:
agent-health-port: "9879"
auto-direct-node-routes: "false"
bpf-ct-global-any-max: "262144"
bpf-ct-global-tcp-max: "524288"
bpf-lb-algorithm: random
bpf-lb-maglev-table-size: "16381"
bpf-lb-map-max: "65536"
bpf-lb-sock-hostns-only: "false"
bpf-nat-global-max: "524288"
bpf-neigh-global-max: "524288"
bpf-policy-map-max: "16384"
cgroup-root: /run/cilium/cgroupv2
cluster-name: default
debug: "false"
disable-cnp-status-updates: "true"
disable-endpoint-crd: "false"
enable-bpf-masquerade: "false"
enable-endpoint-health-checking: "true"
enable-ipv4: "true"
enable-ipv4-masquerade: "true"
enable-ipv6: "false"
enable-ipv6-masquerade: "false"
enable-l7-proxy: "true"
enable-node-port: "true"
enable-remote-node-identity: "true"
enable-service-topology: "false"
enable-unreachable-routes: "false"
identity-allocation-mode: crd
identity-change-grace-period: 5s
install-iptables-rules: "true"
ipam: kubernetes
kube-proxy-replacement: strict
monitor-aggregation: medium
nodes-gc-interval: 5m0s
preallocate-bpf-maps: "false"
sidecar-istio-proxy-image: cilium/istio_proxy
tofqdns-dns-reject-response-code: refused
tofqdns-enable-poller: "false"
tunnel: vxlan
kind: ConfigMap
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
role.kubernetes.io/networking: "1"
name: cilium-config
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
role.kubernetes.io/networking: "1"
name: cilium
rules:
- apiGroups:
- networking.k8s.io
resources:
- networkpolicies
verbs:
- get
- list
- watch
- apiGroups:
- discovery.k8s.io
resources:
- endpointslices
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- namespaces
- services
- pods
- endpoints
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
verbs:
- list
- watch
- get
- apiGroups:
- cilium.io
resources:
- ciliumloadbalancerippools
- ciliumbgppeeringpolicies
- ciliumclusterwideenvoyconfigs
- ciliumclusterwidenetworkpolicies
- ciliumegressgatewaypolicies
- ciliumegressnatpolicies
- ciliumendpoints
- ciliumendpointslices
- ciliumenvoyconfigs
- ciliumidentities
- ciliumlocalredirectpolicies
- ciliumnetworkpolicies
- ciliumnodes
verbs:
- list
- watch
- apiGroups:
- cilium.io
resources:
- ciliumidentities
- ciliumendpoints
- ciliumnodes
verbs:
- create
- apiGroups:
- cilium.io
resources:
- ciliumidentities
verbs:
- update
- apiGroups:
- cilium.io
resources:
- ciliumendpoints
verbs:
- delete
- get
- apiGroups:
- cilium.io
resources:
- ciliumnodes
- ciliumnodes/status
verbs:
- get
- update
- apiGroups:
- cilium.io
resources:
- ciliumnetworkpolicies/status
- ciliumclusterwidenetworkpolicies/status
- ciliumendpoints/status
- ciliumendpoints
verbs:
- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
role.kubernetes.io/networking: "1"
name: cilium-operator
rules:
- apiGroups:
- ""
resources:
- pods
verbs:
- get
- list
- watch
- apiGroups:
- discovery.k8s.io
resources:
- endpointslices
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- services
- endpoints
- namespaces
verbs:
- get
- list
- watch
- apiGroups:
- cilium.io
resources:
- ciliumnetworkpolicies
- ciliumclusterwidenetworkpolicies
verbs:
- create
- update
- deletecollection
- patch
- get
- list
- watch
- apiGroups:
- cilium.io
resources:
- ciliumnetworkpolicies/status
- ciliumclusterwidenetworkpolicies/status
verbs:
- patch
- update
- apiGroups:
- cilium.io
resources:
- ciliumendpoints
- ciliumidentities
verbs:
- delete
- list
- watch
- apiGroups:
- cilium.io
resources:
- ciliumidentities
verbs:
- update
- apiGroups:
- cilium.io
resources:
- ciliumnodes
verbs:
- create
- update
- get
- list
- watch
- delete
- apiGroups:
- cilium.io
resources:
- ciliumnodes/status
verbs:
- update
- apiGroups:
- cilium.io
resources:
- ciliumendpointslices
- ciliumenvoyconfigs
verbs:
- create
- update
- get
- list
- watch
- delete
- patch
- apiGroups:
- apiextensions.k8s.io
resources:
- customresourcedefinitions
verbs:
- create
- get
- list
- watch
- apiGroups:
- apiextensions.k8s.io
resourceNames:
- ciliumloadbalancerippools.cilium.io
- ciliumbgppeeringpolicies.cilium.io
- ciliumclusterwideenvoyconfigs.cilium.io
- ciliumclusterwidenetworkpolicies.cilium.io
- ciliumegressgatewaypolicies.cilium.io
- ciliumegressnatpolicies.cilium.io
- ciliumendpoints.cilium.io
- ciliumendpointslices.cilium.io
- ciliumenvoyconfigs.cilium.io
- ciliumexternalworkloads.cilium.io
- ciliumidentities.cilium.io
- ciliumlocalredirectpolicies.cilium.io
- ciliumnetworkpolicies.cilium.io
- ciliumnodes.cilium.io
resources:
- customresourcedefinitions
verbs:
- update
- apiGroups:
- cilium.io
resources:
- ciliumloadbalancerippools
verbs:
- get
- list
- watch
- apiGroups:
- cilium.io
resources:
- ciliumloadbalancerippools/status
verbs:
- patch
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- create
- get
- update
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
role.kubernetes.io/networking: "1"
name: cilium
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cilium
subjects:
- kind: ServiceAccount
name: cilium
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
role.kubernetes.io/networking: "1"
name: cilium-operator
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cilium-operator
subjects:
- kind: ServiceAccount
name: cilium-operator
namespace: kube-system
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
k8s-app: cilium
kubernetes.io/cluster-service: "true"
role.kubernetes.io/networking: "1"
name: cilium
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: cilium
kubernetes.io/cluster-service: "true"
template:
metadata:
creationTimestamp: null
labels:
k8s-app: cilium
kops.k8s.io/managed-by: kops
kubernetes.io/cluster-service: "true"
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: kubernetes.io/os
operator: In
values:
- linux
containers:
- args:
- --config-dir=/tmp/cilium/config-map
command:
- cilium-agent
env:
- name: K8S_NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
- name: CILIUM_K8S_NAMESPACE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
- name: CILIUM_CLUSTERMESH_CONFIG
value: /var/lib/cilium/clustermesh/
- name: CILIUM_CNI_CHAINING_MODE
valueFrom:
configMapKeyRef:
key: cni-chaining-mode
name: cilium-config
optional: true
- name: CILIUM_CUSTOM_CNI_CONF
valueFrom:
configMapKeyRef:
key: custom-cni-conf
name: cilium-config
optional: true
- name: KUBERNETES_SERVICE_HOST
value: api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/cilium:v1.13.10@sha256:aff23a5d4daf06623d10f7ff6a8a7b617c22c1f8d63f507fd33ef3a80ba4779f
imagePullPolicy: IfNotPresent
lifecycle:
postStart:
exec:
command:
- /cni-install.sh
- --cni-exclusive=true
preStop:
exec:
command:
- /cni-uninstall.sh
livenessProbe:
failureThreshold: 10
httpGet:
host: 127.0.0.1
httpHeaders:
- name: brief
value: "true"
path: /healthz
port: 9879
scheme: HTTP
periodSeconds: 30
successThreshold: 1
timeoutSeconds: 5
name: cilium-agent
readinessProbe:
failureThreshold: 3
httpGet:
host: 127.0.0.1
httpHeaders:
- name: brief
value: "true"
path: /healthz
port: 9879
scheme: HTTP
initialDelaySeconds: 5
periodSeconds: 30
successThreshold: 1
timeoutSeconds: 5
resources:
requests:
cpu: 25m
memory: 128Mi
securityContext:
privileged: true
startupProbe:
failureThreshold: 105
httpGet:
host: 127.0.0.1
httpHeaders:
- name: brief
value: "true"
path: /healthz
port: 9879
scheme: HTTP
periodSeconds: 2
successThreshold: null
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /sys/fs/bpf
mountPropagation: Bidirectional
name: bpf-maps
- mountPath: /var/run/cilium
name: cilium-run
- mountPath: /host/etc/cni/net.d
name: etc-cni-netd
- mountPath: /var/lib/cilium/clustermesh
name: clustermesh-secrets
readOnly: true
- mountPath: /tmp/cilium/config-map
name: cilium-config-path
readOnly: true
- mountPath: /lib/modules
name: lib-modules
readOnly: true
- mountPath: /run/xtables.lock
name: xtables-lock
hostNetwork: true
initContainers:
- command:
- /install-plugin.sh
image: quay.io/cilium/cilium:v1.13.10@sha256:aff23a5d4daf06623d10f7ff6a8a7b617c22c1f8d63f507fd33ef3a80ba4779f
imagePullPolicy: IfNotPresent
name: install-cni-binaries
resources:
requests:
cpu: 100m
memory: 10Mi
securityContext:
capabilities:
drop:
- ALL
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /host/opt/cni/bin
name: cni-path
- command:
- /init-container.sh
env:
- name: CILIUM_ALL_STATE
valueFrom:
configMapKeyRef:
key: clean-cilium-state
name: cilium-config
optional: true
- name: CILIUM_BPF_STATE
valueFrom:
configMapKeyRef:
key: clean-cilium-bpf-state
name: cilium-config
optional: true
image: quay.io/cilium/cilium:v1.13.10@sha256:aff23a5d4daf06623d10f7ff6a8a7b617c22c1f8d63f507fd33ef3a80ba4779f
imagePullPolicy: IfNotPresent
name: clean-cilium-state
resources:
limits:
memory: 100Mi
requests:
cpu: 100m
memory: 100Mi
securityContext:
privileged: true
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /sys/fs/bpf
name: bpf-maps
- mountPath: /run/cilium/cgroupv2
mountPropagation: HostToContainer
name: cilium-cgroup
- mountPath: /var/run/cilium
name: cilium-run
priorityClassName: system-node-critical
restartPolicy: Always
serviceAccount: cilium
serviceAccountName: cilium
terminationGracePeriodSeconds: 1
tolerations:
- operator: Exists
volumes:
- hostPath:
path: /var/run/cilium
type: DirectoryOrCreate
name: cilium-run
- hostPath:
path: /sys/fs/bpf
type: DirectoryOrCreate
name: bpf-maps
- hostPath:
path: /opt/cni/bin
type: DirectoryOrCreate
name: cni-path
- hostPath:
path: /run/cilium/cgroupv2
type: Directory
name: cilium-cgroup
- hostPath:
path: /etc/cni/net.d
type: DirectoryOrCreate
name: etc-cni-netd
- hostPath:
path: /lib/modules
name: lib-modules
- hostPath:
path: /run/xtables.lock
type: FileOrCreate
name: xtables-lock
- name: clustermesh-secrets
secret:
defaultMode: 420
optional: true
secretName: cilium-clustermesh
- configMap:
name: cilium-config
name: cilium-config-path
updateStrategy:
type: OnDelete
---
apiVersion: apps/v1
kind: Deployment
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
io.cilium/app: operator
name: cilium-operator
role.kubernetes.io/networking: "1"
name: cilium-operator
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
io.cilium/app: operator
name: cilium-operator
strategy:
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
type: RollingUpdate
template:
metadata:
creationTimestamp: null
labels:
io.cilium/app: operator
kops.k8s.io/managed-by: kops
name: cilium-operator
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
containers:
- args:
- --config-dir=/tmp/cilium/config-map
- --debug=$(CILIUM_DEBUG)
- --eni-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>
command:
- cilium-operator
env:
- name: K8S_NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
- name: CILIUM_K8S_NAMESPACE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
- name: CILIUM_DEBUG
valueFrom:
configMapKeyRef:
key: debug
name: cilium-config
optional: true
- name: KUBERNETES_SERVICE_HOST
value: api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>
- name: KUBERNETES_SERVICE_PORT
value: "443"
image: quay.io/cilium/operator:v1.13.10@sha256:1b51da9c4fa162f2efe470a3e8a0128ebbdb48821d7dd818216b063b89e06705
imagePullPolicy: IfNotPresent
livenessProbe:
httpGet:
host: 127.0.0.1
path: /healthz
port: 9234
scheme: HTTP
initialDelaySeconds: 60
periodSeconds: 10
timeoutSeconds: 3
name: cilium-operator
resources:
requests:
cpu: 25m
memory: 128Mi
terminationMessagePolicy: FallbackToLogsOnError
volumeMounts:
- mountPath: /tmp/cilium/config-map
name: cilium-config-path
readOnly: true
hostNetwork: true
nodeSelector: null
priorityClassName: system-cluster-critical
restartPolicy: Always
serviceAccount: cilium-operator
serviceAccountName: cilium-operator
tolerations:
- operator: Exists
topologySpreadConstraints:
- labelSelector:
matchLabels:
io.cilium/app: operator
name: cilium-operator
maxSkew: 1
topologyKey: topology.kubernetes.io/zone
whenUnsatisfiable: ScheduleAnyway
- labelSelector:
matchLabels:
io.cilium/app: operator
name: cilium-operator
maxSkew: 1
topologyKey: kubernetes.io/hostname
whenUnsatisfiable: DoNotSchedule
volumes:
- configMap:
name: cilium-config
name: cilium-config-path
---
apiVersion: policy/v1
kind: PodDisruptionBudget
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: networking.cilium.io
app.kubernetes.io/managed-by: kops
io.cilium/app: operator
name: cilium-operator
role.kubernetes.io/networking: "1"
name: cilium-operator
namespace: kube-system
spec:
maxUnavailable: 1
selector:
matchLabels:
io.cilium/app: operator
name: cilium-operator
I0406 14:25:33.142929 745188 bootstrapchannelbuilder.go:149] hash ce35e02470be471f779f3ae75ec071eb574551b97d20970c225d59f171db218c
I0406 14:25:33.142940 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-aws-cloud-controller.addons.k8s.io-k8s-1.18"
I0406 14:25:33.143127 745188 build_flags.go:49] ignoring non-field:
I0406 14:25:33.143152 745188 build_flags.go:49] ignoring non-field:
I0406 14:25:33.143162 745188 build_flags.go:54] not writing field with no flag tag: Image
I0406 14:25:33.143165 745188 build_flags.go:49] ignoring non-field: Image
I0406 14:25:33.143171 745188 build_flags.go:49] ignoring non-field: AllowUntaggedCloud
I0406 14:25:33.143179 745188 build_flags.go:49] ignoring non-field: Controllers
I0406 14:25:33.143182 745188 build_flags.go:54] not writing field with no flag tag: LeaderElection
I0406 14:25:33.143184 745188 build_flags.go:49] ignoring non-field: LeaderElection
I0406 14:25:33.143187 745188 build_flags.go:49] ignoring non-field: LeaderElection
I0406 14:25:33.143192 745188 build_flags.go:49] ignoring non-field: LeaderElection.LeaderElectLeaseDuration
I0406 14:25:33.143195 745188 build_flags.go:49] ignoring non-field: LeaderElection.LeaderElectRenewDeadlineDuration
I0406 14:25:33.143201 745188 build_flags.go:49] ignoring non-field: LeaderElection.LeaderElectRetryPeriod
I0406 14:25:33.143204 745188 build_flags.go:49] ignoring non-field: UseServiceAccountCredentials
I0406 14:25:33.143207 745188 build_flags.go:49] ignoring non-field: EnableLeaderMigration
I0406 14:25:33.143210 745188 build_flags.go:54] not writing field with no flag tag: CPURequest
I0406 14:25:33.143214 745188 build_flags.go:49] ignoring non-field: CPURequest
I0406 14:25:33.143217 745188 build_flags.go:49] ignoring non-field: NodeStatusUpdateFrequency
I0406 14:25:33.145871 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=DaemonSet) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=aws-cloud-controller-manager)] %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--allocate-node-cidrs=true) %!f(string=--cluster-cidr=100.96.0.0/11) %!f(string=--cluster-name=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--configure-cloud-routes=false) %!f(string=--leader-elect=true) %!f(string=--v=2) %!f(string=--cloud-provider=aws) %!f(string=--use-service-account-credentials=true) %!f(string=--cloud-config=/etc/kubernetes/cloud.config)] %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=200m)]] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/cloud.config) %!f(string=name):%!f(string=cloudconfig) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=aws-cloud-controller-manager) %!f(string=tolerations):[map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=value):%!f(string=true)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.kubernetes.io/not-ready)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/control-plane)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/master)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/cloud.config) %!f(string=type):%!f(string=)] %!f(string=name):%!f(string=cloudconfig)]]]] %!f(string=updateStrategy):map[%!f(string=type):%!f(string=RollingUpdate)]]]
I0406 14:25:33.145941 745188 visitor.go:44] object value at spec: map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--allocate-node-cidrs=true) %!f(string=--cluster-cidr=100.96.0.0/11) %!f(string=--cluster-name=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--configure-cloud-routes=false) %!f(string=--leader-elect=true) %!f(string=--v=2) %!f(string=--cloud-provider=aws) %!f(string=--use-service-account-credentials=true) %!f(string=--cloud-config=/etc/kubernetes/cloud.config)] %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=200m)]] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/cloud.config) %!f(string=name):%!f(string=cloudconfig) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=aws-cloud-controller-manager) %!f(string=tolerations):[map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=value):%!f(string=true)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.kubernetes.io/not-ready)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/control-plane)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/master)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/cloud.config) %!f(string=type):%!f(string=)] %!f(string=name):%!f(string=cloudconfig)]]]] %!f(string=updateStrategy):map[%!f(string=type):%!f(string=RollingUpdate)]]
I0406 14:25:33.145969 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager)]]
I0406 14:25:33.145974 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager)]
I0406 14:25:33.145977 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--allocate-node-cidrs=true) %!f(string=--cluster-cidr=100.96.0.0/11) %!f(string=--cluster-name=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--configure-cloud-routes=false) %!f(string=--leader-elect=true) %!f(string=--v=2) %!f(string=--cloud-provider=aws) %!f(string=--use-service-account-credentials=true) %!f(string=--cloud-config=/etc/kubernetes/cloud.config)] %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=200m)]] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/cloud.config) %!f(string=name):%!f(string=cloudconfig) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=aws-cloud-controller-manager) %!f(string=tolerations):[map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=value):%!f(string=true)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.kubernetes.io/not-ready)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/control-plane)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/master)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/cloud.config) %!f(string=type):%!f(string=)] %!f(string=name):%!f(string=cloudconfig)]]]]
I0406 14:25:33.146000 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]]
I0406 14:25:33.146004 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=k8s-app):%!f(string=aws-cloud-controller-manager) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]
I0406 14:25:33.146008 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=--allocate-node-cidrs=true) %!f(string=--cluster-cidr=100.96.0.0/11) %!f(string=--cluster-name=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--configure-cloud-routes=false) %!f(string=--leader-elect=true) %!f(string=--v=2) %!f(string=--cloud-provider=aws) %!f(string=--use-service-account-credentials=true) %!f(string=--cloud-config=/etc/kubernetes/cloud.config)] %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=200m)]] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/cloud.config) %!f(string=name):%!f(string=cloudconfig) %!f(string=readOnly):%!f(bool=true)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=serviceAccountName):%!f(string=aws-cloud-controller-manager) %!f(string=tolerations):[map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=value):%!f(string=true)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.kubernetes.io/not-ready)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/control-plane)] map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/master)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/cloud.config) %!f(string=type):%!f(string=)] %!f(string=name):%!f(string=cloudconfig)]]]
I0406 14:25:33.146029 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.cloudprovider.kubernetes.io/uninitialized) %!f(string=value):%!f(string=true)]
I0406 14:25:33.146033 745188 visitor.go:44] object value at spec.template.spec.tolerations.[1]: map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node.kubernetes.io/not-ready)]
I0406 14:25:33.146036 745188 visitor.go:44] object value at spec.template.spec.tolerations.[2]: map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/control-plane)]
I0406 14:25:33.146039 745188 visitor.go:44] object value at spec.template.spec.tolerations.[3]: map[%!f(string=effect):%!f(string=NoSchedule) %!f(string=key):%!f(string=node-role.kubernetes.io/master)]
I0406 14:25:33.146042 745188 visitor.go:44] object value at spec.template.spec.volumes.[0]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/etc/kubernetes/cloud.config) %!f(string=type):%!f(string=)] %!f(string=name):%!f(string=cloudconfig)]
I0406 14:25:33.146046 745188 visitor.go:44] object value at spec.template.spec.volumes.[0].hostPath: map[%!f(string=path):%!f(string=/etc/kubernetes/cloud.config) %!f(string=type):%!f(string=)]
I0406 14:25:33.146049 745188 visitor.go:44] object value at spec.template.spec.affinity: map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]]
I0406 14:25:33.146055 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity: map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]]
I0406 14:25:33.146061 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution: map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]]]
I0406 14:25:33.146067 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:33.146071 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:33.146074 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]]]
I0406 14:25:33.146079 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:33.146083 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=args):[%!f(string=--allocate-node-cidrs=true) %!f(string=--cluster-cidr=100.96.0.0/11) %!f(string=--cluster-name=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--configure-cloud-routes=false) %!f(string=--leader-elect=true) %!f(string=--v=2) %!f(string=--cloud-provider=aws) %!f(string=--use-service-account-credentials=true) %!f(string=--cloud-config=/etc/kubernetes/cloud.config)] %!f(string=env):[map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=resources):map[%!f(string=requests):map[%!f(string=cpu):%!f(string=200m)]] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/etc/kubernetes/cloud.config) %!f(string=name):%!f(string=cloudconfig) %!f(string=readOnly):%!f(bool=true)]]]
I0406 14:25:33.146092 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1"
I0406 14:25:33.686240 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources: map[%!f(string=requests):map[%!f(string=cpu):%!f(string=200m)]]
I0406 14:25:33.686284 745188 visitor.go:44] object value at spec.template.spec.containers.[0].resources.requests: map[%!f(string=cpu):%!f(string=200m)]
I0406 14:25:33.686292 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/etc/kubernetes/cloud.config) %!f(string=name):%!f(string=cloudconfig) %!f(string=readOnly):%!f(bool=true)]
I0406 14:25:33.686303 745188 visitor.go:34] string value at spec.template.spec.containers.[0].volumeMounts.[0].readOnly: true
I0406 14:25:33.686312 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0]: map[%!f(string=name):%!f(string=KUBERNETES_SERVICE_HOST) %!f(string=value):%!f(string=127.0.0.1)]
I0406 14:25:33.686317 745188 visitor.go:34] string value at spec.template.spec.hostNetwork: true
I0406 14:25:33.686320 745188 visitor.go:44] object value at spec.updateStrategy: map[%!f(string=type):%!f(string=RollingUpdate)]
I0406 14:25:33.686325 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=aws-cloud-controller-manager)] %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.686332 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=k8s-app):%!f(string=aws-cloud-controller-manager)]
I0406 14:25:33.686339 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)] %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:33.686346 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)] %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.686352 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)]
I0406 14:25:33.686358 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=RoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)] %!f(string=name):%!f(string=cloud-controller-manager:apiserver-authentication-reader) %!f(string=namespace):%!f(string=kube-system)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=Role) %!f(string=name):%!f(string=extension-apiserver-authentication-reader)] %!f(string=subjects):[map[%!f(string=apiGroup):%!f(string=) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:33.686382 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)] %!f(string=name):%!f(string=cloud-controller-manager:apiserver-authentication-reader) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.686389 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)]
I0406 14:25:33.686394 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=Role) %!f(string=name):%!f(string=extension-apiserver-authentication-reader)]
I0406 14:25:33.686401 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=apiGroup):%!f(string=) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.686407 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)] %!f(string=name):%!f(string=system:cloud-controller-manager)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=create) %!f(string=patch) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=*)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes/status)] %!f(string=verbs):[%!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=services)] %!f(string=verbs):[%!f(string=list) %!f(string=patch) %!f(string=update) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=services/status)] %!f(string=verbs):[%!f(string=list) %!f(string=patch) %!f(string=update) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=serviceaccounts)] %!f(string=verbs):[%!f(string=create) %!f(string=get)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=update) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=endpoints)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=coordination.k8s.io)] %!f(string=resources):[%!f(string=leases)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=secrets)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resourceNames):[%!f(string=node-controller) %!f(string=service-controller) %!f(string=route-controller)] %!f(string=resources):[%!f(string=serviceaccounts/token)] %!f(string=verbs):[%!f(string=create)]]]]
I0406 14:25:33.686449 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)] %!f(string=name):%!f(string=system:cloud-controller-manager)]
I0406 14:25:33.686456 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)]
I0406 14:25:33.686462 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=create) %!f(string=patch) %!f(string=update)]]
I0406 14:25:33.686469 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=*)]]
I0406 14:25:33.686475 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes/status)] %!f(string=verbs):[%!f(string=patch)]]
I0406 14:25:33.686480 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=services)] %!f(string=verbs):[%!f(string=list) %!f(string=patch) %!f(string=update) %!f(string=watch)]]
I0406 14:25:33.686488 745188 visitor.go:44] object value at rules.[4]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=services/status)] %!f(string=verbs):[%!f(string=list) %!f(string=patch) %!f(string=update) %!f(string=watch)]]
I0406 14:25:33.686494 745188 visitor.go:44] object value at rules.[5]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=serviceaccounts)] %!f(string=verbs):[%!f(string=create) %!f(string=get)]]
I0406 14:25:33.686502 745188 visitor.go:44] object value at rules.[6]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=update) %!f(string=watch)]]
I0406 14:25:33.686510 745188 visitor.go:44] object value at rules.[7]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=endpoints)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update)]]
I0406 14:25:33.686518 745188 visitor.go:44] object value at rules.[8]: map[%!f(string=apiGroups):[%!f(string=coordination.k8s.io)] %!f(string=resources):[%!f(string=leases)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update)]]
I0406 14:25:33.686527 745188 visitor.go:44] object value at rules.[9]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=secrets)] %!f(string=verbs):[%!f(string=list) %!f(string=watch)]]
I0406 14:25:33.686534 745188 visitor.go:44] object value at rules.[10]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resourceNames):[%!f(string=node-controller) %!f(string=service-controller) %!f(string=route-controller)] %!f(string=resources):[%!f(string=serviceaccounts/token)] %!f(string=verbs):[%!f(string=create)]]
I0406 14:25:33.686543 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)] %!f(string=name):%!f(string=system:cloud-controller-manager)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=system:cloud-controller-manager)] %!f(string=subjects):[map[%!f(string=apiGroup):%!f(string=) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:33.686560 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)] %!f(string=name):%!f(string=system:cloud-controller-manager)]
I0406 14:25:33.686569 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-cloud-controller.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=k8s-addon):%!f(string=aws-cloud-controller.addons.k8s.io)]
I0406 14:25:33.686575 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=system:cloud-controller-manager)]
I0406 14:25:33.686581 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=apiGroup):%!f(string=) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=aws-cloud-controller-manager) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.687503 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: apps/v1
kind: DaemonSet
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: aws-cloud-controller.addons.k8s.io
k8s-app: aws-cloud-controller-manager
name: aws-cloud-controller-manager
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: aws-cloud-controller-manager
template:
metadata:
creationTimestamp: null
labels:
k8s-app: aws-cloud-controller-manager
kops.k8s.io/managed-by: kops
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
containers:
- args:
- --allocate-node-cidrs=true
- --cluster-cidr=100.96.0.0/11
- --cluster-name=bug-report-cluster-public.<DOMAIN_REDACTED>
- --configure-cloud-routes=false
- --leader-elect=true
- --v=2
- --cloud-provider=aws
- --use-service-account-credentials=true
- --cloud-config=/etc/kubernetes/cloud.config
env:
- name: KUBERNETES_SERVICE_HOST
value: 127.0.0.1
image: registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1@sha256:79b423ac8bc52d00f932b40de11fc3047a5ed1cbec47cda23bcf8f45ef583ed1
imagePullPolicy: IfNotPresent
name: aws-cloud-controller-manager
resources:
requests:
cpu: 200m
volumeMounts:
- mountPath: /etc/kubernetes/cloud.config
name: cloudconfig
readOnly: true
hostNetwork: true
nodeSelector: null
priorityClassName: system-cluster-critical
serviceAccountName: aws-cloud-controller-manager
tolerations:
- effect: NoSchedule
key: node.cloudprovider.kubernetes.io/uninitialized
value: "true"
- effect: NoSchedule
key: node.kubernetes.io/not-ready
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
- effect: NoSchedule
key: node-role.kubernetes.io/master
volumes:
- hostPath:
path: /etc/kubernetes/cloud.config
type: ""
name: cloudconfig
updateStrategy:
type: RollingUpdate
---
apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: aws-cloud-controller.addons.k8s.io
name: aws-cloud-controller-manager
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: aws-cloud-controller.addons.k8s.io
name: cloud-controller-manager:apiserver-authentication-reader
namespace: kube-system
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: extension-apiserver-authentication-reader
subjects:
- apiGroup: ""
kind: ServiceAccount
name: aws-cloud-controller-manager
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: aws-cloud-controller.addons.k8s.io
name: system:cloud-controller-manager
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- update
- apiGroups:
- ""
resources:
- nodes
verbs:
- '*'
- apiGroups:
- ""
resources:
- nodes/status
verbs:
- patch
- apiGroups:
- ""
resources:
- services
verbs:
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- services/status
verbs:
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- serviceaccounts
verbs:
- create
- get
- apiGroups:
- ""
resources:
- persistentvolumes
verbs:
- get
- list
- update
- watch
- apiGroups:
- ""
resources:
- endpoints
verbs:
- create
- get
- list
- watch
- update
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- create
- get
- list
- watch
- update
- apiGroups:
- ""
resources:
- secrets
verbs:
- list
- watch
- apiGroups:
- ""
resourceNames:
- node-controller
- service-controller
- route-controller
resources:
- serviceaccounts/token
verbs:
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io
app.kubernetes.io/managed-by: kops
k8s-addon: aws-cloud-controller.addons.k8s.io
name: system:cloud-controller-manager
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:cloud-controller-manager
subjects:
- apiGroup: ""
kind: ServiceAccount
name: aws-cloud-controller-manager
namespace: kube-system
I0406 14:25:33.687550 745188 bootstrapchannelbuilder.go:149] hash 49af10ff6b4256cc742b24c25e8a8429f12c0c3bd9bc433eed65d63094fff3e6
I0406 14:25:33.687582 745188 bootstrapchannelbuilder.go:120] Addon "bug-report-cluster-public.<DOMAIN_REDACTED>-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17"
I0406 14:25:33.698896 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:33.698956 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.698966 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.698972 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-external-attacher-role)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=csi.storage.k8s.io)] %!f(string=resources):[%!f(string=csinodeinfos)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=volumeattachments)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=volumeattachments/status)] %!f(string=verbs):[%!f(string=patch)]]]]
I0406 14:25:33.698991 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-external-attacher-role)]
I0406 14:25:33.698997 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699003 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update) %!f(string=patch)]]
I0406 14:25:33.699011 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699017 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=csi.storage.k8s.io)] %!f(string=resources):[%!f(string=csinodeinfos)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699021 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=volumeattachments)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update) %!f(string=patch)]]
I0406 14:25:33.699028 745188 visitor.go:44] object value at rules.[4]: map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=volumeattachments/status)] %!f(string=verbs):[%!f(string=patch)]]
I0406 14:25:33.699032 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-external-provisioner-role)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=create) %!f(string=delete)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumeclaims)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update)]] map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=storageclasses)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=list) %!f(string=watch) %!f(string=create) %!f(string=update) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshots)] %!f(string=verbs):[%!f(string=get) %!f(string=list)]] map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshotcontents)] %!f(string=verbs):[%!f(string=get) %!f(string=list)]] map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=csinodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=coordination.k8s.io)] %!f(string=resources):[%!f(string=leases)] %!f(string=verbs):[%!f(string=get) %!f(string=watch) %!f(string=list) %!f(string=delete) %!f(string=update) %!f(string=create)]] map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=volumeattachments)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]]]
I0406 14:25:33.699068 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-external-provisioner-role)]
I0406 14:25:33.699076 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699084 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=create) %!f(string=delete)]]
I0406 14:25:33.699092 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumeclaims)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update)]]
I0406 14:25:33.699101 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=storageclasses)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699107 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=list) %!f(string=watch) %!f(string=create) %!f(string=update) %!f(string=patch)]]
I0406 14:25:33.699118 745188 visitor.go:44] object value at rules.[4]: map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshots)] %!f(string=verbs):[%!f(string=get) %!f(string=list)]]
I0406 14:25:33.699126 745188 visitor.go:44] object value at rules.[5]: map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshotcontents)] %!f(string=verbs):[%!f(string=get) %!f(string=list)]]
I0406 14:25:33.699133 745188 visitor.go:44] object value at rules.[6]: map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=csinodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699139 745188 visitor.go:44] object value at rules.[7]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699145 745188 visitor.go:44] object value at rules.[8]: map[%!f(string=apiGroups):[%!f(string=coordination.k8s.io)] %!f(string=resources):[%!f(string=leases)] %!f(string=verbs):[%!f(string=get) %!f(string=watch) %!f(string=list) %!f(string=delete) %!f(string=update) %!f(string=create)]]
I0406 14:25:33.699154 745188 visitor.go:44] object value at rules.[9]: map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=volumeattachments)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699161 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-external-resizer-role)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumeclaims)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumeclaims/status)] %!f(string=verbs):[%!f(string=update) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=storageclasses)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=list) %!f(string=watch) %!f(string=create) %!f(string=update) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=pods)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]]]
I0406 14:25:33.699192 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-external-resizer-role)]
I0406 14:25:33.699200 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699208 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumes)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update) %!f(string=patch)]]
I0406 14:25:33.699217 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumeclaims)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699224 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=persistentvolumeclaims/status)] %!f(string=verbs):[%!f(string=update) %!f(string=patch)]]
I0406 14:25:33.699233 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=storage.k8s.io)] %!f(string=resources):[%!f(string=storageclasses)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699242 745188 visitor.go:44] object value at rules.[4]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=list) %!f(string=watch) %!f(string=create) %!f(string=update) %!f(string=patch)]]
I0406 14:25:33.699252 745188 visitor.go:44] object value at rules.[5]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=pods)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699262 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-external-snapshotter-role)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=list) %!f(string=watch) %!f(string=create) %!f(string=update) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=secrets)] %!f(string=verbs):[%!f(string=get) %!f(string=list)]] map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshotclasses)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]] map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshotcontents)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update) %!f(string=delete) %!f(string=patch)]] map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshotcontents/status)] %!f(string=verbs):[%!f(string=update)]]]]
I0406 14:25:33.699321 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-external-snapshotter-role)]
I0406 14:25:33.699338 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699345 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=events)] %!f(string=verbs):[%!f(string=list) %!f(string=watch) %!f(string=create) %!f(string=update) %!f(string=patch)]]
I0406 14:25:33.699351 745188 visitor.go:44] object value at rules.[1]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=secrets)] %!f(string=verbs):[%!f(string=get) %!f(string=list)]]
I0406 14:25:33.699355 745188 visitor.go:44] object value at rules.[2]: map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshotclasses)] %!f(string=verbs):[%!f(string=get) %!f(string=list) %!f(string=watch)]]
I0406 14:25:33.699360 745188 visitor.go:44] object value at rules.[3]: map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshotcontents)] %!f(string=verbs):[%!f(string=create) %!f(string=get) %!f(string=list) %!f(string=watch) %!f(string=update) %!f(string=delete) %!f(string=patch)]]
I0406 14:25:33.699366 745188 visitor.go:44] object value at rules.[4]: map[%!f(string=apiGroups):[%!f(string=snapshot.storage.k8s.io)] %!f(string=resources):[%!f(string=volumesnapshotcontents/status)] %!f(string=verbs):[%!f(string=update)]]
I0406 14:25:33.699371 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-attacher-binding)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-external-attacher-role)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:33.699382 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.699386 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-attacher-binding)]
I0406 14:25:33.699394 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699402 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-external-attacher-role)]
I0406 14:25:33.699408 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-provisioner-binding)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-external-provisioner-role)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:33.699425 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.699431 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-provisioner-binding)]
I0406 14:25:33.699441 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699449 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-external-provisioner-role)]
I0406 14:25:33.699456 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-resizer-binding)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-external-resizer-role)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:33.699476 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-resizer-binding)]
I0406 14:25:33.699486 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699495 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-external-resizer-role)]
I0406 14:25:33.699502 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.699508 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-snapshotter-binding)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-external-snapshotter-role)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:33.699525 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-snapshotter-binding)]
I0406 14:25:33.699535 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699542 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-external-snapshotter-role)]
I0406 14:25:33.699548 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-controller-sa) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.699553 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRoleBinding) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-node-getter-binding)] %!f(string=roleRef):map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-csi-node-role)] %!f(string=subjects):[map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-node-sa) %!f(string=namespace):%!f(string=kube-system)]]]
I0406 14:25:33.699570 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-node-getter-binding)]
I0406 14:25:33.699577 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699583 745188 visitor.go:44] object value at roleRef: map[%!f(string=apiGroup):%!f(string=rbac.authorization.k8s.io) %!f(string=kind):%!f(string=ClusterRole) %!f(string=name):%!f(string=ebs-csi-node-role)]
I0406 14:25:33.699589 745188 visitor.go:44] object value at subjects.[0]: map[%!f(string=kind):%!f(string=ServiceAccount) %!f(string=name):%!f(string=ebs-csi-node-sa) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.699594 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=rbac.authorization.k8s.io/v1) %!f(string=kind):%!f(string=ClusterRole) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-node-role)] %!f(string=rules):[map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get)]]]]
I0406 14:25:33.699608 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-node-role)]
I0406 14:25:33.699615 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699621 745188 visitor.go:44] object value at rules.[0]: map[%!f(string=apiGroups):[%!f(string=)] %!f(string=resources):[%!f(string=nodes)] %!f(string=verbs):[%!f(string=get)]]
I0406 14:25:33.699628 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=v1) %!f(string=kind):%!f(string=ServiceAccount) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-node-sa) %!f(string=namespace):%!f(string=kube-system)]]
I0406 14:25:33.699640 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-node-sa) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.699678 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699743 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=DaemonSet) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-node) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=args):[%!f(string=node) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--v=2)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:/csi/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/kubelet) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/dev) %!f(string=name):%!f(string=device-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/csi/csi.sock)] map[%!f(string=name):%!f(string=DRIVER_REG_SOCK_PATH) %!f(string=value):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=node-driver-registrar) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/registration) %!f(string=name):%!f(string=registration-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)]]]] %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-node-critical) %!f(string=securityContext):map[%!f(string=fsGroup):0.000000 %!f(string=runAsGroup):0.000000 %!f(string=runAsNonRoot):%!f(bool=false) %!f(string=runAsUser):0.000000] %!f(string=serviceAccountName):%!f(string=ebs-csi-node-sa) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins_registry/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=registration-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/dev) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=device-dir)]]]]]]
I0406 14:25:33.699863 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-node) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:33.699873 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:33.699880 745188 visitor.go:44] object value at spec: map[%!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=args):[%!f(string=node) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--v=2)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:/csi/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/kubelet) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/dev) %!f(string=name):%!f(string=device-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/csi/csi.sock)] map[%!f(string=name):%!f(string=DRIVER_REG_SOCK_PATH) %!f(string=value):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=node-driver-registrar) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/registration) %!f(string=name):%!f(string=registration-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)]]]] %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-node-critical) %!f(string=securityContext):map[%!f(string=fsGroup):0.000000 %!f(string=runAsGroup):0.000000 %!f(string=runAsNonRoot):%!f(bool=false) %!f(string=runAsUser):0.000000] %!f(string=serviceAccountName):%!f(string=ebs-csi-node-sa) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins_registry/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=registration-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/dev) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=device-dir)]]]]]
I0406 14:25:33.699961 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=containers):[map[%!f(string=args):[%!f(string=node) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--v=2)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:/csi/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/kubelet) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/dev) %!f(string=name):%!f(string=device-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/csi/csi.sock)] map[%!f(string=name):%!f(string=DRIVER_REG_SOCK_PATH) %!f(string=value):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=node-driver-registrar) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/registration) %!f(string=name):%!f(string=registration-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)]]]] %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-node-critical) %!f(string=securityContext):map[%!f(string=fsGroup):0.000000 %!f(string=runAsGroup):0.000000 %!f(string=runAsNonRoot):%!f(bool=false) %!f(string=runAsUser):0.000000] %!f(string=serviceAccountName):%!f(string=ebs-csi-node-sa) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins_registry/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=registration-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/dev) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=device-dir)]]]]
I0406 14:25:33.700076 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]]
I0406 14:25:33.700089 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]
I0406 14:25:33.700099 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=containers):[map[%!f(string=args):[%!f(string=node) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--v=2)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:/csi/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/kubelet) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/dev) %!f(string=name):%!f(string=device-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/csi/csi.sock)] map[%!f(string=name):%!f(string=DRIVER_REG_SOCK_PATH) %!f(string=value):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=node-driver-registrar) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/registration) %!f(string=name):%!f(string=registration-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)]]]] %!f(string=nodeSelector):map[%!f(string=kubernetes.io/os):%!f(string=linux)] %!f(string=priorityClassName):%!f(string=system-node-critical) %!f(string=securityContext):map[%!f(string=fsGroup):0.000000 %!f(string=runAsGroup):0.000000 %!f(string=runAsNonRoot):%!f(bool=false) %!f(string=runAsUser):0.000000] %!f(string=serviceAccountName):%!f(string=ebs-csi-node-sa) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=volumes):[map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins_registry/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=registration-dir)] map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/dev) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=device-dir)]]]
I0406 14:25:33.700162 745188 visitor.go:44] object value at spec.template.spec.securityContext: map[%!f(string=fsGroup):0.000000 %!f(string=runAsGroup):0.000000 %!f(string=runAsNonRoot):%!f(bool=false) %!f(string=runAsUser):0.000000]
I0406 14:25:33.700172 745188 visitor.go:34] string value at spec.template.spec.securityContext.runAsNonRoot: false
I0406 14:25:33.700175 745188 visitor.go:39] float64 value at spec.template.spec.securityContext.runAsUser: 0.000000
I0406 14:25:33.700177 745188 visitor.go:39] float64 value at spec.template.spec.securityContext.fsGroup: 0.000000
I0406 14:25:33.700179 745188 visitor.go:39] float64 value at spec.template.spec.securityContext.runAsGroup: 0.000000
I0406 14:25:33.700181 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=operator):%!f(string=Exists)]
I0406 14:25:33.700185 745188 visitor.go:44] object value at spec.template.spec.volumes.[0]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=kubelet-dir)]
I0406 14:25:33.700189 745188 visitor.go:44] object value at spec.template.spec.volumes.[0].hostPath: map[%!f(string=path):%!f(string=/var/lib/kubelet) %!f(string=type):%!f(string=Directory)]
I0406 14:25:33.700193 745188 visitor.go:44] object value at spec.template.spec.volumes.[1]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/) %!f(string=type):%!f(string=DirectoryOrCreate)] %!f(string=name):%!f(string=plugin-dir)]
I0406 14:25:33.700197 745188 visitor.go:44] object value at spec.template.spec.volumes.[1].hostPath: map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/) %!f(string=type):%!f(string=DirectoryOrCreate)]
I0406 14:25:33.700200 745188 visitor.go:44] object value at spec.template.spec.volumes.[2]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins_registry/) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=registration-dir)]
I0406 14:25:33.700203 745188 visitor.go:44] object value at spec.template.spec.volumes.[2].hostPath: map[%!f(string=path):%!f(string=/var/lib/kubelet/plugins_registry/) %!f(string=type):%!f(string=Directory)]
I0406 14:25:33.700206 745188 visitor.go:44] object value at spec.template.spec.volumes.[3]: map[%!f(string=hostPath):map[%!f(string=path):%!f(string=/dev) %!f(string=type):%!f(string=Directory)] %!f(string=name):%!f(string=device-dir)]
I0406 14:25:33.700210 745188 visitor.go:44] object value at spec.template.spec.volumes.[3].hostPath: map[%!f(string=path):%!f(string=/dev) %!f(string=type):%!f(string=Directory)]
I0406 14:25:33.700213 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=args):[%!f(string=node) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--v=2)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:/csi/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)]] %!f(string=securityContext):map[%!f(string=privileged):%!f(bool=true) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/kubelet) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=kubelet-dir)] map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/dev) %!f(string=name):%!f(string=device-dir)]]]
I0406 14:25:33.700232 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1"
I0406 14:25:34.255435 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/var/lib/kubelet) %!f(string=mountPropagation):%!f(string=Bidirectional) %!f(string=name):%!f(string=kubelet-dir)]
I0406 14:25:34.255477 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[1]: map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)]
I0406 14:25:34.255487 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[2]: map[%!f(string=mountPath):%!f(string=/dev) %!f(string=name):%!f(string=device-dir)]
I0406 14:25:34.255495 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe: map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000]
I0406 14:25:34.255535 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 3.000000
I0406 14:25:34.255538 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I0406 14:25:34.255540 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe.httpGet: map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)]
I0406 14:25:34.255543 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 10.000000
I0406 14:25:34.255545 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.periodSeconds: 10.000000
I0406 14:25:34.255547 745188 visitor.go:44] object value at spec.template.spec.containers.[0].ports.[0]: map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:34.255552 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 9808.000000
I0406 14:25:34.255554 745188 visitor.go:44] object value at spec.template.spec.containers.[0].securityContext: map[%!f(string=privileged):%!f(bool=true) %!f(string=readOnlyRootFilesystem):%!f(bool=true)]
I0406 14:25:34.255558 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.privileged: true
I0406 14:25:34.255560 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.readOnlyRootFilesystem: true
I0406 14:25:34.255562 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0]: map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:/csi/csi.sock)]
I0406 14:25:34.255566 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1]: map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]]
I0406 14:25:34.255569 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom: map[%!f(string=fieldRef):map[%!f(string=fieldPath):%!f(string=spec.nodeName)]]
I0406 14:25:34.255573 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom.fieldRef: map[%!f(string=fieldPath):%!f(string=spec.nodeName)]
I0406 14:25:34.255576 745188 visitor.go:44] object value at spec.template.spec.containers.[1]: map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/csi/csi.sock)] map[%!f(string=name):%!f(string=DRIVER_REG_SOCK_PATH) %!f(string=value):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=node-driver-registrar) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)] map[%!f(string=mountPath):%!f(string=/registration) %!f(string=name):%!f(string=registration-dir)]]]
I0406 14:25:34.255603 745188 visitor.go:44] object value at spec.template.spec.containers.[1].env.[0]: map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/csi/csi.sock)]
I0406 14:25:34.255606 745188 visitor.go:44] object value at spec.template.spec.containers.[1].env.[1]: map[%!f(string=name):%!f(string=DRIVER_REG_SOCK_PATH) %!f(string=value):%!f(string=/var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock)]
I0406 14:25:34.255633 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1"
I0406 14:25:34.718628 745188 visitor.go:44] object value at spec.template.spec.containers.[1].securityContext: map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)]
I0406 14:25:34.718700 745188 visitor.go:34] string value at spec.template.spec.containers.[1].securityContext.allowPrivilegeEscalation: false
I0406 14:25:34.718704 745188 visitor.go:34] string value at spec.template.spec.containers.[1].securityContext.readOnlyRootFilesystem: true
I0406 14:25:34.718708 745188 visitor.go:44] object value at spec.template.spec.containers.[1].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)]
I0406 14:25:34.718729 745188 visitor.go:44] object value at spec.template.spec.containers.[1].volumeMounts.[1]: map[%!f(string=mountPath):%!f(string=/registration) %!f(string=name):%!f(string=registration-dir)]
I0406 14:25:34.718734 745188 visitor.go:44] object value at spec.template.spec.containers.[2]: map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)]]]
I0406 14:25:34.718743 745188 visitor.go:44] object value at spec.template.spec.containers.[2].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=plugin-dir)]
I0406 14:25:34.718749 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/sig-storage/livenessprobe:v2.6.0"
I0406 14:25:35.184609 745188 visitor.go:44] object value at spec.template.spec.containers.[2].securityContext: map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)]
I0406 14:25:35.184695 745188 visitor.go:34] string value at spec.template.spec.containers.[2].securityContext.allowPrivilegeEscalation: false
I0406 14:25:35.184700 745188 visitor.go:34] string value at spec.template.spec.containers.[2].securityContext.readOnlyRootFilesystem: true
I0406 14:25:35.184706 745188 visitor.go:44] object value at spec.template.spec.nodeSelector: map[%!f(string=kubernetes.io/os):%!f(string=linux)]
I0406 14:25:35.184713 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]]
I0406 14:25:35.184721 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=app):%!f(string=ebs-csi-node) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]
I0406 14:25:35.184728 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=apps/v1) %!f(string=kind):%!f(string=Deployment) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-controller) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=replicas):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=controller) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--k8s-tag-cluster-id=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--extra-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--http-endpoint=0.0.0.0:3301) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:///var/lib/csi/sockets/pluginproxy/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=AWS_ACCESS_KEY_ID) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=key_id) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=AWS_SECRET_ACCESS_KEY) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=access_key) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):3301.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--feature-gates=Topology=true) %!f(string=--extra-create-metadata) %!f(string=--leader-election=true) %!f(string=--default-fstype=ext4)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-provisioner:v3.1.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-provisioner) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--leader-election=true)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-attacher:v3.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-attacher) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-resizer:v1.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-resizer) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=socket-dir)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=securityContext):map[%!f(string=fsGroup):1000.000000 %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000] %!f(string=serviceAccountName):%!f(string=ebs-csi-controller-sa) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]] %!f(string=volumes):[map[%!f(string=emptyDir):map[] %!f(string=name):%!f(string=socket-dir)]]]]]]
I0406 14:25:35.184914 745188 visitor.go:44] object value at spec: map[%!f(string=replicas):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=template):map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=controller) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--k8s-tag-cluster-id=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--extra-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--http-endpoint=0.0.0.0:3301) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:///var/lib/csi/sockets/pluginproxy/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=AWS_ACCESS_KEY_ID) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=key_id) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=AWS_SECRET_ACCESS_KEY) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=access_key) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):3301.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--feature-gates=Topology=true) %!f(string=--extra-create-metadata) %!f(string=--leader-election=true) %!f(string=--default-fstype=ext4)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-provisioner:v3.1.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-provisioner) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--leader-election=true)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-attacher:v3.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-attacher) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-resizer:v1.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-resizer) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=socket-dir)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=securityContext):map[%!f(string=fsGroup):1000.000000 %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000] %!f(string=serviceAccountName):%!f(string=ebs-csi-controller-sa) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]] %!f(string=volumes):[map[%!f(string=emptyDir):map[] %!f(string=name):%!f(string=socket-dir)]]]]]
I0406 14:25:35.185041 745188 visitor.go:39] float64 value at spec.replicas: 1.000000
I0406 14:25:35.185046 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]]
I0406 14:25:35.185052 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]
I0406 14:25:35.185056 745188 visitor.go:44] object value at spec.template: map[%!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]] %!f(string=spec):map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=controller) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--k8s-tag-cluster-id=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--extra-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--http-endpoint=0.0.0.0:3301) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:///var/lib/csi/sockets/pluginproxy/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=AWS_ACCESS_KEY_ID) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=key_id) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=AWS_SECRET_ACCESS_KEY) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=access_key) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):3301.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--feature-gates=Topology=true) %!f(string=--extra-create-metadata) %!f(string=--leader-election=true) %!f(string=--default-fstype=ext4)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-provisioner:v3.1.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-provisioner) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--leader-election=true)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-attacher:v3.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-attacher) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-resizer:v1.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-resizer) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=socket-dir)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=securityContext):map[%!f(string=fsGroup):1000.000000 %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000] %!f(string=serviceAccountName):%!f(string=ebs-csi-controller-sa) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]] %!f(string=volumes):[map[%!f(string=emptyDir):map[] %!f(string=name):%!f(string=socket-dir)]]]]
I0406 14:25:35.185121 745188 visitor.go:44] object value at spec.template.metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]]
I0406 14:25:35.185126 745188 visitor.go:44] object value at spec.template.metadata.labels: map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=kops.k8s.io/managed-by):%!f(string=kops)]
I0406 14:25:35.185132 745188 visitor.go:44] object value at spec.template.spec: map[%!f(string=affinity):map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]] %!f(string=containers):[map[%!f(string=args):[%!f(string=controller) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--k8s-tag-cluster-id=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--extra-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--http-endpoint=0.0.0.0:3301) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:///var/lib/csi/sockets/pluginproxy/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=AWS_ACCESS_KEY_ID) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=key_id) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=AWS_SECRET_ACCESS_KEY) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=access_key) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):3301.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--feature-gates=Topology=true) %!f(string=--extra-create-metadata) %!f(string=--leader-election=true) %!f(string=--default-fstype=ext4)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-provisioner:v3.1.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-provisioner) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--leader-election=true)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-attacher:v3.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-attacher) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-resizer:v1.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-resizer) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]] map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=socket-dir)]]]] %!f(string=hostNetwork):%!f(bool=true) %!f(string=nodeSelector):<nil> %!f(string=priorityClassName):%!f(string=system-cluster-critical) %!f(string=securityContext):map[%!f(string=fsGroup):1000.000000 %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000] %!f(string=serviceAccountName):%!f(string=ebs-csi-controller-sa) %!f(string=tolerations):[map[%!f(string=operator):%!f(string=Exists)]] %!f(string=topologySpreadConstraints):[map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)] map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]] %!f(string=volumes):[map[%!f(string=emptyDir):map[] %!f(string=name):%!f(string=socket-dir)]]]
I0406 14:25:35.185239 745188 visitor.go:44] object value at spec.template.spec.volumes.[0]: map[%!f(string=emptyDir):map[] %!f(string=name):%!f(string=socket-dir)]
I0406 14:25:35.185268 745188 visitor.go:44] object value at spec.template.spec.volumes.[0].emptyDir: map[]
I0406 14:25:35.185272 745188 visitor.go:44] object value at spec.template.spec.affinity: map[%!f(string=nodeAffinity):map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]]
I0406 14:25:35.185287 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity: map[%!f(string=requiredDuringSchedulingIgnoredDuringExecution):map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]]
I0406 14:25:35.185303 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution: map[%!f(string=nodeSelectorTerms):[map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]] map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]]]
I0406 14:25:35.185314 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]
I0406 14:25:35.185320 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/control-plane) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:35.185324 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[0].matchExpressions.[1]: map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]
I0406 14:25:35.185329 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1]: map[%!f(string=matchExpressions):[map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)] map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]]]
I0406 14:25:35.185334 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1].matchExpressions.[0]: map[%!f(string=key):%!f(string=node-role.kubernetes.io/master) %!f(string=operator):%!f(string=Exists)]
I0406 14:25:35.185337 745188 visitor.go:44] object value at spec.template.spec.affinity.nodeAffinity.requiredDuringSchedulingIgnoredDuringExecution.nodeSelectorTerms.[1].matchExpressions.[1]: map[%!f(string=key):%!f(string=kubernetes.io/os) %!f(string=operator):%!f(string=In) %!f(string=values):[%!f(string=linux)]]
I0406 14:25:35.185341 745188 visitor.go:34] string value at spec.template.spec.hostNetwork: true
I0406 14:25:35.185344 745188 visitor.go:44] object value at spec.template.spec.containers.[0]: map[%!f(string=args):[%!f(string=controller) %!f(string=--endpoint=$(CSI_ENDPOINT)) %!f(string=--logtostderr) %!f(string=--k8s-tag-cluster-id=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--extra-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>) %!f(string=--http-endpoint=0.0.0.0:3301) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:///var/lib/csi/sockets/pluginproxy/csi.sock)] map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]] map[%!f(string=name):%!f(string=AWS_ACCESS_KEY_ID) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=key_id) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]] map[%!f(string=name):%!f(string=AWS_SECRET_ACCESS_KEY) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=access_key) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]]] %!f(string=image):%!f(string=registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=livenessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=name):%!f(string=ebs-plugin) %!f(string=ports):[map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)] map[%!f(string=containerPort):3301.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]] %!f(string=readinessProbe):map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000] %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]]
I0406 14:25:35.185372 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1"
I0406 14:25:35.662659 745188 visitor.go:44] object value at spec.template.spec.containers.[0].readinessProbe: map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000]
I0406 14:25:35.662746 745188 visitor.go:44] object value at spec.template.spec.containers.[0].readinessProbe.httpGet: map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)]
I0406 14:25:35.662755 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 10.000000
I0406 14:25:35.662758 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.periodSeconds: 10.000000
I0406 14:25:35.662760 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 3.000000
I0406 14:25:35.662762 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].readinessProbe.failureThreshold: 5.000000
I0406 14:25:35.662766 745188 visitor.go:44] object value at spec.template.spec.containers.[0].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]
I0406 14:25:35.662775 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[0]: map[%!f(string=name):%!f(string=CSI_ENDPOINT) %!f(string=value):%!f(string=unix:///var/lib/csi/sockets/pluginproxy/csi.sock)]
I0406 14:25:35.662795 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1]: map[%!f(string=name):%!f(string=CSI_NODE_NAME) %!f(string=valueFrom):map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]]
I0406 14:25:35.662800 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom: map[%!f(string=fieldRef):map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]]
I0406 14:25:35.662805 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[1].valueFrom.fieldRef: map[%!f(string=apiVersion):%!f(string=v1) %!f(string=fieldPath):%!f(string=spec.nodeName)]
I0406 14:25:35.662830 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2]: map[%!f(string=name):%!f(string=AWS_ACCESS_KEY_ID) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=key_id) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]]
I0406 14:25:35.662839 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2].valueFrom: map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=key_id) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]
I0406 14:25:35.662844 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[2].valueFrom.secretKeyRef: map[%!f(string=key):%!f(string=key_id) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]
I0406 14:25:35.662849 745188 visitor.go:34] string value at spec.template.spec.containers.[0].env.[2].valueFrom.secretKeyRef.optional: true
I0406 14:25:35.662851 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[3]: map[%!f(string=name):%!f(string=AWS_SECRET_ACCESS_KEY) %!f(string=valueFrom):map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=access_key) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]]
I0406 14:25:35.662857 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[3].valueFrom: map[%!f(string=secretKeyRef):map[%!f(string=key):%!f(string=access_key) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]]
I0406 14:25:35.662861 745188 visitor.go:44] object value at spec.template.spec.containers.[0].env.[3].valueFrom.secretKeyRef: map[%!f(string=key):%!f(string=access_key) %!f(string=name):%!f(string=aws-secret) %!f(string=optional):%!f(bool=true)]
I0406 14:25:35.662864 745188 visitor.go:34] string value at spec.template.spec.containers.[0].env.[3].valueFrom.secretKeyRef.optional: true
I0406 14:25:35.662866 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe: map[%!f(string=failureThreshold):5.000000 %!f(string=httpGet):map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)] %!f(string=initialDelaySeconds):10.000000 %!f(string=periodSeconds):10.000000 %!f(string=timeoutSeconds):3.000000]
I0406 14:25:35.662872 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I0406 14:25:35.662874 745188 visitor.go:44] object value at spec.template.spec.containers.[0].livenessProbe.httpGet: map[%!f(string=path):%!f(string=/healthz) %!f(string=port):%!f(string=healthz)]
I0406 14:25:35.662877 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 10.000000
I0406 14:25:35.662879 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.periodSeconds: 10.000000
I0406 14:25:35.662881 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 3.000000
I0406 14:25:35.662883 745188 visitor.go:44] object value at spec.template.spec.containers.[0].ports.[0]: map[%!f(string=containerPort):9808.000000 %!f(string=name):%!f(string=healthz) %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:35.662887 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 9808.000000
I0406 14:25:35.662889 745188 visitor.go:44] object value at spec.template.spec.containers.[0].ports.[1]: map[%!f(string=containerPort):3301.000000 %!f(string=name):%!f(string=metrics) %!f(string=protocol):%!f(string=TCP)]
I0406 14:25:35.662892 745188 visitor.go:39] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 3301.000000
I0406 14:25:35.662894 745188 visitor.go:44] object value at spec.template.spec.containers.[0].securityContext: map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)]
I0406 14:25:35.662897 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.allowPrivilegeEscalation: false
I0406 14:25:35.662899 745188 visitor.go:34] string value at spec.template.spec.containers.[0].securityContext.readOnlyRootFilesystem: true
I0406 14:25:35.662901 745188 visitor.go:44] object value at spec.template.spec.containers.[1]: map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--feature-gates=Topology=true) %!f(string=--extra-create-metadata) %!f(string=--leader-election=true) %!f(string=--default-fstype=ext4)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-provisioner:v3.1.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-provisioner) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]]
I0406 14:25:35.662913 745188 visitor.go:44] object value at spec.template.spec.containers.[1].securityContext: map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)]
I0406 14:25:35.662917 745188 visitor.go:34] string value at spec.template.spec.containers.[1].securityContext.allowPrivilegeEscalation: false
I0406 14:25:35.662918 745188 visitor.go:34] string value at spec.template.spec.containers.[1].securityContext.readOnlyRootFilesystem: true
I0406 14:25:35.662920 745188 visitor.go:44] object value at spec.template.spec.containers.[1].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]
I0406 14:25:35.662925 745188 visitor.go:44] object value at spec.template.spec.containers.[1].env.[0]: map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]
I0406 14:25:35.662930 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/sig-storage/csi-provisioner:v3.1.0"
I0406 14:25:36.150852 745188 visitor.go:44] object value at spec.template.spec.containers.[2]: map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5) %!f(string=--leader-election=true)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-attacher:v3.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-attacher) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]]
I0406 14:25:36.150922 745188 visitor.go:44] object value at spec.template.spec.containers.[2].env.[0]: map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]
I0406 14:25:36.150936 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/sig-storage/csi-attacher:v3.4.0"
I0406 14:25:36.627219 745188 visitor.go:44] object value at spec.template.spec.containers.[2].securityContext: map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)]
I0406 14:25:36.627284 745188 visitor.go:34] string value at spec.template.spec.containers.[2].securityContext.readOnlyRootFilesystem: true
I0406 14:25:36.627289 745188 visitor.go:34] string value at spec.template.spec.containers.[2].securityContext.allowPrivilegeEscalation: false
I0406 14:25:36.627295 745188 visitor.go:44] object value at spec.template.spec.containers.[2].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]
I0406 14:25:36.627306 745188 visitor.go:44] object value at spec.template.spec.containers.[3]: map[%!f(string=args):[%!f(string=--csi-address=$(ADDRESS)) %!f(string=--v=5)] %!f(string=env):[map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/csi-resizer:v1.4.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=csi-resizer) %!f(string=securityContext):map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)] %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]]]
I0406 14:25:36.627325 745188 visitor.go:44] object value at spec.template.spec.containers.[3].securityContext: map[%!f(string=allowPrivilegeEscalation):%!f(bool=false) %!f(string=readOnlyRootFilesystem):%!f(bool=true)]
I0406 14:25:36.627330 745188 visitor.go:34] string value at spec.template.spec.containers.[3].securityContext.allowPrivilegeEscalation: false
I0406 14:25:36.627337 745188 visitor.go:34] string value at spec.template.spec.containers.[3].securityContext.readOnlyRootFilesystem: true
I0406 14:25:36.627349 745188 visitor.go:44] object value at spec.template.spec.containers.[3].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/var/lib/csi/sockets/pluginproxy/) %!f(string=name):%!f(string=socket-dir)]
I0406 14:25:36.627369 745188 visitor.go:44] object value at spec.template.spec.containers.[3].env.[0]: map[%!f(string=name):%!f(string=ADDRESS) %!f(string=value):%!f(string=/var/lib/csi/sockets/pluginproxy/csi.sock)]
I0406 14:25:36.627378 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/sig-storage/csi-resizer:v1.4.0"
I0406 14:25:37.108475 745188 visitor.go:44] object value at spec.template.spec.containers.[4]: map[%!f(string=args):[%!f(string=--csi-address=/csi/csi.sock)] %!f(string=image):%!f(string=registry.k8s.io/sig-storage/livenessprobe:v2.6.0) %!f(string=imagePullPolicy):%!f(string=IfNotPresent) %!f(string=name):%!f(string=liveness-probe) %!f(string=volumeMounts):[map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=socket-dir)]]]
I0406 14:25:37.108542 745188 visitor.go:44] object value at spec.template.spec.containers.[4].volumeMounts.[0]: map[%!f(string=mountPath):%!f(string=/csi) %!f(string=name):%!f(string=socket-dir)]
I0406 14:25:37.108552 745188 images.go:59] Consider image for re-mapping: "registry.k8s.io/sig-storage/livenessprobe:v2.6.0"
I0406 14:25:37.637370 745188 visitor.go:44] object value at spec.template.spec.securityContext: map[%!f(string=fsGroup):1000.000000 %!f(string=runAsGroup):1000.000000 %!f(string=runAsNonRoot):%!f(bool=true) %!f(string=runAsUser):1000.000000]
I0406 14:25:37.637455 745188 visitor.go:39] float64 value at spec.template.spec.securityContext.runAsGroup: 1000.000000
I0406 14:25:37.637460 745188 visitor.go:34] string value at spec.template.spec.securityContext.runAsNonRoot: true
I0406 14:25:37.637462 745188 visitor.go:39] float64 value at spec.template.spec.securityContext.runAsUser: 1000.000000
I0406 14:25:37.637464 745188 visitor.go:39] float64 value at spec.template.spec.securityContext.fsGroup: 1000.000000
I0406 14:25:37.637468 745188 visitor.go:44] object value at spec.template.spec.tolerations.[0]: map[%!f(string=operator):%!f(string=Exists)]
I0406 14:25:37.637474 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0]: map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=topology.kubernetes.io/zone) %!f(string=whenUnsatisfiable):%!f(string=ScheduleAnyway)]
I0406 14:25:37.637483 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0].labelSelector: map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]]
I0406 14:25:37.637489 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[0].labelSelector.matchLabels: map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]
I0406 14:25:37.637493 745188 visitor.go:39] float64 value at spec.template.spec.topologySpreadConstraints.[0].maxSkew: 1.000000
I0406 14:25:37.637497 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1]: map[%!f(string=labelSelector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]] %!f(string=maxSkew):1.000000 %!f(string=topologyKey):%!f(string=kubernetes.io/hostname) %!f(string=whenUnsatisfiable):%!f(string=DoNotSchedule)]
I0406 14:25:37.637502 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1].labelSelector: map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]]
I0406 14:25:37.637506 745188 visitor.go:44] object value at spec.template.spec.topologySpreadConstraints.[1].labelSelector.matchLabels: map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver)]
I0406 14:25:37.637510 745188 visitor.go:39] float64 value at spec.template.spec.topologySpreadConstraints.[1].maxSkew: 1.000000
I0406 14:25:37.637515 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:37.637522 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:37.637529 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=storage.k8s.io/v1) %!f(string=kind):%!f(string=CSIDriver) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs.csi.aws.com)] %!f(string=spec):map[%!f(string=attachRequired):%!f(bool=true) %!f(string=podInfoOnMount):%!f(bool=false)]]
I0406 14:25:37.637540 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs.csi.aws.com)]
I0406 14:25:37.637545 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:37.637551 745188 visitor.go:44] object value at spec: map[%!f(string=attachRequired):%!f(bool=true) %!f(string=podInfoOnMount):%!f(bool=false)]
I0406 14:25:37.637558 745188 visitor.go:34] string value at spec.attachRequired: true
I0406 14:25:37.637561 745188 visitor.go:34] string value at spec.podInfoOnMount: false
I0406 14:25:37.637564 745188 visitor.go:44] object value at : map[%!f(string=apiVersion):%!f(string=policy/v1) %!f(string=kind):%!f(string=PodDisruptionBudget) %!f(string=metadata):map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-controller) %!f(string=namespace):%!f(string=kube-system)] %!f(string=spec):map[%!f(string=maxUnavailable):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver)]]]]
I0406 14:25:37.637580 745188 visitor.go:44] object value at metadata: map[%!f(string=creationTimestamp):<nil> %!f(string=labels):map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)] %!f(string=name):%!f(string=ebs-csi-controller) %!f(string=namespace):%!f(string=kube-system)]
I0406 14:25:37.637588 745188 visitor.go:44] object value at metadata.labels: map[%!f(string=addon.kops.k8s.io/name):%!f(string=aws-ebs-csi-driver.addons.k8s.io) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/managed-by):%!f(string=kops) %!f(string=app.kubernetes.io/name):%!f(string=aws-ebs-csi-driver) %!f(string=app.kubernetes.io/version):%!f(string=v1.14.1) %!f(string=k8s-addon):%!f(string=aws-ebs-csi-driver.addons.k8s.io)]
I0406 14:25:37.637596 745188 visitor.go:44] object value at spec: map[%!f(string=maxUnavailable):1.000000 %!f(string=selector):map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver)]]]
I0406 14:25:37.637608 745188 visitor.go:39] float64 value at spec.maxUnavailable: 1.000000
I0406 14:25:37.637612 745188 visitor.go:44] object value at spec.selector: map[%!f(string=matchLabels):map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver)]]
I0406 14:25:37.637620 745188 visitor.go:44] object value at spec.selector.matchLabels: map[%!f(string=app):%!f(string=ebs-csi-controller) %!f(string=app.kubernetes.io/instance):%!f(string=aws-ebs-csi-driver)]
I0406 14:25:37.640961 745188 bootstrapchannelbuilder.go:146] Manifest apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-controller-sa
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-external-attacher-role
rules:
- apiGroups:
- ""
resources:
- persistentvolumes
verbs:
- get
- list
- watch
- update
- patch
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- csi.storage.k8s.io
resources:
- csinodeinfos
verbs:
- get
- list
- watch
- apiGroups:
- storage.k8s.io
resources:
- volumeattachments
verbs:
- get
- list
- watch
- update
- patch
- apiGroups:
- storage.k8s.io
resources:
- volumeattachments/status
verbs:
- patch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-external-provisioner-role
rules:
- apiGroups:
- ""
resources:
- persistentvolumes
verbs:
- get
- list
- watch
- create
- delete
- apiGroups:
- ""
resources:
- persistentvolumeclaims
verbs:
- get
- list
- watch
- update
- apiGroups:
- storage.k8s.io
resources:
- storageclasses
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- events
verbs:
- list
- watch
- create
- update
- patch
- apiGroups:
- snapshot.storage.k8s.io
resources:
- volumesnapshots
verbs:
- get
- list
- apiGroups:
- snapshot.storage.k8s.io
resources:
- volumesnapshotcontents
verbs:
- get
- list
- apiGroups:
- storage.k8s.io
resources:
- csinodes
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- get
- watch
- list
- delete
- update
- create
- apiGroups:
- storage.k8s.io
resources:
- volumeattachments
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-external-resizer-role
rules:
- apiGroups:
- ""
resources:
- persistentvolumes
verbs:
- get
- list
- watch
- update
- patch
- apiGroups:
- ""
resources:
- persistentvolumeclaims
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- persistentvolumeclaims/status
verbs:
- update
- patch
- apiGroups:
- storage.k8s.io
resources:
- storageclasses
verbs:
- get
- list
- watch
- apiGroups:
- ""
resources:
- events
verbs:
- list
- watch
- create
- update
- patch
- apiGroups:
- ""
resources:
- pods
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-external-snapshotter-role
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- list
- watch
- create
- update
- patch
- apiGroups:
- ""
resources:
- secrets
verbs:
- get
- list
- apiGroups:
- snapshot.storage.k8s.io
resources:
- volumesnapshotclasses
verbs:
- get
- list
- watch
- apiGroups:
- snapshot.storage.k8s.io
resources:
- volumesnapshotcontents
verbs:
- create
- get
- list
- watch
- update
- delete
- patch
- apiGroups:
- snapshot.storage.k8s.io
resources:
- volumesnapshotcontents/status
verbs:
- update
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-attacher-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: ebs-external-attacher-role
subjects:
- kind: ServiceAccount
name: ebs-csi-controller-sa
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-provisioner-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: ebs-external-provisioner-role
subjects:
- kind: ServiceAccount
name: ebs-csi-controller-sa
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-resizer-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: ebs-external-resizer-role
subjects:
- kind: ServiceAccount
name: ebs-csi-controller-sa
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-snapshotter-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: ebs-external-snapshotter-role
subjects:
- kind: ServiceAccount
name: ebs-csi-controller-sa
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-node-getter-binding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: ebs-csi-node-role
subjects:
- kind: ServiceAccount
name: ebs-csi-node-sa
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-node-role
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
---
apiVersion: v1
kind: ServiceAccount
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-node-sa
namespace: kube-system
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-node
namespace: kube-system
spec:
selector:
matchLabels:
app: ebs-csi-node
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/name: aws-ebs-csi-driver
template:
metadata:
creationTimestamp: null
labels:
app: ebs-csi-node
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
kops.k8s.io/managed-by: kops
spec:
containers:
- args:
- node
- --endpoint=$(CSI_ENDPOINT)
- --logtostderr
- --v=2
env:
- name: CSI_ENDPOINT
value: unix:/csi/csi.sock
- name: CSI_NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1@sha256:f0c5de192d832e7c1daa6580d4a62e8fa6fc8eabc0917ae4cb7ed4d15e95b59e
imagePullPolicy: IfNotPresent
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthz
port: healthz
initialDelaySeconds: 10
periodSeconds: 10
timeoutSeconds: 3
name: ebs-plugin
ports:
- containerPort: 9808
name: healthz
protocol: TCP
securityContext:
privileged: true
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /var/lib/kubelet
mountPropagation: Bidirectional
name: kubelet-dir
- mountPath: /csi
name: plugin-dir
- mountPath: /dev
name: device-dir
- args:
- --csi-address=$(ADDRESS)
- --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)
- --v=5
env:
- name: ADDRESS
value: /csi/csi.sock
- name: DRIVER_REG_SOCK_PATH
value: /var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock
image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1@sha256:0103eee7c35e3e0b5cd8cdca9850dc71c793cdeb6669d8be7a89440da2d06ae4
imagePullPolicy: IfNotPresent
name: node-driver-registrar
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /csi
name: plugin-dir
- mountPath: /registration
name: registration-dir
- args:
- --csi-address=/csi/csi.sock
image: registry.k8s.io/sig-storage/livenessprobe:v2.6.0@sha256:406f59599991916d2942d8d02f076d957ed71b541ee19f09fc01723a6e6f5932
imagePullPolicy: IfNotPresent
name: liveness-probe
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /csi
name: plugin-dir
nodeSelector:
kubernetes.io/os: linux
priorityClassName: system-node-critical
securityContext:
fsGroup: 0
runAsGroup: 0
runAsNonRoot: false
runAsUser: 0
serviceAccountName: ebs-csi-node-sa
tolerations:
- operator: Exists
volumes:
- hostPath:
path: /var/lib/kubelet
type: Directory
name: kubelet-dir
- hostPath:
path: /var/lib/kubelet/plugins/ebs.csi.aws.com/
type: DirectoryOrCreate
name: plugin-dir
- hostPath:
path: /var/lib/kubelet/plugins_registry/
type: Directory
name: registration-dir
- hostPath:
path: /dev
type: Directory
name: device-dir
---
apiVersion: apps/v1
kind: Deployment
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-controller
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
app: ebs-csi-controller
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/name: aws-ebs-csi-driver
template:
metadata:
creationTimestamp: null
labels:
app: ebs-csi-controller
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
kops.k8s.io/managed-by: kops
spec:
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
- key: kubernetes.io/os
operator: In
values:
- linux
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
- key: kubernetes.io/os
operator: In
values:
- linux
containers:
- args:
- controller
- --endpoint=$(CSI_ENDPOINT)
- --logtostderr
- --k8s-tag-cluster-id=bug-report-cluster-public.<DOMAIN_REDACTED>
- --extra-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>
- --http-endpoint=0.0.0.0:3301
- --v=5
env:
- name: CSI_ENDPOINT
value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock
- name: CSI_NODE_NAME
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: spec.nodeName
- name: AWS_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
key: key_id
name: aws-secret
optional: true
- name: AWS_SECRET_ACCESS_KEY
valueFrom:
secretKeyRef:
key: access_key
name: aws-secret
optional: true
image: registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1@sha256:f0c5de192d832e7c1daa6580d4a62e8fa6fc8eabc0917ae4cb7ed4d15e95b59e
imagePullPolicy: IfNotPresent
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthz
port: healthz
initialDelaySeconds: 10
periodSeconds: 10
timeoutSeconds: 3
name: ebs-plugin
ports:
- containerPort: 9808
name: healthz
protocol: TCP
- containerPort: 3301
name: metrics
protocol: TCP
readinessProbe:
failureThreshold: 5
httpGet:
path: /healthz
port: healthz
initialDelaySeconds: 10
periodSeconds: 10
timeoutSeconds: 3
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /var/lib/csi/sockets/pluginproxy/
name: socket-dir
- args:
- --csi-address=$(ADDRESS)
- --v=5
- --feature-gates=Topology=true
- --extra-create-metadata
- --leader-election=true
- --default-fstype=ext4
env:
- name: ADDRESS
value: /var/lib/csi/sockets/pluginproxy/csi.sock
image: registry.k8s.io/sig-storage/csi-provisioner:v3.1.0@sha256:122bfb8c1edabb3c0edd63f06523e6940d958d19b3957dc7b1d6f81e9f1f6119
imagePullPolicy: IfNotPresent
name: csi-provisioner
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /var/lib/csi/sockets/pluginproxy/
name: socket-dir
- args:
- --csi-address=$(ADDRESS)
- --v=5
- --leader-election=true
env:
- name: ADDRESS
value: /var/lib/csi/sockets/pluginproxy/csi.sock
image: registry.k8s.io/sig-storage/csi-attacher:v3.4.0@sha256:8b9c313c05f54fb04f8d430896f5f5904b6cb157df261501b29adc04d2b2dc7b
imagePullPolicy: IfNotPresent
name: csi-attacher
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /var/lib/csi/sockets/pluginproxy/
name: socket-dir
- args:
- --csi-address=$(ADDRESS)
- --v=5
env:
- name: ADDRESS
value: /var/lib/csi/sockets/pluginproxy/csi.sock
image: registry.k8s.io/sig-storage/csi-resizer:v1.4.0@sha256:9ebbf9f023e7b41ccee3d52afe39a89e3ddacdbb69269d583abfc25847cfd9e4
imagePullPolicy: IfNotPresent
name: csi-resizer
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /var/lib/csi/sockets/pluginproxy/
name: socket-dir
- args:
- --csi-address=/csi/csi.sock
image: registry.k8s.io/sig-storage/livenessprobe:v2.6.0@sha256:406f59599991916d2942d8d02f076d957ed71b541ee19f09fc01723a6e6f5932
imagePullPolicy: IfNotPresent
name: liveness-probe
volumeMounts:
- mountPath: /csi
name: socket-dir
hostNetwork: true
nodeSelector: null
priorityClassName: system-cluster-critical
securityContext:
fsGroup: 1000
runAsGroup: 1000
runAsNonRoot: true
runAsUser: 1000
serviceAccountName: ebs-csi-controller-sa
tolerations:
- operator: Exists
topologySpreadConstraints:
- labelSelector:
matchLabels:
app: ebs-csi-controller
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/name: aws-ebs-csi-driver
maxSkew: 1
topologyKey: topology.kubernetes.io/zone
whenUnsatisfiable: ScheduleAnyway
- labelSelector:
matchLabels:
app: ebs-csi-controller
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/name: aws-ebs-csi-driver
maxSkew: 1
topologyKey: kubernetes.io/hostname
whenUnsatisfiable: DoNotSchedule
volumes:
- emptyDir: {}
name: socket-dir
---
apiVersion: storage.k8s.io/v1
kind: CSIDriver
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs.csi.aws.com
spec:
attachRequired: true
podInfoOnMount: false
---
apiVersion: policy/v1
kind: PodDisruptionBudget
metadata:
creationTimestamp: null
labels:
addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io
app.kubernetes.io/instance: aws-ebs-csi-driver
app.kubernetes.io/managed-by: kops
app.kubernetes.io/name: aws-ebs-csi-driver
app.kubernetes.io/version: v1.14.1
k8s-addon: aws-ebs-csi-driver.addons.k8s.io
name: ebs-csi-controller
namespace: kube-system
spec:
maxUnavailable: 1
selector:
matchLabels:
app: ebs-csi-controller
app.kubernetes.io/instance: aws-ebs-csi-driver
I0406 14:25:37.641064 745188 bootstrapchannelbuilder.go:149] hash 876b8f312b7d3a432588efdd54efbd2897e3e624e6303b28b123659ea128e3ee
I0406 14:25:38.146572 745188 model.go:142] ignoring non-field:
I0406 14:25:38.146607 745188 model.go:142] ignoring non-field:
I0406 14:25:38.146613 745188 model.go:148] not writing field with no config tag: master
I0406 14:25:38.146617 745188 model.go:142] ignoring non-field: master
I0406 14:25:38.146620 745188 model.go:148] not writing field with no config tag: logFormat
I0406 14:25:38.146622 745188 model.go:142] ignoring non-field: logFormat
I0406 14:25:38.146625 745188 model.go:148] not writing field with no config tag: logLevel
I0406 14:25:38.146627 745188 model.go:142] ignoring non-field: logLevel
I0406 14:25:38.146630 745188 model.go:148] not writing field with no config tag: image
I0406 14:25:38.146632 745188 model.go:142] ignoring non-field: image
I0406 14:25:38.146636 745188 model.go:148] not writing field with no config tag: leaderElection
I0406 14:25:38.146638 745188 model.go:142] ignoring non-field: leaderElection
I0406 14:25:38.146641 745188 model.go:142] ignoring non-field: leaderElection
I0406 14:25:38.146644 745188 model.go:148] not writing field with no config tag: leaderElection.leaderElect
I0406 14:25:38.146646 745188 model.go:142] ignoring non-field: leaderElection.leaderElect
I0406 14:25:38.146649 745188 model.go:142] ignoring non-field: leaderElection.leaderElect
I0406 14:25:38.146652 745188 model.go:148] not writing field with no config tag: leaderElection.leaderElectLeaseDuration
I0406 14:25:38.146655 745188 model.go:142] ignoring non-field: leaderElection.leaderElectLeaseDuration
I0406 14:25:38.146658 745188 model.go:148] not writing field with no config tag: leaderElection.leaderElectRenewDeadlineDuration
I0406 14:25:38.146660 745188 model.go:142] ignoring non-field: leaderElection.leaderElectRenewDeadlineDuration
I0406 14:25:38.146663 745188 model.go:148] not writing field with no config tag: leaderElection.leaderElectResourceLock
I0406 14:25:38.146665 745188 model.go:142] ignoring non-field: leaderElection.leaderElectResourceLock
I0406 14:25:38.146668 745188 model.go:148] not writing field with no config tag: leaderElection.leaderElectResourceName
I0406 14:25:38.146670 745188 model.go:142] ignoring non-field: leaderElection.leaderElectResourceName
I0406 14:25:38.146673 745188 model.go:148] not writing field with no config tag: leaderElection.leaderElectResourceNamespace
I0406 14:25:38.146675 745188 model.go:142] ignoring non-field: leaderElection.leaderElectResourceNamespace
I0406 14:25:38.146679 745188 model.go:148] not writing field with no config tag: leaderElection.leaderElectRetryPeriod
I0406 14:25:38.146681 745188 model.go:142] ignoring non-field: leaderElection.leaderElectRetryPeriod
I0406 14:25:38.146684 745188 model.go:148] not writing field with no config tag: usePolicyConfigMap
I0406 14:25:38.146686 745188 model.go:142] ignoring non-field: usePolicyConfigMap
I0406 14:25:38.146689 745188 model.go:148] not writing field with no config tag: featureGates
I0406 14:25:38.146691 745188 model.go:142] ignoring non-field: featureGates
I0406 14:25:38.146696 745188 model.go:142] ignoring non-field: featureGates[InTreePluginAWSUnregister]
I0406 14:25:38.146698 745188 model.go:142] ignoring non-field: featureGates[InTreePluginAWSUnregister]
I0406 14:25:38.146701 745188 model.go:148] not writing field with no config tag: maxPersistentVolumes
I0406 14:25:38.146703 745188 model.go:142] ignoring non-field: maxPersistentVolumes
I0406 14:25:38.146707 745188 model.go:142] ignoring non-field: qps
I0406 14:25:38.146711 745188 model.go:148] not writing field with no config tag: authenticationKubeconfig
I0406 14:25:38.146714 745188 model.go:142] ignoring non-field: authenticationKubeconfig
I0406 14:25:38.146717 745188 model.go:148] not writing field with no config tag: authorizationKubeconfig
I0406 14:25:38.146719 745188 model.go:142] ignoring non-field: authorizationKubeconfig
I0406 14:25:38.146722 745188 model.go:148] not writing field with no config tag: authorizationAlwaysAllowPaths
I0406 14:25:38.146724 745188 model.go:142] ignoring non-field: authorizationAlwaysAllowPaths
I0406 14:25:38.146727 745188 model.go:148] not writing field with no config tag: enableProfiling
I0406 14:25:38.146729 745188 model.go:142] ignoring non-field: enableProfiling
I0406 14:25:38.146732 745188 model.go:148] not writing field with no config tag: tlsCertFile
I0406 14:25:38.146734 745188 model.go:142] ignoring non-field: tlsCertFile
I0406 14:25:38.146737 745188 model.go:148] not writing field with no config tag: tlsPrivateKeyFile
I0406 14:25:38.146739 745188 model.go:142] ignoring non-field: tlsPrivateKeyFile
I0406 14:25:41.250196 745188 build_flags.go:49] ignoring non-field:
I0406 14:25:41.250265 745188 build_flags.go:49] ignoring non-field:
I0406 14:25:44.409903 745188 build_flags.go:49] ignoring non-field:
I0406 14:25:44.409939 745188 build_flags.go:49] ignoring non-field:
I0406 14:25:44.410982 745188 task.go:150] EnsureTask ignoring identical
I0406 14:25:44.412590 745188 firewall.go:436] Adding rule from-0.0.0.0/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.412701 745188 firewall.go:436] Adding rule from-0.0.0.0/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.412709 745188 firewall.go:436] Adding rule from-::/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.412713 745188 firewall.go:436] Adding rule from-::/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.412722 745188 firewall.go:436] Adding rule from-0.0.0.0/0-ingress-tcp-443to443-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.412726 745188 firewall.go:436] Adding rule from-::/0-ingress-tcp-443to443-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.412740 745188 firewall.go:436] Adding rule from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-0.0.0.0/0
I0406 14:25:44.412743 745188 firewall.go:436] Adding rule from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0
I0406 14:25:44.412752 745188 firewall.go:436] Adding rule from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.412760 745188 firewall.go:436] Adding rule from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-0.0.0.0/0
I0406 14:25:44.412764 745188 firewall.go:436] Adding rule from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0
I0406 14:25:44.412768 745188 firewall.go:436] Adding rule from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.412772 745188 firewall.go:436] Adding rule from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.413298 745188 firewall.go:436] Adding rule from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-udp-1to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.413329 745188 firewall.go:436] Adding rule from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-1to2379-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.413333 745188 firewall.go:436] Adding rule from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-2382to4000-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.413337 745188 firewall.go:436] Adding rule from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-4003to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>
I0406 14:25:44.413416 745188 network.go:240] applying subnet tags
I0406 14:25:44.415652 745188 topological_sort.go:79] Dependencies:
I0406 14:25:44.415706 745188 topological_sort.go:81] AutoscalingLifecycleHook/control-plane-us-east-1a-NTHLifecycleHook: [Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> LaunchTemplate/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED> AutoscalingGroup/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415740 745188 topological_sort.go:81] SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth: []
I0406 14:25:44.415742 745188 topological_sort.go:81] Route/0.0.0.0/0: [RouteTable/bug-report-cluster-public.<DOMAIN_REDACTED> InternetGateway/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415746 745188 topological_sort.go:81] AutoscalingLifecycleHook/kops-warmpool-nodes-us-east-1a: [Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> LaunchTemplate/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> AutoscalingGroup/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415748 745188 topological_sort.go:81] IAMRolePolicy/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: [IAMRole/nodes.bug-report-cluster-public.<DOMAIN_REDACTED> DNSZone/Z050288919G22381WZFHT]
I0406 14:25:44.415752 745188 topological_sort.go:81] IAMInstanceProfileRole/masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [IAMInstanceProfile/masters.bug-report-cluster-public.<DOMAIN_REDACTED> IAMRole/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415755 745188 topological_sort.go:81] EBSVolume/a.etcd-main.bug-report-cluster-public.<DOMAIN_REDACTED>: []
I0406 14:25:44.415759 745188 topological_sort.go:81] Keypair/etcd-peers-ca-main: []
I0406 14:25:44.415761 745188 topological_sort.go:81] SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-2382to4000-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415763 745188 topological_sort.go:81] ManagedFile/etcd-cluster-spec-main: []
I0406 14:25:44.415765 745188 topological_sort.go:81] AutoscalingGroup/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>: [Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> LaunchTemplate/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415768 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-node-termination-handler.aws-k8s-1.11: []
I0406 14:25:44.415770 745188 topological_sort.go:81] Keypair/etcd-peers-ca-events: []
I0406 14:25:44.415772 745188 topological_sort.go:81] VPC/bug-report-cluster-public.<DOMAIN_REDACTED>: []
I0406 14:25:44.415773 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-dns-controller.addons.k8s.io-k8s-1.12: []
I0406 14:25:44.415775 745188 topological_sort.go:81] SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-1to2379-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415779 745188 topological_sort.go:81] EBSVolume/a.etcd-events.bug-report-cluster-public.<DOMAIN_REDACTED>: []
I0406 14:25:44.415780 745188 topological_sort.go:81] IAMRole/masters.bug-report-cluster-public.<DOMAIN_REDACTED>: []
I0406 14:25:44.415782 745188 topological_sort.go:81] EventBridgeTarget/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange-Target: [EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth]
I0406 14:25:44.415785 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-bootstrap: []
I0406 14:25:44.415787 745188 topological_sort.go:81] ManagedFile/nodeupconfig-nodes-us-east-1a: [BootstrapScript/nodes-us-east-1a]
I0406 14:25:44.415789 745188 topological_sort.go:81] IAMRolePolicy/additional.masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [IAMRole/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415792 745188 topological_sort.go:81] MirrorKeystore/mirror-keystore: [Secret/kube-proxy Secret/admin Secret/system:scheduler Secret/system:dns Secret/kubelet Secret/system:logging Secret/system:monitoring Secret/system:controller_manager Secret/kube]
I0406 14:25:44.415794 745188 topological_sort.go:81] SecurityGroupRule/from-::/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415797 745188 topological_sort.go:81] ManagedFile/manifests-static-kube-apiserver-healthcheck: []
I0406 14:25:44.415799 745188 topological_sort.go:81] Keypair/service-account: []
I0406 14:25:44.415801 745188 topological_sort.go:81] ManagedFile/cluster-completed.spec: []
I0406 14:25:44.415803 745188 topological_sort.go:81] LaunchTemplate/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [IAMInstanceProfile/masters.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED> BootstrapScript/control-plane-us-east-1a]
I0406 14:25:44.415805 745188 topological_sort.go:81] Secret/system:monitoring: []
I0406 14:25:44.415807 745188 topological_sort.go:81] SecurityGroupRule/from-::/0-ingress-tcp-443to443-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415809 745188 topological_sort.go:81] LaunchTemplate/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>: [IAMInstanceProfile/nodes.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED> BootstrapScript/nodes-us-east-1a]
I0406 14:25:44.415813 745188 topological_sort.go:81] Secret/system:dns: []
I0406 14:25:44.415815 745188 topological_sort.go:81] WarmPool/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> LaunchTemplate/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED> AutoscalingGroup/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415819 745188 topological_sort.go:81] MirrorSecrets/mirror-secrets: [Secret/system:scheduler Secret/system:dns Secret/kubelet Secret/system:logging Secret/system:monitoring Secret/system:controller_manager Secret/kube Secret/kube-proxy Secret/admin]
I0406 14:25:44.415822 745188 topological_sort.go:81] DNSZone/Z050288919G22381WZFHT: []
I0406 14:25:44.415824 745188 topological_sort.go:81] Secret/kube-proxy: []
I0406 14:25:44.415826 745188 topological_sort.go:81] SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-0.0.0.0/0: [SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415828 745188 topological_sort.go:81] ManagedFile/kops-version.txt: []
I0406 14:25:44.415830 745188 topological_sort.go:81] BootstrapScript/control-plane-us-east-1a: [Keypair/etcd-peers-ca-main Keypair/etcd-manager-ca-events Keypair/etcd-peers-ca-events Keypair/apiserver-aggregator-ca Keypair/service-account Keypair/kubernetes-ca Keypair/etcd-clients-ca Keypair/etcd-manager-ca-main]
I0406 14:25:44.415833 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-kops-controller.addons.k8s.io-k8s-1.16: []
I0406 14:25:44.415836 745188 topological_sort.go:81] Route/::/0: [RouteTable/bug-report-cluster-public.<DOMAIN_REDACTED> InternetGateway/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415838 745188 topological_sort.go:81] Secret/kubelet: []
I0406 14:25:44.415840 745188 topological_sort.go:81] ManagedFile/manifests-etcdmanager-main-control-plane-us-east-1a: []
I0406 14:25:44.415842 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-storage-aws.addons.k8s.io-v1.15.0: []
I0406 14:25:44.415845 745188 topological_sort.go:81] SecurityGroupRule/from-::/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415848 745188 topological_sort.go:81] IAMRolePolicy/masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [IAMRole/masters.bug-report-cluster-public.<DOMAIN_REDACTED> DNSZone/Z050288919G22381WZFHT]
I0406 14:25:44.415853 745188 topological_sort.go:81] EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange: [SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth]
I0406 14:25:44.415856 745188 topological_sort.go:81] Secret/system:logging: []
I0406 14:25:44.415860 745188 topological_sort.go:81] SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415864 745188 topological_sort.go:81] Secret/system:controller_manager: []
I0406 14:25:44.415867 745188 topological_sort.go:81] Keypair/apiserver-aggregator-ca: []
I0406 14:25:44.415870 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-coredns.addons.k8s.io-k8s-1.12: []
I0406 14:25:44.415873 745188 topological_sort.go:81] EventBridgeTarget/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange-Target: [EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth]
I0406 14:25:44.415878 745188 topological_sort.go:81] SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [VPC/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415882 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9: []
I0406 14:25:44.415885 745188 topological_sort.go:81] AutoscalingLifecycleHook/kops-warmpool-control-plane-us-east-1a: [Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> LaunchTemplate/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED> AutoscalingGroup/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415891 745188 topological_sort.go:81] Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>: [VPC/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415896 745188 topological_sort.go:81] IAMRole/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: []
I0406 14:25:44.415899 745188 topological_sort.go:81] IAMRolePolicy/additional.nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: [IAMRole/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415903 745188 topological_sort.go:81] IAMRolePolicy/master-policyoverride: [IAMRole/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415907 745188 topological_sort.go:81] SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0: [SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415910 745188 topological_sort.go:81] AutoscalingLifecycleHook/nodes-us-east-1a-NTHLifecycleHook: [Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> LaunchTemplate/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> AutoscalingGroup/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415915 745188 topological_sort.go:81] ManagedFile/nodeupconfig-control-plane-us-east-1a: [BootstrapScript/control-plane-us-east-1a]
I0406 14:25:44.415919 745188 topological_sort.go:81] SecurityGroupRule/from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415923 745188 topological_sort.go:81] ManagedFile/etcd-cluster-spec-events: []
I0406 14:25:44.415928 745188 topological_sort.go:81] SecurityGroupRule/from-0.0.0.0/0-ingress-tcp-443to443-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415933 745188 topological_sort.go:81] Keypair/etcd-clients-ca: []
I0406 14:25:44.415936 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-aws-cloud-controller.addons.k8s.io-k8s-1.18: []
I0406 14:25:44.415939 745188 topological_sort.go:81] IAMInstanceProfileRole/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: [IAMInstanceProfile/nodes.bug-report-cluster-public.<DOMAIN_REDACTED> IAMRole/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415943 745188 topological_sort.go:81] SecurityGroupRule/from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415947 745188 topological_sort.go:81] AutoscalingGroup/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> LaunchTemplate/control-plane-us-east-1a.masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415956 745188 topological_sort.go:81] RouteTableAssociation/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>: [RouteTable/bug-report-cluster-public.<DOMAIN_REDACTED> Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415962 745188 topological_sort.go:81] Keypair/kubernetes-ca: []
I0406 14:25:44.415965 745188 topological_sort.go:81] BootstrapScript/nodes-us-east-1a: [Keypair/etcd-peers-ca-main Keypair/etcd-manager-ca-events Keypair/etcd-peers-ca-events Keypair/kubernetes-ca Keypair/etcd-clients-ca Keypair/etcd-manager-ca-main]
I0406 14:25:44.415970 745188 topological_sort.go:81] ManagedFile/manifests-etcdmanager-events-control-plane-us-east-1a: []
I0406 14:25:44.415973 745188 topological_sort.go:81] IAMRolePolicy/node-policyoverride: [IAMRole/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415977 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-networking.cilium.io-k8s-1.16: []
I0406 14:25:44.415980 745188 topological_sort.go:81] RouteTable/bug-report-cluster-public.<DOMAIN_REDACTED>: [VPC/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415984 745188 topological_sort.go:81] Secret/kube: []
I0406 14:25:44.415987 745188 topological_sort.go:81] SecurityGroupRule/from-0.0.0.0/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415991 745188 topological_sort.go:81] SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: [VPC/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.415995 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-limit-range.addons.k8s.io: []
I0406 14:25:44.415998 745188 topological_sort.go:81] SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-udp-1to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416003 745188 topological_sort.go:81] DHCPOptions/bug-report-cluster-public.<DOMAIN_REDACTED>: []
I0406 14:25:44.416006 745188 topological_sort.go:81] IAMInstanceProfile/masters.bug-report-cluster-public.<DOMAIN_REDACTED>: []
I0406 14:25:44.416010 745188 topological_sort.go:81] InternetGateway/bug-report-cluster-public.<DOMAIN_REDACTED>: [VPC/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416014 745188 topological_sort.go:81] ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17: []
I0406 14:25:44.416018 745188 topological_sort.go:81] SecurityGroupRule/from-0.0.0.0/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416021 745188 topological_sort.go:81] EventBridgeTarget/bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle-Target: [EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth]
I0406 14:25:44.416025 745188 topological_sort.go:81] WarmPool/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>: [Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> LaunchTemplate/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED> AutoscalingGroup/nodes-us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416030 745188 topological_sort.go:81] Secret/system:scheduler: []
I0406 14:25:44.416033 745188 topological_sort.go:81] IAMInstanceProfile/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>: []
I0406 14:25:44.416038 745188 topological_sort.go:81] EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange: [SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth]
I0406 14:25:44.416042 745188 topological_sort.go:81] Keypair/etcd-manager-ca-main: []
I0406 14:25:44.416046 745188 topological_sort.go:81] VPCAmazonIPv6CIDRBlock/AmazonIPv6: [VPC/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416049 745188 topological_sort.go:81] SecurityGroupRule/from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416053 745188 topological_sort.go:81] Keypair/etcd-manager-ca-events: []
I0406 14:25:44.416055 745188 topological_sort.go:81] VPCDHCPOptionsAssociation/bug-report-cluster-public.<DOMAIN_REDACTED>: [VPC/bug-report-cluster-public.<DOMAIN_REDACTED> DHCPOptions/bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416058 745188 topological_sort.go:81] Secret/admin: []
I0406 14:25:44.416060 745188 topological_sort.go:81] EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle: [SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth]
I0406 14:25:44.416062 745188 topological_sort.go:81] SecurityGroupRule/from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-0.0.0.0/0: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416064 745188 topological_sort.go:81] SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-4003to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>: [SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED> SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>]
I0406 14:25:44.416066 745188 topological_sort.go:81] EventBridgeTarget/bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption-Target: [EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth]
I0406 14:25:44.416069 745188 topological_sort.go:81] EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption: [SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth]
I0406 14:25:44.416172 745188 executor.go:111] Tasks: 0 done / 104 total; 45 can run
I0406 14:25:44.416290 745188 executor.go:192] Executing task "Secret/system:logging": *fitasks.Secret {"Name":"system:logging","Lifecycle":"Sync"}
I0406 14:25:44.416559 745188 executor.go:192] Executing task "Secret/admin": *fitasks.Secret {"Name":"admin","Lifecycle":"Sync"}
I0406 14:25:44.416608 745188 executor.go:192] Executing task "Secret/system:scheduler": *fitasks.Secret {"Name":"system:scheduler","Lifecycle":"Sync"}
I0406 14:25:44.416953 745188 executor.go:192] Executing task "ManagedFile/etcd-cluster-spec-events": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-events","Lifecycle":"Sync","Base":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/events","Location":"/control/etcd-cluster-spec","Contents":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.5.9\"\n}","PublicACL":null}
I0406 14:25:44.416418 745188 executor.go:192] Executing task "Keypair/etcd-peers-ca-main": *fitasks.Keypair {"Name":"etcd-peers-ca-main","alternateNames":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=etcd-peers-ca-main","issuer":"","type":"ca","oldFormat":false}
I0406 14:25:44.416395 745188 executor.go:192] Executing task "DNSZone/Z050288919G22381WZFHT": *awstasks.DNSZone {"Name":"Z050288919G22381WZFHT","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z050288919G22381WZFHT","Private":null,"PrivateVPC":null}
I0406 14:25:44.416402 745188 executor.go:192] Executing task "Keypair/etcd-manager-ca-events": *fitasks.Keypair {"Name":"etcd-manager-ca-events","alternateNames":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=etcd-manager-ca-events","issuer":"","type":"ca","oldFormat":false}
I0406 14:25:44.416429 745188 executor.go:192] Executing task "EBSVolume/a.etcd-main.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.EBSVolume {"Name":"a.etcd-main.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","AvailabilityZone":"us-east-1a","Encrypted":true,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/main":"a/a","k8s.io/role/control-plane":"1","k8s.io/role/master":"1","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"VolumeIops":3000,"VolumeThroughput":125,"VolumeType":"gp3"}
I0406 14:25:44.416323 745188 executor.go:192] Executing task "IAMInstanceProfile/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMInstanceProfile {"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ID":null,"Shared":false}
I0406 14:25:44.416450 745188 executor.go:192] Executing task "ManagedFile/manifests-static-kube-apiserver-healthcheck": *fitasks.ManagedFile {"Name":"manifests-static-kube-apiserver-healthcheck","Lifecycle":"Sync","Base":null,"Location":"manifests/static/kube-apiserver-healthcheck.yaml","Contents":"apiVersion: v1\nkind: Pod\nmetadata:\n creationTimestamp: null\nspec:\n containers:\n - args:\n - --ca-cert=/secrets/ca.crt\n - --client-cert=/secrets/client.crt\n - --client-key=/secrets/client.key\n image: registry.k8s.io/kops/kube-apiserver-healthcheck:1.28.4@sha256:d8637bc96afaa5aa8ee03b5808c40d8cd6bbb116fd383d6cd4a4eaad05e98c2f\n livenessProbe:\n httpGet:\n host: 127.0.0.1\n path: /.kube-apiserver-healthcheck/healthz\n port: 3990\n initialDelaySeconds: 5\n timeoutSeconds: 5\n name: healthcheck\n resources: {}\n securityContext:\n runAsNonRoot: true\n runAsUser: 10012\n volumeMounts:\n - mountPath: /secrets\n name: healthcheck-secrets\n readOnly: true\n volumes:\n - hostPath:\n path: /etc/kubernetes/kube-apiserver-healthcheck/secrets\n type: Directory\n name: healthcheck-secrets\nstatus: {}\n","PublicACL":null}
I0406 14:25:44.417146 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:logging"
I0406 14:25:44.417049 745188 executor.go:192] Executing task "ManagedFile/cluster-completed.spec": *fitasks.ManagedFile {"Name":"cluster-completed.spec","Lifecycle":"Sync","Base":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>","Location":"cluster-completed.spec","Contents":"apiVersion: kops.k8s.io/v1alpha2\nkind: Cluster\nmetadata:\n creationTimestamp: \"2024-04-06T19:25:15Z\"\n name: bug-report-cluster-public.<DOMAIN_REDACTED>\nspec:\n api:\n dns: {}\n authorization:\n rbac: {}\n channel: stable\n cloudConfig:\n awsEBSCSIDriver:\n enabled: true\n version: v1.14.1\n manageStorageClasses: true\n cloudControllerManager:\n allocateNodeCIDRs: true\n clusterCIDR: 100.96.0.0/11\n clusterName: bug-report-cluster-public.<DOMAIN_REDACTED>\n configureCloudRoutes: false\n image: registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1\n leaderElection:\n leaderElect: true\n cloudProvider: aws\n clusterDNSDomain: cluster.local\n configBase: s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>\n containerRuntime: containerd\n containerd:\n logLevel: info\n runc:\n version: 1.1.12\n version: 1.7.13\n dnsZone: Z050288919G22381WZFHT\n docker:\n skipInstall: true\n etcdClusters:\n - backups:\n backupStore: s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/main\n cpuRequest: 200m\n etcdMembers:\n - encryptedVolume: true\n instanceGroup: control-plane-us-east-1a\n name: a\n manager:\n backupRetentionDays: 90\n memoryRequest: 100Mi\n name: main\n version: 3.5.9\n - backups:\n backupStore: s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/events\n cpuRequest: 100m\n etcdMembers:\n - encryptedVolume: true\n instanceGroup: control-plane-us-east-1a\n name: a\n manager:\n backupRetentionDays: 90\n memoryRequest: 100Mi\n name: events\n version: 3.5.9\n externalDns:\n provider: dns-controller\n iam:\n allowContainerRegistry: true\n legacy: false\n keyStore: s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki\n kubeAPIServer:\n allowPrivileged: true\n anonymousAuth: false\n apiAudiences:\n - kubernetes.svc.default\n apiServerCount: 1\n authorizationMode: Node,RBAC\n bindAddress: 0.0.0.0\n cloudProvider: external\n enableAdmissionPlugins:\n - NamespaceLifecycle\n - LimitRanger\n - ServiceAccount\n - DefaultStorageClass\n - DefaultTolerationSeconds\n - MutatingAdmissionWebhook\n - ValidatingAdmissionWebhook\n - NodeRestriction\n - ResourceQuota\n etcdServers:\n - https://127.0.0.1:4001\n etcdServersOverrides:\n - /events#https://127.0.0.1:4002\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n image: registry.k8s.io/kube-apiserver:v1.28.6@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68\n kubeletPreferredAddressTypes:\n - InternalIP\n - Hostname\n - ExternalIP\n logLevel: 2\n requestheaderAllowedNames:\n - aggregator\n requestheaderExtraHeaderPrefixes:\n - X-Remote-Extra-\n requestheaderGroupHeaders:\n - X-Remote-Group\n requestheaderUsernameHeaders:\n - X-Remote-User\n securePort: 443\n serviceAccountIssuer: https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>\n serviceAccountJWKSURI: https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>/openid/v1/jwks\n serviceClusterIPRange: 100.64.0.0/13\n storageBackend: etcd3\n kubeControllerManager:\n allocateNodeCIDRs: true\n attachDetachReconcileSyncPeriod: 1m0s\n cloudProvider: external\n clusterCIDR: 100.96.0.0/11\n clusterName: bug-report-cluster-public.<DOMAIN_REDACTED>\n configureCloudRoutes: false\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n image: registry.k8s.io/kube-controller-manager:v1.28.6@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e\n leaderElection:\n leaderElect: true\n logLevel: 2\n useServiceAccountCredentials: true\n kubeDNS:\n cacheMaxConcurrent: 150\n cacheMaxSize: 1000\n cpuRequest: 100m\n domain: cluster.local\n memoryLimit: 170Mi\n memoryRequest: 70Mi\n nodeLocalDNS:\n cpuRequest: 25m\n enabled: false\n image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20\n memoryRequest: 5Mi\n provider: CoreDNS\n serverIP: 100.64.0.10\n kubeProxy:\n clusterCIDR: 100.96.0.0/11\n cpuRequest: 100m\n enabled: false\n image: registry.k8s.io/kube-proxy:v1.28.6@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a\n logLevel: 2\n kubeScheduler:\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n image: registry.k8s.io/kube-scheduler:v1.28.6@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39\n leaderElection:\n leaderElect: true\n logLevel: 2\n kubelet:\n anonymousAuth: false\n cgroupDriver: systemd\n cgroupRoot: /\n cloudProvider: external\n clusterDNS: 100.64.0.10\n clusterDomain: cluster.local\n enableDebuggingHandlers: true\n evictionHard: memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n kubeconfigPath: /var/lib/kubelet/kubeconfig\n logLevel: 2\n podInfraContainerImage: registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097\n podManifestPath: /etc/kubernetes/manifests\n protectKernelDefaults: true\n registerSchedulable: true\n shutdownGracePeriod: 30s\n shutdownGracePeriodCriticalPods: 10s\n kubernetesApiAccess:\n - 0.0.0.0/0\n - ::/0\n kubernetesVersion: 1.28.6\n masterKubelet:\n anonymousAuth: false\n cgroupDriver: systemd\n cgroupRoot: /\n cloudProvider: external\n clusterDNS: 100.64.0.10\n clusterDomain: cluster.local\n enableDebuggingHandlers: true\n evictionHard: memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n kubeconfigPath: /var/lib/kubelet/kubeconfig\n logLevel: 2\n podInfraContainerImage: registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097\n podManifestPath: /etc/kubernetes/manifests\n protectKernelDefaults: true\n registerSchedulable: true\n shutdownGracePeriod: 30s\n shutdownGracePeriodCriticalPods: 10s\n masterPublicName: api.bug-report-cluster-public.<DOMAIN_REDACTED>\n networkCIDR: 172.20.0.0/16\n networking:\n cilium:\n agentPrometheusPort: 9090\n bpfCTGlobalAnyMax: 262144\n bpfCTGlobalTCPMax: 524288\n bpfLBAlgorithm: random\n bpfLBMaglevTableSize: \"16381\"\n bpfLBMapMax: 65536\n bpfNATGlobalMax: 524288\n bpfNeighGlobalMax: 524288\n bpfPolicyMapMax: 16384\n clusterName: default\n cpuRequest: 25m\n disableCNPStatusUpdates: true\n disableMasquerade: false\n enableBPFMasquerade: false\n enableEndpointHealthChecking: true\n enableL7Proxy: true\n enableNodePort: true\n enableRemoteNodeIdentity: true\n enableUnreachableRoutes: false\n hubble:\n enabled: false\n identityAllocationMode: crd\n identityChangeGracePeriod: 5s\n ipam: kubernetes\n memoryRequest: 128Mi\n monitorAggregation: medium\n sidecarIstioProxyImage: cilium/istio_proxy\n toFqdnsDnsRejectResponseCode: refused\n tunnel: vxlan\n version: v1.13.10\n nodeTerminationHandler:\n cpuRequest: 50m\n enableRebalanceDraining: false\n enableRebalanceMonitoring: false\n enableScheduledEventDraining: true\n enableSpotInterruptionDraining: true\n enabled: true\n excludeFromLoadBalancers: true\n managedASGTag: aws-node-termination-handler/managed\n memoryRequest: 64Mi\n prometheusEnable: false\n version: v1.18.3\n nonMasqueradeCIDR: 100.64.0.0/10\n podCIDR: 100.96.0.0/11\n secretStore: s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets\n serviceClusterIPRange: 100.64.0.0/13\n sshAccess:\n - 0.0.0.0/0\n - ::/0\n subnets:\n - cidr: 172.20.0.0/16\n name: us-east-1a\n type: Public\n zone: us-east-1a\n topology:\n dns:\n type: Public\n","PublicACL":null}
I0406 14:25:44.417168 745188 executor.go:192] Executing task "Keypair/kubernetes-ca": *fitasks.Keypair {"Name":"kubernetes-ca","alternateNames":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes-ca","issuer":"","type":"ca","oldFormat":false}
I0406 14:25:44.417188 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-events/keyset.yaml"
I0406 14:25:44.416290 745188 executor.go:192] Executing task "ManagedFile/kops-version.txt": *fitasks.ManagedFile {"Name":"kops-version.txt","Lifecycle":"Sync","Base":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>","Location":"kops-version.txt","Contents":"1.28.4","PublicACL":null}
I0406 14:25:44.417226 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/kubernetes-ca/keyset.yaml"
I0406 14:25:44.417244 745188 executor.go:192] Executing task "Secret/kube": *fitasks.Secret {"Name":"kube","Lifecycle":"Sync"}
I0406 14:25:44.417276 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube"
I0406 14:25:44.417295 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:scheduler"
I0406 14:25:44.417288 745188 executor.go:192] Executing task "Keypair/etcd-manager-ca-main": *fitasks.Keypair {"Name":"etcd-manager-ca-main","alternateNames":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=etcd-manager-ca-main","issuer":"","type":"ca","oldFormat":false}
I0406 14:25:44.417324 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-main/keyset.yaml"
I0406 14:25:44.417319 745188 executor.go:192] Executing task "VPC/bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.VPC {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null}
I0406 14:25:44.416529 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-networking.cilium.io-k8s-1.16": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-networking.cilium.io-k8s-1.16","Lifecycle":"Sync","Base":null,"Location":"addons/networking.cilium.io/k8s-1.16-v1.13.yaml","Contents":"apiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n role.kubernetes.io/networking: \"1\"\n name: cilium\n namespace: kube-system\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n role.kubernetes.io/networking: \"1\"\n name: cilium-operator\n namespace: kube-system\n\n---\n\napiVersion: v1\ndata:\n agent-health-port: \"9879\"\n auto-direct-node-routes: \"false\"\n bpf-ct-global-any-max: \"262144\"\n bpf-ct-global-tcp-max: \"524288\"\n bpf-lb-algorithm: random\n bpf-lb-maglev-table-size: \"16381\"\n bpf-lb-map-max: \"65536\"\n bpf-lb-sock-hostns-only: \"false\"\n bpf-nat-global-max: \"524288\"\n bpf-neigh-global-max: \"524288\"\n bpf-policy-map-max: \"16384\"\n cgroup-root: /run/cilium/cgroupv2\n cluster-name: default\n debug: \"false\"\n disable-cnp-status-updates: \"true\"\n disable-endpoint-crd: \"false\"\n enable-bpf-masquerade: \"false\"\n enable-endpoint-health-checking: \"true\"\n enable-ipv4: \"true\"\n enable-ipv4-masquerade: \"true\"\n enable-ipv6: \"false\"\n enable-ipv6-masquerade: \"false\"\n enable-l7-proxy: \"true\"\n enable-node-port: \"true\"\n enable-remote-node-identity: \"true\"\n enable-service-topology: \"false\"\n enable-unreachable-routes: \"false\"\n identity-allocation-mode: crd\n identity-change-grace-period: 5s\n install-iptables-rules: \"true\"\n ipam: kubernetes\n kube-proxy-replacement: strict\n monitor-aggregation: medium\n nodes-gc-interval: 5m0s\n preallocate-bpf-maps: \"false\"\n sidecar-istio-proxy-image: cilium/istio_proxy\n tofqdns-dns-reject-response-code: refused\n tofqdns-enable-poller: \"false\"\n tunnel: vxlan\nkind: ConfigMap\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n role.kubernetes.io/networking: \"1\"\n name: cilium-config\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n role.kubernetes.io/networking: \"1\"\n name: cilium\nrules:\n- apiGroups:\n - networking.k8s.io\n resources:\n - networkpolicies\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - discovery.k8s.io\n resources:\n - endpointslices\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - namespaces\n - services\n - pods\n - endpoints\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - apiextensions.k8s.io\n resources:\n - customresourcedefinitions\n verbs:\n - list\n - watch\n - get\n- apiGroups:\n - cilium.io\n resources:\n - ciliumloadbalancerippools\n - ciliumbgppeeringpolicies\n - ciliumclusterwideenvoyconfigs\n - ciliumclusterwidenetworkpolicies\n - ciliumegressgatewaypolicies\n - ciliumegressnatpolicies\n - ciliumendpoints\n - ciliumendpointslices\n - ciliumenvoyconfigs\n - ciliumidentities\n - ciliumlocalredirectpolicies\n - ciliumnetworkpolicies\n - ciliumnodes\n verbs:\n - list\n - watch\n- apiGroups:\n - cilium.io\n resources:\n - ciliumidentities\n - ciliumendpoints\n - ciliumnodes\n verbs:\n - create\n- apiGroups:\n - cilium.io\n resources:\n - ciliumidentities\n verbs:\n - update\n- apiGroups:\n - cilium.io\n resources:\n - ciliumendpoints\n verbs:\n - delete\n - get\n- apiGroups:\n - cilium.io\n resources:\n - ciliumnodes\n - ciliumnodes/status\n verbs:\n - get\n - update\n- apiGroups:\n - cilium.io\n resources:\n - ciliumnetworkpolicies/status\n - ciliumclusterwidenetworkpolicies/status\n - ciliumendpoints/status\n - ciliumendpoints\n verbs:\n - patch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n role.kubernetes.io/networking: \"1\"\n name: cilium-operator\nrules:\n- apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - discovery.k8s.io\n resources:\n - endpointslices\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - services\n - endpoints\n - namespaces\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - cilium.io\n resources:\n - ciliumnetworkpolicies\n - ciliumclusterwidenetworkpolicies\n verbs:\n - create\n - update\n - deletecollection\n - patch\n - get\n - list\n - watch\n- apiGroups:\n - cilium.io\n resources:\n - ciliumnetworkpolicies/status\n - ciliumclusterwidenetworkpolicies/status\n verbs:\n - patch\n - update\n- apiGroups:\n - cilium.io\n resources:\n - ciliumendpoints\n - ciliumidentities\n verbs:\n - delete\n - list\n - watch\n- apiGroups:\n - cilium.io\n resources:\n - ciliumidentities\n verbs:\n - update\n- apiGroups:\n - cilium.io\n resources:\n - ciliumnodes\n verbs:\n - create\n - update\n - get\n - list\n - watch\n - delete\n- apiGroups:\n - cilium.io\n resources:\n - ciliumnodes/status\n verbs:\n - update\n- apiGroups:\n - cilium.io\n resources:\n - ciliumendpointslices\n - ciliumenvoyconfigs\n verbs:\n - create\n - update\n - get\n - list\n - watch\n - delete\n - patch\n- apiGroups:\n - apiextensions.k8s.io\n resources:\n - customresourcedefinitions\n verbs:\n - create\n - get\n - list\n - watch\n- apiGroups:\n - apiextensions.k8s.io\n resourceNames:\n - ciliumloadbalancerippools.cilium.io\n - ciliumbgppeeringpolicies.cilium.io\n - ciliumclusterwideenvoyconfigs.cilium.io\n - ciliumclusterwidenetworkpolicies.cilium.io\n - ciliumegressgatewaypolicies.cilium.io\n - ciliumegressnatpolicies.cilium.io\n - ciliumendpoints.cilium.io\n - ciliumendpointslices.cilium.io\n - ciliumenvoyconfigs.cilium.io\n - ciliumexternalworkloads.cilium.io\n - ciliumidentities.cilium.io\n - ciliumlocalredirectpolicies.cilium.io\n - ciliumnetworkpolicies.cilium.io\n - ciliumnodes.cilium.io\n resources:\n - customresourcedefinitions\n verbs:\n - update\n- apiGroups:\n - cilium.io\n resources:\n - ciliumloadbalancerippools\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - cilium.io\n resources:\n - ciliumloadbalancerippools/status\n verbs:\n - patch\n- apiGroups:\n - coordination.k8s.io\n resources:\n - leases\n verbs:\n - create\n - get\n - update\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n role.kubernetes.io/networking: \"1\"\n name: cilium\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: cilium\nsubjects:\n- kind: ServiceAccount\n name: cilium\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n role.kubernetes.io/networking: \"1\"\n name: cilium-operator\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: cilium-operator\nsubjects:\n- kind: ServiceAccount\n name: cilium-operator\n namespace: kube-system\n\n---\n\napiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n k8s-app: cilium\n kubernetes.io/cluster-service: \"true\"\n role.kubernetes.io/networking: \"1\"\n name: cilium\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: cilium\n kubernetes.io/cluster-service: \"true\"\n template:\n metadata:\n creationTimestamp: null\n labels:\n k8s-app: cilium\n kops.k8s.io/managed-by: kops\n kubernetes.io/cluster-service: \"true\"\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: kubernetes.io/os\n operator: In\n values:\n - linux\n containers:\n - args:\n - --config-dir=/tmp/cilium/config-map\n command:\n - cilium-agent\n env:\n - name: K8S_NODE_NAME\n valueFrom:\n fieldRef:\n apiVersion: v1\n fieldPath: spec.nodeName\n - name: CILIUM_K8S_NAMESPACE\n valueFrom:\n fieldRef:\n apiVersion: v1\n fieldPath: metadata.namespace\n - name: CILIUM_CLUSTERMESH_CONFIG\n value: /var/lib/cilium/clustermesh/\n - name: CILIUM_CNI_CHAINING_MODE\n valueFrom:\n configMapKeyRef:\n key: cni-chaining-mode\n name: cilium-config\n optional: true\n - name: CILIUM_CUSTOM_CNI_CONF\n valueFrom:\n configMapKeyRef:\n key: custom-cni-conf\n name: cilium-config\n optional: true\n - name: KUBERNETES_SERVICE_HOST\n value: api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>\n - name: KUBERNETES_SERVICE_PORT\n value: \"443\"\n image: quay.io/cilium/cilium:v1.13.10@sha256:aff23a5d4daf06623d10f7ff6a8a7b617c22c1f8d63f507fd33ef3a80ba4779f\n imagePullPolicy: IfNotPresent\n lifecycle:\n postStart:\n exec:\n command:\n - /cni-install.sh\n - --cni-exclusive=true\n preStop:\n exec:\n command:\n - /cni-uninstall.sh\n livenessProbe:\n failureThreshold: 10\n httpGet:\n host: 127.0.0.1\n httpHeaders:\n - name: brief\n value: \"true\"\n path: /healthz\n port: 9879\n scheme: HTTP\n periodSeconds: 30\n successThreshold: 1\n timeoutSeconds: 5\n name: cilium-agent\n readinessProbe:\n failureThreshold: 3\n httpGet:\n host: 127.0.0.1\n httpHeaders:\n - name: brief\n value: \"true\"\n path: /healthz\n port: 9879\n scheme: HTTP\n initialDelaySeconds: 5\n periodSeconds: 30\n successThreshold: 1\n timeoutSeconds: 5\n resources:\n requests:\n cpu: 25m\n memory: 128Mi\n securityContext:\n privileged: true\n startupProbe:\n failureThreshold: 105\n httpGet:\n host: 127.0.0.1\n httpHeaders:\n - name: brief\n value: \"true\"\n path: /healthz\n port: 9879\n scheme: HTTP\n periodSeconds: 2\n successThreshold: null\n terminationMessagePolicy: FallbackToLogsOnError\n volumeMounts:\n - mountPath: /sys/fs/bpf\n mountPropagation: Bidirectional\n name: bpf-maps\n - mountPath: /var/run/cilium\n name: cilium-run\n - mountPath: /host/etc/cni/net.d\n name: etc-cni-netd\n - mountPath: /var/lib/cilium/clustermesh\n name: clustermesh-secrets\n readOnly: true\n - mountPath: /tmp/cilium/config-map\n name: cilium-config-path\n readOnly: true\n - mountPath: /lib/modules\n name: lib-modules\n readOnly: true\n - mountPath: /run/xtables.lock\n name: xtables-lock\n hostNetwork: true\n initContainers:\n - command:\n - /install-plugin.sh\n image: quay.io/cilium/cilium:v1.13.10@sha256:aff23a5d4daf06623d10f7ff6a8a7b617c22c1f8d63f507fd33ef3a80ba4779f\n imagePullPolicy: IfNotPresent\n name: install-cni-binaries\n resources:\n requests:\n cpu: 100m\n memory: 10Mi\n securityContext:\n capabilities:\n drop:\n - ALL\n terminationMessagePath: /dev/termination-log\n terminationMessagePolicy: FallbackToLogsOnError\n volumeMounts:\n - mountPath: /host/opt/cni/bin\n name: cni-path\n - command:\n - /init-container.sh\n env:\n - name: CILIUM_ALL_STATE\n valueFrom:\n configMapKeyRef:\n key: clean-cilium-state\n name: cilium-config\n optional: true\n - name: CILIUM_BPF_STATE\n valueFrom:\n configMapKeyRef:\n key: clean-cilium-bpf-state\n name: cilium-config\n optional: true\n image: quay.io/cilium/cilium:v1.13.10@sha256:aff23a5d4daf06623d10f7ff6a8a7b617c22c1f8d63f507fd33ef3a80ba4779f\n imagePullPolicy: IfNotPresent\n name: clean-cilium-state\n resources:\n limits:\n memory: 100Mi\n requests:\n cpu: 100m\n memory: 100Mi\n securityContext:\n privileged: true\n terminationMessagePolicy: FallbackToLogsOnError\n volumeMounts:\n - mountPath: /sys/fs/bpf\n name: bpf-maps\n - mountPath: /run/cilium/cgroupv2\n mountPropagation: HostToContainer\n name: cilium-cgroup\n - mountPath: /var/run/cilium\n name: cilium-run\n priorityClassName: system-node-critical\n restartPolicy: Always\n serviceAccount: cilium\n serviceAccountName: cilium\n terminationGracePeriodSeconds: 1\n tolerations:\n - operator: Exists\n volumes:\n - hostPath:\n path: /var/run/cilium\n type: DirectoryOrCreate\n name: cilium-run\n - hostPath:\n path: /sys/fs/bpf\n type: DirectoryOrCreate\n name: bpf-maps\n - hostPath:\n path: /opt/cni/bin\n type: DirectoryOrCreate\n name: cni-path\n - hostPath:\n path: /run/cilium/cgroupv2\n type: Directory\n name: cilium-cgroup\n - hostPath:\n path: /etc/cni/net.d\n type: DirectoryOrCreate\n name: etc-cni-netd\n - hostPath:\n path: /lib/modules\n name: lib-modules\n - hostPath:\n path: /run/xtables.lock\n type: FileOrCreate\n name: xtables-lock\n - name: clustermesh-secrets\n secret:\n defaultMode: 420\n optional: true\n secretName: cilium-clustermesh\n - configMap:\n name: cilium-config\n name: cilium-config-path\n updateStrategy:\n type: OnDelete\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n io.cilium/app: operator\n name: cilium-operator\n role.kubernetes.io/networking: \"1\"\n name: cilium-operator\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n io.cilium/app: operator\n name: cilium-operator\n strategy:\n rollingUpdate:\n maxSurge: 1\n maxUnavailable: 1\n type: RollingUpdate\n template:\n metadata:\n creationTimestamp: null\n labels:\n io.cilium/app: operator\n kops.k8s.io/managed-by: kops\n name: cilium-operator\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n - matchExpressions:\n - key: node-role.kubernetes.io/master\n operator: Exists\n containers:\n - args:\n - --config-dir=/tmp/cilium/config-map\n - --debug=$(CILIUM_DEBUG)\n - --eni-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>\n command:\n - cilium-operator\n env:\n - name: K8S_NODE_NAME\n valueFrom:\n fieldRef:\n apiVersion: v1\n fieldPath: spec.nodeName\n - name: CILIUM_K8S_NAMESPACE\n valueFrom:\n fieldRef:\n apiVersion: v1\n fieldPath: metadata.namespace\n - name: CILIUM_DEBUG\n valueFrom:\n configMapKeyRef:\n key: debug\n name: cilium-config\n optional: true\n - name: KUBERNETES_SERVICE_HOST\n value: api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>\n - name: KUBERNETES_SERVICE_PORT\n value: \"443\"\n image: quay.io/cilium/operator:v1.13.10@sha256:1b51da9c4fa162f2efe470a3e8a0128ebbdb48821d7dd818216b063b89e06705\n imagePullPolicy: IfNotPresent\n livenessProbe:\n httpGet:\n host: 127.0.0.1\n path: /healthz\n port: 9234\n scheme: HTTP\n initialDelaySeconds: 60\n periodSeconds: 10\n timeoutSeconds: 3\n name: cilium-operator\n resources:\n requests:\n cpu: 25m\n memory: 128Mi\n terminationMessagePolicy: FallbackToLogsOnError\n volumeMounts:\n - mountPath: /tmp/cilium/config-map\n name: cilium-config-path\n readOnly: true\n hostNetwork: true\n nodeSelector: null\n priorityClassName: system-cluster-critical\n restartPolicy: Always\n serviceAccount: cilium-operator\n serviceAccountName: cilium-operator\n tolerations:\n - operator: Exists\n topologySpreadConstraints:\n - labelSelector:\n matchLabels:\n io.cilium/app: operator\n name: cilium-operator\n maxSkew: 1\n topologyKey: topology.kubernetes.io/zone\n whenUnsatisfiable: ScheduleAnyway\n - labelSelector:\n matchLabels:\n io.cilium/app: operator\n name: cilium-operator\n maxSkew: 1\n topologyKey: kubernetes.io/hostname\n whenUnsatisfiable: DoNotSchedule\n volumes:\n - configMap:\n name: cilium-config\n name: cilium-config-path\n\n---\n\napiVersion: policy/v1\nkind: PodDisruptionBudget\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: networking.cilium.io\n app.kubernetes.io/managed-by: kops\n io.cilium/app: operator\n name: cilium-operator\n role.kubernetes.io/networking: \"1\"\n name: cilium-operator\n namespace: kube-system\nspec:\n maxUnavailable: 1\n selector:\n matchLabels:\n io.cilium/app: operator\n name: cilium-operator","PublicACL":null}
I0406 14:25:44.417360 745188 executor.go:192] Executing task "Keypair/service-account": *fitasks.Keypair {"Name":"service-account","alternateNames":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=service-account","issuer":"","type":"ca","oldFormat":false}
I0406 14:25:44.417123 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-aws-cloud-controller.addons.k8s.io-k8s-1.18": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-aws-cloud-controller.addons.k8s.io-k8s-1.18","Lifecycle":"Sync","Base":null,"Location":"addons/aws-cloud-controller.addons.k8s.io/k8s-1.18.yaml","Contents":"apiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: aws-cloud-controller.addons.k8s.io\n k8s-app: aws-cloud-controller-manager\n name: aws-cloud-controller-manager\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: aws-cloud-controller-manager\n template:\n metadata:\n creationTimestamp: null\n labels:\n k8s-app: aws-cloud-controller-manager\n kops.k8s.io/managed-by: kops\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n - matchExpressions:\n - key: node-role.kubernetes.io/master\n operator: Exists\n containers:\n - args:\n - --allocate-node-cidrs=true\n - --cluster-cidr=100.96.0.0/11\n - --cluster-name=bug-report-cluster-public.<DOMAIN_REDACTED>\n - --configure-cloud-routes=false\n - --leader-elect=true\n - --v=2\n - --cloud-provider=aws\n - --use-service-account-credentials=true\n - --cloud-config=/etc/kubernetes/cloud.config\n env:\n - name: KUBERNETES_SERVICE_HOST\n value: 127.0.0.1\n image: registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1@sha256:79b423ac8bc52d00f932b40de11fc3047a5ed1cbec47cda23bcf8f45ef583ed1\n imagePullPolicy: IfNotPresent\n name: aws-cloud-controller-manager\n resources:\n requests:\n cpu: 200m\n volumeMounts:\n - mountPath: /etc/kubernetes/cloud.config\n name: cloudconfig\n readOnly: true\n hostNetwork: true\n nodeSelector: null\n priorityClassName: system-cluster-critical\n serviceAccountName: aws-cloud-controller-manager\n tolerations:\n - effect: NoSchedule\n key: node.cloudprovider.kubernetes.io/uninitialized\n value: \"true\"\n - effect: NoSchedule\n key: node.kubernetes.io/not-ready\n - effect: NoSchedule\n key: node-role.kubernetes.io/control-plane\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n volumes:\n - hostPath:\n path: /etc/kubernetes/cloud.config\n type: \"\"\n name: cloudconfig\n updateStrategy:\n type: RollingUpdate\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: aws-cloud-controller.addons.k8s.io\n name: aws-cloud-controller-manager\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: aws-cloud-controller.addons.k8s.io\n name: cloud-controller-manager:apiserver-authentication-reader\n namespace: kube-system\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: Role\n name: extension-apiserver-authentication-reader\nsubjects:\n- apiGroup: \"\"\n kind: ServiceAccount\n name: aws-cloud-controller-manager\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: aws-cloud-controller.addons.k8s.io\n name: system:cloud-controller-manager\nrules:\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - update\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - '*'\n- apiGroups:\n - \"\"\n resources:\n - nodes/status\n verbs:\n - patch\n- apiGroups:\n - \"\"\n resources:\n - services\n verbs:\n - list\n - patch\n - update\n - watch\n- apiGroups:\n - \"\"\n resources:\n - services/status\n verbs:\n - list\n - patch\n - update\n - watch\n- apiGroups:\n - \"\"\n resources:\n - serviceaccounts\n verbs:\n - create\n - get\n- apiGroups:\n - \"\"\n resources:\n - persistentvolumes\n verbs:\n - get\n - list\n - update\n - watch\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n verbs:\n - create\n - get\n - list\n - watch\n - update\n- apiGroups:\n - coordination.k8s.io\n resources:\n - leases\n verbs:\n - create\n - get\n - list\n - watch\n - update\n- apiGroups:\n - \"\"\n resources:\n - secrets\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resourceNames:\n - node-controller\n - service-controller\n - route-controller\n resources:\n - serviceaccounts/token\n verbs:\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-cloud-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: aws-cloud-controller.addons.k8s.io\n name: system:cloud-controller-manager\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:cloud-controller-manager\nsubjects:\n- apiGroup: \"\"\n kind: ServiceAccount\n name: aws-cloud-controller-manager\n namespace: kube-system","PublicACL":null}
I0406 14:25:44.417402 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/service-account/keyset.yaml"
I0406 14:25:44.417406 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-main/keyset.yaml"
I0406 14:25:44.417410 745188 executor.go:192] Executing task "Secret/kube-proxy": *fitasks.Secret {"Name":"kube-proxy","Lifecycle":"Sync"}
I0406 14:25:44.416290 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-coredns.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-coredns.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Base":null,"Location":"addons/coredns.addons.k8s.io/k8s-1.12.yaml","Contents":"apiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n kubernetes.io/cluster-service: \"true\"\n name: coredns\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n kubernetes.io/bootstrapping: rbac-defaults\n name: system:coredns\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - namespaces\n verbs:\n - list\n - watch\n- apiGroups:\n - discovery.k8s.io\n resources:\n - endpointslices\n verbs:\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n annotations:\n rbac.authorization.kubernetes.io/autoupdate: \"true\"\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n kubernetes.io/bootstrapping: rbac-defaults\n name: system:coredns\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:coredns\nsubjects:\n- kind: ServiceAccount\n name: coredns\n namespace: kube-system\n\n---\n\napiVersion: v1\ndata:\n Corefile: |-\n .:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local. in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus :9153\n forward . /etc/resolv.conf {\n max_concurrent 1000\n }\n cache 30\n loop\n reload\n loadbalance\n }\nkind: ConfigMap\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n addonmanager.kubernetes.io/mode: EnsureExists\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n name: coredns\n namespace: kube-system\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: CoreDNS\n name: coredns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 1\n type: RollingUpdate\n template:\n metadata:\n creationTimestamp: null\n labels:\n k8s-app: kube-dns\n kops.k8s.io/managed-by: kops\n spec:\n containers:\n - args:\n - -conf\n - /etc/coredns/Corefile\n image: registry.k8s.io/coredns/coredns:v1.10.1@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n imagePullPolicy: IfNotPresent\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /health\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: coredns\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n - containerPort: 9153\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /ready\n port: 8181\n scheme: HTTP\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n securityContext:\n allowPrivilegeEscalation: false\n capabilities:\n add:\n - NET_BIND_SERVICE\n drop:\n - all\n readOnlyRootFilesystem: true\n volumeMounts:\n - mountPath: /etc/coredns\n name: config-volume\n readOnly: true\n dnsPolicy: Default\n nodeSelector:\n kubernetes.io/os: linux\n priorityClassName: system-cluster-critical\n serviceAccountName: coredns\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n topologySpreadConstraints:\n - labelSelector:\n matchLabels:\n k8s-app: kube-dns\n maxSkew: 1\n topologyKey: topology.kubernetes.io/zone\n whenUnsatisfiable: ScheduleAnyway\n - labelSelector:\n matchLabels:\n k8s-app: kube-dns\n maxSkew: 1\n topologyKey: kubernetes.io/hostname\n whenUnsatisfiable: ScheduleAnyway\n volumes:\n - configMap:\n name: coredns\n name: config-volume\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n annotations:\n prometheus.io/port: \"9153\"\n prometheus.io/scrape: \"true\"\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: CoreDNS\n name: kube-dns\n namespace: kube-system\n resourceVersion: \"0\"\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n - name: metrics\n port: 9153\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: policy/v1\nkind: PodDisruptionBudget\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n name: kube-dns\n namespace: kube-system\nspec:\n maxUnavailable: 50%\n selector:\n matchLabels:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n name: coredns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n name: coredns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n - apps\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n name: coredns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: coredns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: coredns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: coredns.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: coredns.addons.k8s.io\n k8s-app: coredns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: coredns-autoscaler\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: coredns-autoscaler\n template:\n metadata:\n creationTimestamp: null\n labels:\n k8s-app: coredns-autoscaler\n kops.k8s.io/managed-by: kops\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=coredns-autoscaler\n - --target=Deployment/coredns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: registry.k8s.io/cpa/cluster-proportional-autoscaler:v1.8.8@sha256:69bf675e356770c651864305f2ce17ec25623ac0ff77a040f9396e72daba2d5f\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n nodeSelector:\n kubernetes.io/os: linux\n priorityClassName: system-cluster-critical\n serviceAccountName: coredns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists","PublicACL":null}
I0406 14:25:44.417388 745188 executor.go:192] Executing task "Secret/kubelet": *fitasks.Secret {"Name":"kubelet","Lifecycle":"Sync"}
I0406 14:25:44.416603 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-aws-ebs-csi-driver.addons.k8s.io-k8s-1.17","Lifecycle":"Sync","Base":null,"Location":"addons/aws-ebs-csi-driver.addons.k8s.io/k8s-1.17.yaml","Contents":"apiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-controller-sa\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-external-attacher-role\nrules:\n- apiGroups:\n - \"\"\n resources:\n - persistentvolumes\n verbs:\n - get\n - list\n - watch\n - update\n - patch\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - csi.storage.k8s.io\n resources:\n - csinodeinfos\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - storage.k8s.io\n resources:\n - volumeattachments\n verbs:\n - get\n - list\n - watch\n - update\n - patch\n- apiGroups:\n - storage.k8s.io\n resources:\n - volumeattachments/status\n verbs:\n - patch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-external-provisioner-role\nrules:\n- apiGroups:\n - \"\"\n resources:\n - persistentvolumes\n verbs:\n - get\n - list\n - watch\n - create\n - delete\n- apiGroups:\n - \"\"\n resources:\n - persistentvolumeclaims\n verbs:\n - get\n - list\n - watch\n - update\n- apiGroups:\n - storage.k8s.io\n resources:\n - storageclasses\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - list\n - watch\n - create\n - update\n - patch\n- apiGroups:\n - snapshot.storage.k8s.io\n resources:\n - volumesnapshots\n verbs:\n - get\n - list\n- apiGroups:\n - snapshot.storage.k8s.io\n resources:\n - volumesnapshotcontents\n verbs:\n - get\n - list\n- apiGroups:\n - storage.k8s.io\n resources:\n - csinodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - coordination.k8s.io\n resources:\n - leases\n verbs:\n - get\n - watch\n - list\n - delete\n - update\n - create\n- apiGroups:\n - storage.k8s.io\n resources:\n - volumeattachments\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-external-resizer-role\nrules:\n- apiGroups:\n - \"\"\n resources:\n - persistentvolumes\n verbs:\n - get\n - list\n - watch\n - update\n - patch\n- apiGroups:\n - \"\"\n resources:\n - persistentvolumeclaims\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - persistentvolumeclaims/status\n verbs:\n - update\n - patch\n- apiGroups:\n - storage.k8s.io\n resources:\n - storageclasses\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - list\n - watch\n - create\n - update\n - patch\n- apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-external-snapshotter-role\nrules:\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - list\n - watch\n - create\n - update\n - patch\n- apiGroups:\n - \"\"\n resources:\n - secrets\n verbs:\n - get\n - list\n- apiGroups:\n - snapshot.storage.k8s.io\n resources:\n - volumesnapshotclasses\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - snapshot.storage.k8s.io\n resources:\n - volumesnapshotcontents\n verbs:\n - create\n - get\n - list\n - watch\n - update\n - delete\n - patch\n- apiGroups:\n - snapshot.storage.k8s.io\n resources:\n - volumesnapshotcontents/status\n verbs:\n - update\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-attacher-binding\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: ebs-external-attacher-role\nsubjects:\n- kind: ServiceAccount\n name: ebs-csi-controller-sa\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-provisioner-binding\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: ebs-external-provisioner-role\nsubjects:\n- kind: ServiceAccount\n name: ebs-csi-controller-sa\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-resizer-binding\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: ebs-external-resizer-role\nsubjects:\n- kind: ServiceAccount\n name: ebs-csi-controller-sa\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-snapshotter-binding\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: ebs-external-snapshotter-role\nsubjects:\n- kind: ServiceAccount\n name: ebs-csi-controller-sa\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-node-getter-binding\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: ebs-csi-node-role\nsubjects:\n- kind: ServiceAccount\n name: ebs-csi-node-sa\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-node-role\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-node-sa\n namespace: kube-system\n\n---\n\napiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-node\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n app: ebs-csi-node\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/name: aws-ebs-csi-driver\n template:\n metadata:\n creationTimestamp: null\n labels:\n app: ebs-csi-node\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n kops.k8s.io/managed-by: kops\n spec:\n containers:\n - args:\n - node\n - --endpoint=$(CSI_ENDPOINT)\n - --logtostderr\n - --v=2\n env:\n - name: CSI_ENDPOINT\n value: unix:/csi/csi.sock\n - name: CSI_NODE_NAME\n valueFrom:\n fieldRef:\n fieldPath: spec.nodeName\n image: registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1@sha256:f0c5de192d832e7c1daa6580d4a62e8fa6fc8eabc0917ae4cb7ed4d15e95b59e\n imagePullPolicy: IfNotPresent\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz\n port: healthz\n initialDelaySeconds: 10\n periodSeconds: 10\n timeoutSeconds: 3\n name: ebs-plugin\n ports:\n - containerPort: 9808\n name: healthz\n protocol: TCP\n securityContext:\n privileged: true\n readOnlyRootFilesystem: true\n volumeMounts:\n - mountPath: /var/lib/kubelet\n mountPropagation: Bidirectional\n name: kubelet-dir\n - mountPath: /csi\n name: plugin-dir\n - mountPath: /dev\n name: device-dir\n - args:\n - --csi-address=$(ADDRESS)\n - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)\n - --v=5\n env:\n - name: ADDRESS\n value: /csi/csi.sock\n - name: DRIVER_REG_SOCK_PATH\n value: /var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock\n image: registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.5.1@sha256:0103eee7c35e3e0b5cd8cdca9850dc71c793cdeb6669d8be7a89440da2d06ae4\n imagePullPolicy: IfNotPresent\n name: node-driver-registrar\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n volumeMounts:\n - mountPath: /csi\n name: plugin-dir\n - mountPath: /registration\n name: registration-dir\n - args:\n - --csi-address=/csi/csi.sock\n image: registry.k8s.io/sig-storage/livenessprobe:v2.6.0@sha256:406f59599991916d2942d8d02f076d957ed71b541ee19f09fc01723a6e6f5932\n imagePullPolicy: IfNotPresent\n name: liveness-probe\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n volumeMounts:\n - mountPath: /csi\n name: plugin-dir\n nodeSelector:\n kubernetes.io/os: linux\n priorityClassName: system-node-critical\n securityContext:\n fsGroup: 0\n runAsGroup: 0\n runAsNonRoot: false\n runAsUser: 0\n serviceAccountName: ebs-csi-node-sa\n tolerations:\n - operator: Exists\n volumes:\n - hostPath:\n path: /var/lib/kubelet\n type: Directory\n name: kubelet-dir\n - hostPath:\n path: /var/lib/kubelet/plugins/ebs.csi.aws.com/\n type: DirectoryOrCreate\n name: plugin-dir\n - hostPath:\n path: /var/lib/kubelet/plugins_registry/\n type: Directory\n name: registration-dir\n - hostPath:\n path: /dev\n type: Directory\n name: device-dir\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n app: ebs-csi-controller\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/name: aws-ebs-csi-driver\n template:\n metadata:\n creationTimestamp: null\n labels:\n app: ebs-csi-controller\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n kops.k8s.io/managed-by: kops\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n - key: kubernetes.io/os\n operator: In\n values:\n - linux\n - matchExpressions:\n - key: node-role.kubernetes.io/master\n operator: Exists\n - key: kubernetes.io/os\n operator: In\n values:\n - linux\n containers:\n - args:\n - controller\n - --endpoint=$(CSI_ENDPOINT)\n - --logtostderr\n - --k8s-tag-cluster-id=bug-report-cluster-public.<DOMAIN_REDACTED>\n - --extra-tags=KubernetesCluster=bug-report-cluster-public.<DOMAIN_REDACTED>\n - --http-endpoint=0.0.0.0:3301\n - --v=5\n env:\n - name: CSI_ENDPOINT\n value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock\n - name: CSI_NODE_NAME\n valueFrom:\n fieldRef:\n apiVersion: v1\n fieldPath: spec.nodeName\n - name: AWS_ACCESS_KEY_ID\n valueFrom:\n secretKeyRef:\n key: key_id\n name: aws-secret\n optional: true\n - name: AWS_SECRET_ACCESS_KEY\n valueFrom:\n secretKeyRef:\n key: access_key\n name: aws-secret\n optional: true\n image: registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1@sha256:f0c5de192d832e7c1daa6580d4a62e8fa6fc8eabc0917ae4cb7ed4d15e95b59e\n imagePullPolicy: IfNotPresent\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz\n port: healthz\n initialDelaySeconds: 10\n periodSeconds: 10\n timeoutSeconds: 3\n name: ebs-plugin\n ports:\n - containerPort: 9808\n name: healthz\n protocol: TCP\n - containerPort: 3301\n name: metrics\n protocol: TCP\n readinessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz\n port: healthz\n initialDelaySeconds: 10\n periodSeconds: 10\n timeoutSeconds: 3\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n volumeMounts:\n - mountPath: /var/lib/csi/sockets/pluginproxy/\n name: socket-dir\n - args:\n - --csi-address=$(ADDRESS)\n - --v=5\n - --feature-gates=Topology=true\n - --extra-create-metadata\n - --leader-election=true\n - --default-fstype=ext4\n env:\n - name: ADDRESS\n value: /var/lib/csi/sockets/pluginproxy/csi.sock\n image: registry.k8s.io/sig-storage/csi-provisioner:v3.1.0@sha256:122bfb8c1edabb3c0edd63f06523e6940d958d19b3957dc7b1d6f81e9f1f6119\n imagePullPolicy: IfNotPresent\n name: csi-provisioner\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n volumeMounts:\n - mountPath: /var/lib/csi/sockets/pluginproxy/\n name: socket-dir\n - args:\n - --csi-address=$(ADDRESS)\n - --v=5\n - --leader-election=true\n env:\n - name: ADDRESS\n value: /var/lib/csi/sockets/pluginproxy/csi.sock\n image: registry.k8s.io/sig-storage/csi-attacher:v3.4.0@sha256:8b9c313c05f54fb04f8d430896f5f5904b6cb157df261501b29adc04d2b2dc7b\n imagePullPolicy: IfNotPresent\n name: csi-attacher\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n volumeMounts:\n - mountPath: /var/lib/csi/sockets/pluginproxy/\n name: socket-dir\n - args:\n - --csi-address=$(ADDRESS)\n - --v=5\n env:\n - name: ADDRESS\n value: /var/lib/csi/sockets/pluginproxy/csi.sock\n image: registry.k8s.io/sig-storage/csi-resizer:v1.4.0@sha256:9ebbf9f023e7b41ccee3d52afe39a89e3ddacdbb69269d583abfc25847cfd9e4\n imagePullPolicy: IfNotPresent\n name: csi-resizer\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n volumeMounts:\n - mountPath: /var/lib/csi/sockets/pluginproxy/\n name: socket-dir\n - args:\n - --csi-address=/csi/csi.sock\n image: registry.k8s.io/sig-storage/livenessprobe:v2.6.0@sha256:406f59599991916d2942d8d02f076d957ed71b541ee19f09fc01723a6e6f5932\n imagePullPolicy: IfNotPresent\n name: liveness-probe\n volumeMounts:\n - mountPath: /csi\n name: socket-dir\n hostNetwork: true\n nodeSelector: null\n priorityClassName: system-cluster-critical\n securityContext:\n fsGroup: 1000\n runAsGroup: 1000\n runAsNonRoot: true\n runAsUser: 1000\n serviceAccountName: ebs-csi-controller-sa\n tolerations:\n - operator: Exists\n topologySpreadConstraints:\n - labelSelector:\n matchLabels:\n app: ebs-csi-controller\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/name: aws-ebs-csi-driver\n maxSkew: 1\n topologyKey: topology.kubernetes.io/zone\n whenUnsatisfiable: ScheduleAnyway\n - labelSelector:\n matchLabels:\n app: ebs-csi-controller\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/name: aws-ebs-csi-driver\n maxSkew: 1\n topologyKey: kubernetes.io/hostname\n whenUnsatisfiable: DoNotSchedule\n volumes:\n - emptyDir: {}\n name: socket-dir\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: CSIDriver\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs.csi.aws.com\nspec:\n attachRequired: true\n podInfoOnMount: false\n\n---\n\napiVersion: policy/v1\nkind: PodDisruptionBudget\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: aws-ebs-csi-driver.addons.k8s.io\n app.kubernetes.io/instance: aws-ebs-csi-driver\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-ebs-csi-driver\n app.kubernetes.io/version: v1.14.1\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n name: ebs-csi-controller\n namespace: kube-system\nspec:\n maxUnavailable: 1\n selector:\n matchLabels:\n app: ebs-csi-controller\n app.kubernetes.io/instance: aws-ebs-csi-driver","PublicACL":null}
I0406 14:25:44.417587 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/admin"
I0406 14:25:44.417529 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-kops-controller.addons.k8s.io-k8s-1.16": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-kops-controller.addons.k8s.io-k8s-1.16","Lifecycle":"Sync","Base":null,"Location":"addons/kops-controller.addons.k8s.io/k8s-1.16.yaml","Contents":"apiVersion: v1\ndata:\n config.yaml: |\n {\"clusterName\":\"bug-report-cluster-public.<DOMAIN_REDACTED>\",\"cloud\":\"aws\",\"configBase\":\"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>\",\"secretStore\":\"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets\",\"server\":{\"Listen\":\":3988\",\"provider\":{\"aws\":{\"nodesRoles\":[\"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>\"],\"Region\":\"us-east-1\"}},\"serverKeyPath\":\"/etc/kubernetes/kops-controller/pki/kops-controller.key\",\"serverCertificatePath\":\"/etc/kubernetes/kops-controller/pki/kops-controller.crt\",\"caBasePath\":\"/etc/kubernetes/kops-controller/pki\",\"signingCAs\":[\"kubernetes-ca\"],\"certNames\":[\"kubelet\",\"kubelet-server\"],\"useInstanceIDForNodeName\":true}}\nkind: ConfigMap\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: kops-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: kops-controller.addons.k8s.io\n name: kops-controller\n namespace: kube-system\n\n---\n\napiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: kops-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: kops-controller.addons.k8s.io\n k8s-app: kops-controller\n version: v1.28.4\n name: kops-controller\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kops-controller\n template:\n metadata:\n annotations:\n dns.alpha.kubernetes.io/internal: kops-controller.internal.bug-report-cluster-public.<DOMAIN_REDACTED>\n creationTimestamp: null\n labels:\n k8s-addon: kops-controller.addons.k8s.io\n k8s-app: kops-controller\n kops.k8s.io/managed-by: kops\n version: v1.28.4\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n - key: kops.k8s.io/kops-controller-pki\n operator: Exists\n - matchExpressions:\n - key: node-role.kubernetes.io/master\n operator: Exists\n - key: kops.k8s.io/kops-controller-pki\n operator: Exists\n containers:\n - args:\n - --v=2\n - --conf=/etc/kubernetes/kops-controller/config/config.yaml\n command: null\n env:\n - name: KUBERNETES_SERVICE_HOST\n value: 127.0.0.1\n image: registry.k8s.io/kops/kops-controller:1.28.4@sha256:884c953b4b13c9f2f54f9f65775025769257a87c0c904728c15df7f87ef26b75\n name: kops-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n securityContext:\n runAsNonRoot: true\n runAsUser: 10011\n volumeMounts:\n - mountPath: /etc/kubernetes/kops-controller/config/\n name: kops-controller-config\n - mountPath: /etc/kubernetes/kops-controller/pki/\n name: kops-controller-pki\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector: null\n priorityClassName: system-cluster-critical\n serviceAccount: kops-controller\n tolerations:\n - key: node.cloudprovider.kubernetes.io/uninitialized\n operator: Exists\n - key: node.kubernetes.io/not-ready\n operator: Exists\n - key: node-role.kubernetes.io/master\n operator: Exists\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n volumes:\n - configMap:\n name: kops-controller\n name: kops-controller-config\n - hostPath:\n path: /etc/kubernetes/kops-controller/\n type: Directory\n name: kops-controller-pki\n updateStrategy:\n type: OnDelete\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: kops-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: kops-controller.addons.k8s.io\n name: kops-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: kops-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: kops-controller.addons.k8s.io\n name: kops-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n - patch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: kops-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: kops-controller.addons.k8s.io\n name: kops-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:kops-controller\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: Role\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: kops-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: kops-controller.addons.k8s.io\n name: kops-controller\n namespace: kube-system\nrules:\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - get\n - list\n - watch\n - create\n- apiGroups:\n - \"\"\n - coordination.k8s.io\n resourceNames:\n - kops-controller-leader\n resources:\n - configmaps\n - leases\n verbs:\n - get\n - list\n - watch\n - patch\n - update\n - delete\n- apiGroups:\n - \"\"\n - coordination.k8s.io\n resources:\n - configmaps\n - leases\n verbs:\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: kops-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: kops-controller.addons.k8s.io\n name: kops-controller\n namespace: kube-system\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: Role\n name: kops-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:kops-controller","PublicACL":null}
I0406 14:25:44.417447 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kubelet"
I0406 14:25:44.416473 745188 executor.go:192] Executing task "ManagedFile/manifests-etcdmanager-main-control-plane-us-east-1a": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-main-control-plane-us-east-1a","Lifecycle":"Sync","Base":null,"Location":"manifests/etcd/main-control-plane-us-east-1a.yaml","Contents":"apiVersion: v1\nkind: Pod\nmetadata:\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-main\n name: etcd-manager-main\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/main\n --client-urls=https://__name__:4001 --cluster-name=etcd --containerized=true\n --dns-suffix=.internal.bug-report-cluster-public.<DOMAIN_REDACTED> --grpc-port=3996\n --peer-urls=https://__name__:2380 --quarantine-client-urls=https://__name__:3994\n --v=6 --volume-name-tag=k8s.io/etcd/main --volume-provider=aws --volume-tag=k8s.io/etcd/main\n --volume-tag=k8s.io/role/control-plane=1 --volume-tag=kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>=owned\n \u003e /tmp/pipe 2\u003e\u00261\n env:\n - name: ETCD_MANAGER_DAILY_BACKUPS_RETENTION\n value: 90d\n image: registry.k8s.io/etcdadm/etcd-manager-slim:v3.0.20230630@sha256:45d67190fc70de2affef3c9efc0810c288a5f40b1a9717134a299dff9dc3f122\n name: etcd-manager\n resources:\n requests:\n cpu: 200m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /run\n name: run\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /opt\n name: opt\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n initContainers:\n - args:\n - --target-dir=/opt/kops-utils/\n - --src=/ko-app/kops-utils-cp\n command:\n - /ko-app/kops-utils-cp\n image: registry.k8s.io/kops/kops-utils-cp:1.28.4@sha256:f8f3fb7f47c23a966231c50149966372dbb7096b03e21a96993f5b81372949d9\n name: kops-utils-cp\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n - args:\n - --target-dir=/opt/etcd-v3.4.13\n - --src=/usr/local/bin/etcd\n - --src=/usr/local/bin/etcdctl\n command:\n - /opt/kops-utils/kops-utils-cp\n image: registry.k8s.io/etcd:3.4.13-0@sha256:4ad90a11b55313b182afc186b9876c8e891531b8db4c9bf1541953021618d0e2\n name: init-etcd-3-4-13\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n - args:\n - --target-dir=/opt/etcd-v3.5.9\n - --src=/usr/local/bin/etcd\n - --src=/usr/local/bin/etcdctl\n command:\n - /opt/kops-utils/kops-utils-cp\n image: registry.k8s.io/etcd:3.5.9-0@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3\n name: init-etcd-3-5-9\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n - args:\n - --symlink\n - --target-dir=/opt/etcd-v3.4.3\n - --src=/opt/etcd-v3.4.13/etcd\n - --src=/opt/etcd-v3.4.13/etcdctl\n command:\n - /opt/kops-utils/kops-utils-cp\n image: registry.k8s.io/kops/kops-utils-cp:1.28.4@sha256:f8f3fb7f47c23a966231c50149966372dbb7096b03e21a96993f5b81372949d9\n name: init-etcd-symlinks-3-4-13\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n - args:\n - --symlink\n - --target-dir=/opt/etcd-v3.5.0\n - --target-dir=/opt/etcd-v3.5.1\n - --target-dir=/opt/etcd-v3.5.3\n - --target-dir=/opt/etcd-v3.5.4\n - --target-dir=/opt/etcd-v3.5.6\n - --target-dir=/opt/etcd-v3.5.7\n - --src=/opt/etcd-v3.5.9/etcd\n - --src=/opt/etcd-v3.5.9/etcdctl\n command:\n - /opt/kops-utils/kops-utils-cp\n image: registry.k8s.io/kops/kops-utils-cp:1.28.4@sha256:f8f3fb7f47c23a966231c50149966372dbb7096b03e21a96993f5b81372949d9\n name: init-etcd-symlinks-3-5-9\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /run\n type: DirectoryOrCreate\n name: run\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-main\n type: DirectoryOrCreate\n name: pki\n - emptyDir: {}\n name: opt\n - hostPath:\n path: /var/log/etcd.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n","PublicACL":null}
I0406 14:25:44.417658 745188 executor.go:192] Executing task "IAMRole/masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"masters"}
I0406 14:25:44.418173 745188 executor.go:192] Executing task "DHCPOptions/bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.DHCPOptions {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"DomainName":"ec2.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:44.418248 745188 executor.go:192] Executing task "Secret/system:monitoring": *fitasks.Secret {"Name":"system:monitoring","Lifecycle":"Sync"}
I0406 14:25:44.418271 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:monitoring"
I0406 14:25:44.417449 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube-proxy"
I0406 14:25:44.418390 745188 executor.go:192] Executing task "ManagedFile/manifests-etcdmanager-events-control-plane-us-east-1a": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-events-control-plane-us-east-1a","Lifecycle":"Sync","Base":null,"Location":"manifests/etcd/events-control-plane-us-east-1a.yaml","Contents":"apiVersion: v1\nkind: Pod\nmetadata:\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-events\n name: etcd-manager-events\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/events\n --client-urls=https://__name__:4002 --cluster-name=etcd-events --containerized=true\n --dns-suffix=.internal.bug-report-cluster-public.<DOMAIN_REDACTED> --grpc-port=3997\n --peer-urls=https://__name__:2381 --quarantine-client-urls=https://__name__:3995\n --v=6 --volume-name-tag=k8s.io/etcd/events --volume-provider=aws --volume-tag=k8s.io/etcd/events\n --volume-tag=k8s.io/role/control-plane=1 --volume-tag=kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>=owned\n \u003e /tmp/pipe 2\u003e\u00261\n env:\n - name: ETCD_MANAGER_DAILY_BACKUPS_RETENTION\n value: 90d\n image: registry.k8s.io/etcdadm/etcd-manager-slim:v3.0.20230630@sha256:45d67190fc70de2affef3c9efc0810c288a5f40b1a9717134a299dff9dc3f122\n name: etcd-manager\n resources:\n requests:\n cpu: 100m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /run\n name: run\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /opt\n name: opt\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n initContainers:\n - args:\n - --target-dir=/opt/kops-utils/\n - --src=/ko-app/kops-utils-cp\n command:\n - /ko-app/kops-utils-cp\n image: registry.k8s.io/kops/kops-utils-cp:1.28.4@sha256:f8f3fb7f47c23a966231c50149966372dbb7096b03e21a96993f5b81372949d9\n name: kops-utils-cp\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n - args:\n - --target-dir=/opt/etcd-v3.4.13\n - --src=/usr/local/bin/etcd\n - --src=/usr/local/bin/etcdctl\n command:\n - /opt/kops-utils/kops-utils-cp\n image: registry.k8s.io/etcd:3.4.13-0@sha256:4ad90a11b55313b182afc186b9876c8e891531b8db4c9bf1541953021618d0e2\n name: init-etcd-3-4-13\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n - args:\n - --target-dir=/opt/etcd-v3.5.9\n - --src=/usr/local/bin/etcd\n - --src=/usr/local/bin/etcdctl\n command:\n - /opt/kops-utils/kops-utils-cp\n image: registry.k8s.io/etcd:3.5.9-0@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3\n name: init-etcd-3-5-9\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n - args:\n - --symlink\n - --target-dir=/opt/etcd-v3.4.3\n - --src=/opt/etcd-v3.4.13/etcd\n - --src=/opt/etcd-v3.4.13/etcdctl\n command:\n - /opt/kops-utils/kops-utils-cp\n image: registry.k8s.io/kops/kops-utils-cp:1.28.4@sha256:f8f3fb7f47c23a966231c50149966372dbb7096b03e21a96993f5b81372949d9\n name: init-etcd-symlinks-3-4-13\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n - args:\n - --symlink\n - --target-dir=/opt/etcd-v3.5.0\n - --target-dir=/opt/etcd-v3.5.1\n - --target-dir=/opt/etcd-v3.5.3\n - --target-dir=/opt/etcd-v3.5.4\n - --target-dir=/opt/etcd-v3.5.6\n - --target-dir=/opt/etcd-v3.5.7\n - --src=/opt/etcd-v3.5.9/etcd\n - --src=/opt/etcd-v3.5.9/etcdctl\n command:\n - /opt/kops-utils/kops-utils-cp\n image: registry.k8s.io/kops/kops-utils-cp:1.28.4@sha256:f8f3fb7f47c23a966231c50149966372dbb7096b03e21a96993f5b81372949d9\n name: init-etcd-symlinks-3-5-9\n resources: {}\n volumeMounts:\n - mountPath: /opt\n name: opt\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /run\n type: DirectoryOrCreate\n name: run\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-events\n type: DirectoryOrCreate\n name: pki\n - emptyDir: {}\n name: opt\n - hostPath:\n path: /var/log/etcd-events.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n","PublicACL":null}
I0406 14:25:44.417464 745188 dnszone.go:241] Check for existing route53 zone to re-use with name ""
I0406 14:25:44.418507 745188 executor.go:192] Executing task "Secret/system:dns": *fitasks.Secret {"Name":"system:dns","Lifecycle":"Sync"}
I0406 14:25:44.418545 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:dns"
I0406 14:25:44.417427 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-bootstrap": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-bootstrap","Lifecycle":"Sync","Base":null,"Location":"addons/bootstrap-channel.yaml","Contents":"kind: Addons\nmetadata:\n creationTimestamp: null\n name: bootstrap\nspec:\n addons:\n - id: k8s-1.16\n manifest: kops-controller.addons.k8s.io/k8s-1.16.yaml\n manifestHash: 6e08752d93123203d6175e24f75926bb614d18a9bf084409f1807a4e4eb167aa\n name: kops-controller.addons.k8s.io\n needsRollingUpdate: control-plane\n selector:\n k8s-addon: kops-controller.addons.k8s.io\n version: 9.99.0\n - id: k8s-1.12\n manifest: coredns.addons.k8s.io/k8s-1.12.yaml\n manifestHash: 9e04bbb03f9e5e62e8a246a96f73e8aaa31bf1d3284346c335774df5f7c3495d\n name: coredns.addons.k8s.io\n selector:\n k8s-addon: coredns.addons.k8s.io\n version: 9.99.0\n - id: k8s-1.9\n manifest: kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml\n manifestHash: 01c120e887bd98d82ef57983ad58a0b22bc85efb48108092a24c4b82e4c9ea81\n name: kubelet-api.rbac.addons.k8s.io\n selector:\n k8s-addon: kubelet-api.rbac.addons.k8s.io\n version: 9.99.0\n - manifest: limit-range.addons.k8s.io/v1.5.0.yaml\n manifestHash: 2d55c3bc5e354e84a3730a65b42f39aba630a59dc8d32b30859fcce3d3178bc2\n name: limit-range.addons.k8s.io\n selector:\n k8s-addon: limit-range.addons.k8s.io\n version: 9.99.0\n - id: k8s-1.12\n manifest: dns-controller.addons.k8s.io/k8s-1.12.yaml\n manifestHash: d564f931763d782836bb027963fd40b2c65d70d7eb108e8afebb73fb1b8402a9\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 9.99.0\n - id: k8s-1.11\n manifest: node-termination-handler.aws/k8s-1.11.yaml\n manifestHash: 2b4eab69128c76544d1f11eed3575ed058def4125f663311f99c05facea8f6c5\n name: node-termination-handler.aws\n prune:\n kinds:\n - kind: ConfigMap\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - kind: Service\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - kind: ServiceAccount\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n namespaces:\n - kube-system\n - group: admissionregistration.k8s.io\n kind: MutatingWebhookConfiguration\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - group: admissionregistration.k8s.io\n kind: ValidatingWebhookConfiguration\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - group: apps\n kind: DaemonSet\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - group: apps\n kind: Deployment\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n namespaces:\n - kube-system\n - group: apps\n kind: StatefulSet\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - group: policy\n kind: PodDisruptionBudget\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n namespaces:\n - kube-system\n - group: rbac.authorization.k8s.io\n kind: ClusterRole\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - group: rbac.authorization.k8s.io\n kind: ClusterRoleBinding\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - group: rbac.authorization.k8s.io\n kind: Role\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n - group: rbac.authorization.k8s.io\n kind: RoleBinding\n labelSelector: addon.kops.k8s.io/name=node-termination-handler.aws,app.kubernetes.io/managed-by=kops\n selector:\n k8s-addon: node-termination-handler.aws\n version: 9.99.0\n - id: v1.15.0\n manifest: storage-aws.addons.k8s.io/v1.15.0.yaml\n manifestHash: 4e2cda50cd5048133aad1b5e28becb60f4629d3f9e09c514a2757c27998b4200\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 9.99.0\n - id: k8s-1.16\n manifest: networking.cilium.io/k8s-1.16-v1.13.yaml\n manifestHash: ce35e02470be471f779f3ae75ec071eb574551b97d20970c225d59f171db218c\n name: networking.cilium.io\n needsRollingUpdate: all\n selector:\n role.kubernetes.io/networking: \"1\"\n version: 9.99.0\n - id: k8s-1.18\n manifest: aws-cloud-controller.addons.k8s.io/k8s-1.18.yaml\n manifestHash: 49af10ff6b4256cc742b24c25e8a8429f12c0c3bd9bc433eed65d63094fff3e6\n name: aws-cloud-controller.addons.k8s.io\n selector:\n k8s-addon: aws-cloud-controller.addons.k8s.io\n version: 9.99.0\n - id: k8s-1.17\n manifest: aws-ebs-csi-driver.addons.k8s.io/k8s-1.17.yaml\n manifestHash: 876b8f312b7d3a432588efdd54efbd2897e3e624e6303b28b123659ea128e3ee\n name: aws-ebs-csi-driver.addons.k8s.io\n selector:\n k8s-addon: aws-ebs-csi-driver.addons.k8s.io\n version: 9.99.0\n","PublicACL":null}
I0406 14:25:44.417505 745188 executor.go:192] Executing task "Keypair/apiserver-aggregator-ca": *fitasks.Keypair {"Name":"apiserver-aggregator-ca","alternateNames":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","issuer":"","type":"ca","oldFormat":false}
I0406 14:25:44.418621 745188 executor.go:192] Executing task "SQS/bug-report-cluster-public-<DOMAIN_REDACTED>-nth": *awstasks.SQS {"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:44.418681 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/apiserver-aggregator-ca/keyset.yaml"
I0406 14:25:44.417624 745188 executor.go:192] Executing task "EBSVolume/a.etcd-events.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.EBSVolume {"Name":"a.etcd-events.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","AvailabilityZone":"us-east-1a","Encrypted":true,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/events":"a/a","k8s.io/role/control-plane":"1","k8s.io/role/master":"1","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"VolumeIops":3000,"VolumeThroughput":125,"VolumeType":"gp3"}
I0406 14:25:44.418784 745188 executor.go:192] Executing task "Secret/system:controller_manager": *fitasks.Secret {"Name":"system:controller_manager","Lifecycle":"Sync"}
I0406 14:25:44.417796 745188 executor.go:192] Executing task "ManagedFile/etcd-cluster-spec-main": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-main","Lifecycle":"Sync","Base":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/main","Location":"/control/etcd-cluster-spec","Contents":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.5.9\"\n}","PublicACL":null}
I0406 14:25:44.418812 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:controller_manager"
I0406 14:25:44.417829 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-limit-range.addons.k8s.io": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-limit-range.addons.k8s.io","Lifecycle":"Sync","Base":null,"Location":"addons/limit-range.addons.k8s.io/v1.5.0.yaml","Contents":"apiVersion: v1\nkind: LimitRange\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: limit-range.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: limit-range.addons.k8s.io\n name: limits\n namespace: default\nspec:\n limits:\n - defaultRequest:\n cpu: 100m\n type: Container","PublicACL":null}
I0406 14:25:44.417874 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-storage-aws.addons.k8s.io-v1.15.0": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-storage-aws.addons.k8s.io-v1.15.0","Lifecycle":"Sync","Base":null,"Location":"addons/storage-aws.addons.k8s.io/v1.15.0.yaml","Contents":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: storage-aws.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.kubernetes.io/is-default-class: \"false\"\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: storage-aws.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\nallowVolumeExpansion: true\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.kubernetes.io/is-default-class: \"false\"\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: storage-aws.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: storage-aws.addons.k8s.io\n name: kops-ssd-1-17\nparameters:\n encrypted: \"true\"\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\nvolumeBindingMode: WaitForFirstConsumer\n\n---\n\nallowVolumeExpansion: true\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.kubernetes.io/is-default-class: \"true\"\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: storage-aws.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: storage-aws.addons.k8s.io\n name: kops-csi-1-21\nparameters:\n encrypted: \"true\"\n type: gp3\nprovisioner: ebs.csi.aws.com\nvolumeBindingMode: WaitForFirstConsumer\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: storage-aws.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - patch\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - update\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: storage-aws.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:aws-cloud-provider\nsubjects:\n- kind: ServiceAccount\n name: aws-cloud-provider\n namespace: kube-system","PublicACL":null}
I0406 14:25:44.418884 745188 executor.go:192] Executing task "Keypair/etcd-clients-ca": *fitasks.Keypair {"Name":"etcd-clients-ca","alternateNames":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=etcd-clients-ca","issuer":"","type":"ca","oldFormat":false}
I0406 14:25:44.417928 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9","Lifecycle":"Sync","Base":null,"Location":"addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml","Contents":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: kubelet-api.rbac.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: kubelet-api.rbac.addons.k8s.io\n name: kops:system:kubelet-api-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:kubelet-api-admin\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet-api","PublicACL":null}
I0406 14:25:44.418948 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-clients-ca/keyset.yaml"
I0406 14:25:44.417945 745188 executor.go:192] Executing task "Keypair/etcd-peers-ca-events": *fitasks.Keypair {"Name":"etcd-peers-ca-events","alternateNames":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=etcd-peers-ca-events","issuer":"","type":"ca","oldFormat":false}
I0406 14:25:44.418994 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-events/keyset.yaml"
I0406 14:25:44.417960 745188 executor.go:192] Executing task "IAMInstanceProfile/masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMInstanceProfile {"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ID":null,"Shared":false}
I0406 14:25:44.419065 745188 executor.go:192] Executing task "IAMRole/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"nodes"}
I0406 14:25:44.418019 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-node-termination-handler.aws-k8s-1.11": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-node-termination-handler.aws-k8s-1.11","Lifecycle":"Sync","Base":null,"Location":"addons/node-termination-handler.aws/k8s-1.11.yaml","Contents":"apiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: node-termination-handler.aws\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-node-termination-handler\n app.kubernetes.io/part-of: aws-node-termination-handler\n app.kubernetes.io/version: v1.18.3\n k8s-addon: node-termination-handler.aws\n k8s-app: aws-node-termination-handler\n name: aws-node-termination-handler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: node-termination-handler.aws\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-node-termination-handler\n app.kubernetes.io/part-of: aws-node-termination-handler\n app.kubernetes.io/version: v1.18.3\n k8s-addon: node-termination-handler.aws\n name: aws-node-termination-handler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - patch\n - update\n- apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - list\n - get\n- apiGroups:\n - \"\"\n resources:\n - pods/eviction\n verbs:\n - create\n- apiGroups:\n - extensions\n resources:\n - daemonsets\n verbs:\n - get\n- apiGroups:\n - apps\n resources:\n - daemonsets\n verbs:\n - get\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: node-termination-handler.aws\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-node-termination-handler\n app.kubernetes.io/part-of: aws-node-termination-handler\n app.kubernetes.io/version: v1.18.3\n k8s-addon: node-termination-handler.aws\n name: aws-node-termination-handler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: aws-node-termination-handler\nsubjects:\n- kind: ServiceAccount\n name: aws-node-termination-handler\n namespace: kube-system\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: node-termination-handler.aws\n app.kubernetes.io/component: deployment\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-node-termination-handler\n app.kubernetes.io/part-of: aws-node-termination-handler\n app.kubernetes.io/version: v1.18.3\n k8s-addon: node-termination-handler.aws\n k8s-app: aws-node-termination-handler\n name: aws-node-termination-handler\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/name: aws-node-termination-handler\n kubernetes.io/os: linux\n template:\n metadata:\n creationTimestamp: null\n labels:\n app.kubernetes.io/component: deployment\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/name: aws-node-termination-handler\n k8s-app: aws-node-termination-handler\n kops.k8s.io/managed-by: kops\n kops.k8s.io/nth-mode: sqs\n kubernetes.io/os: linux\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n - matchExpressions:\n - key: node-role.kubernetes.io/master\n operator: Exists\n containers:\n - env:\n - name: NODE_NAME\n valueFrom:\n fieldRef:\n fieldPath: spec.nodeName\n - name: POD_NAME\n valueFrom:\n fieldRef:\n fieldPath: metadata.name\n - name: NAMESPACE\n valueFrom:\n fieldRef:\n fieldPath: metadata.namespace\n - name: ENABLE_PROBES_SERVER\n value: \"true\"\n - name: PROBES_SERVER_PORT\n value: \"8080\"\n - name: PROBES_SERVER_ENDPOINT\n value: /healthz\n - name: LOG_LEVEL\n value: info\n - name: JSON_LOGGING\n value: \"true\"\n - name: LOG_FORMAT_VERSION\n value: \"2\"\n - name: ENABLE_PROMETHEUS_SERVER\n value: \"false\"\n - name: PROMETHEUS_SERVER_PORT\n value: \"9092\"\n - name: CHECK_TAG_BEFORE_DRAINING\n value: \"true\"\n - name: MANAGED_TAG\n value: aws-node-termination-handler/managed\n - name: USE_PROVIDER_ID\n value: \"true\"\n - name: DRY_RUN\n value: \"false\"\n - name: CORDON_ONLY\n value: \"false\"\n - name: TAINT_NODE\n value: \"false\"\n - name: EXCLUDE_FROM_LOAD_BALANCERS\n value: \"true\"\n - name: DELETE_LOCAL_DATA\n value: \"true\"\n - name: IGNORE_DAEMON_SETS\n value: \"true\"\n - name: POD_TERMINATION_GRACE_PERIOD\n value: \"-1\"\n - name: NODE_TERMINATION_GRACE_PERIOD\n value: \"120\"\n - name: EMIT_KUBERNETES_EVENTS\n value: \"true\"\n - name: COMPLETE_LIFECYCLE_ACTION_DELAY_SECONDS\n value: \"-1\"\n - name: ENABLE_SQS_TERMINATION_DRAINING\n value: \"true\"\n - name: QUEUE_URL\n value: https://sqs.us-east-1.amazonaws.com/<ACCOUNTID_REDACTED>/bug-report-cluster-public-<DOMAIN_REDACTED>-nth\n - name: WORKERS\n value: \"10\"\n image: public.ecr.aws/aws-ec2/aws-node-termination-handler:v1.18.3@sha256:f02ff16999b287a952b96be35b078cbe2f9adf9d5c444db4b909563c47958bd9\n imagePullPolicy: IfNotPresent\n livenessProbe:\n httpGet:\n path: /healthz\n port: 8080\n initialDelaySeconds: 5\n periodSeconds: 5\n name: aws-node-termination-handler\n ports:\n - containerPort: 8080\n name: liveness-probe\n protocol: TCP\n - containerPort: 9092\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 50m\n memory: 64Mi\n securityContext:\n allowPrivilegeEscalation: false\n readOnlyRootFilesystem: true\n runAsGroup: 1000\n runAsNonRoot: true\n runAsUser: 1000\n hostNetwork: true\n nodeSelector: null\n priorityClassName: system-cluster-critical\n securityContext:\n fsGroup: 1000\n serviceAccountName: aws-node-termination-handler\n tolerations:\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n - key: node-role.kubernetes.io/master\n operator: Exists\n topologySpreadConstraints:\n - labelSelector:\n matchLabels:\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/name: aws-node-termination-handler\n kops.k8s.io/nth-mode: sqs\n maxSkew: 1\n topologyKey: topology.kubernetes.io/zone\n whenUnsatisfiable: ScheduleAnyway\n - labelSelector:\n matchLabels:\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/name: aws-node-termination-handler\n kops.k8s.io/nth-mode: sqs\n maxSkew: 1\n topologyKey: kubernetes.io/hostname\n whenUnsatisfiable: DoNotSchedule\n\n---\n\napiVersion: policy/v1\nkind: PodDisruptionBudget\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: node-termination-handler.aws\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/managed-by: kops\n app.kubernetes.io/name: aws-node-termination-handler\n k8s-addon: node-termination-handler.aws\n name: aws-node-termination-handler\n namespace: kube-system\nspec:\n maxUnavailable: 1\n selector:\n matchLabels:\n app.kubernetes.io/instance: aws-node-termination-handler\n app.kubernetes.io/name: aws-node-termination-handler\n kops.k8s.io/nth-mode: sqs","PublicACL":null}
I0406 14:25:44.418118 745188 executor.go:192] Executing task "ManagedFile/bug-report-cluster-public.<DOMAIN_REDACTED>-addons-dns-controller.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-addons-dns-controller.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Base":null,"Location":"addons/dns-controller.addons.k8s.io/k8s-1.12.yaml","Contents":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: dns-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.28.4\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n strategy:\n type: Recreate\n template:\n metadata:\n creationTimestamp: null\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n kops.k8s.io/managed-by: kops\n version: v1.28.4\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n - matchExpressions:\n - key: node-role.kubernetes.io/master\n operator: Exists\n containers:\n - args:\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z050288919G22381WZFHT\n - --internal-ipv4\n - --zone=*/*\n - -v=2\n command: null\n env:\n - name: KUBERNETES_SERVICE_HOST\n value: 127.0.0.1\n image: registry.k8s.io/kops/dns-controller:1.28.4@sha256:b38651b81f80378f538625b381e0d9b6781033b1a21daf303eff20232bb03779\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n securityContext:\n runAsNonRoot: true\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector: null\n priorityClassName: system-cluster-critical\n serviceAccount: dns-controller\n tolerations:\n - key: node.cloudprovider.kubernetes.io/uninitialized\n operator: Exists\n - key: node.kubernetes.io/not-ready\n operator: Exists\n - key: node-role.kubernetes.io/control-plane\n operator: Exists\n - key: node-role.kubernetes.io/master\n operator: Exists\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: dns-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: dns-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - networking.k8s.io\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n creationTimestamp: null\n labels:\n addon.kops.k8s.io/name: dns-controller.addons.k8s.io\n app.kubernetes.io/managed-by: kops\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller","PublicACL":null}
I0406 14:25:44.623001 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:monitoring"
I0406 14:25:44.624062 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:logging"
I0406 14:25:44.628245 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube-proxy"
I0406 14:25:44.628273 745188 keypair.go:175] creating brand new certificate
I0406 14:25:44.628284 745188 keypair.go:198] Creating PKI keypair "etcd-peers-ca-events"
I0406 14:25:44.628297 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-events/keyset.yaml"
I0406 14:25:44.630591 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:scheduler"
I0406 14:25:44.630669 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:controller_manager"
I0406 14:25:44.630591 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kubelet"
I0406 14:25:44.636896 745188 keypair.go:175] creating brand new certificate
I0406 14:25:44.636945 745188 keypair.go:198] Creating PKI keypair "etcd-peers-ca-main"
I0406 14:25:44.636962 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-main/keyset.yaml"
I0406 14:25:44.636962 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube"
I0406 14:25:44.637063 745188 keypair.go:175] creating brand new certificate
I0406 14:25:44.637072 745188 keypair.go:198] Creating PKI keypair "etcd-clients-ca"
I0406 14:25:44.637081 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-clients-ca/keyset.yaml"
I0406 14:25:44.637728 745188 keypair.go:175] creating brand new certificate
I0406 14:25:44.637757 745188 keypair.go:198] Creating PKI keypair "etcd-manager-ca-events"
I0406 14:25:44.637766 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-events/keyset.yaml"
I0406 14:25:44.640786 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/admin"
W0406 14:25:44.659508 745188 vfs_keystorereader.go:143] CA private key was not found
I0406 14:25:44.659564 745188 keypair.go:175] creating brand new certificate
I0406 14:25:44.659565 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:dns"
I0406 14:25:44.659569 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/master/keyset.yaml"
I0406 14:25:44.659604 745188 keypair.go:175] creating brand new certificate
I0406 14:25:44.659611 745188 keypair.go:198] Creating PKI keypair "apiserver-aggregator-ca"
I0406 14:25:44.659617 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/apiserver-aggregator-ca/keyset.yaml"
I0406 14:25:44.659565 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/ca/keyset.yaml"
I0406 14:25:44.659574 745188 keypair.go:198] Creating PKI keypair "etcd-manager-ca-main"
I0406 14:25:44.659703 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-main/keyset.yaml"
I0406 14:25:44.666534 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:monitoring"
I0406 14:25:44.689650 745188 keypair.go:218] Creating privateKey "etcd-peers-ca-events"
I0406 14:25:44.689709 745188 keypair.go:226] Issuing new certificate: "etcd-peers-ca-events"
I0406 14:25:44.689813 745188 request_logger.go:45] AWS request: route53/GetHostedZone
I0406 14:25:44.689858 745188 keypair.go:218] Creating privateKey "etcd-clients-ca"
I0406 14:25:44.689899 745188 keypair.go:226] Issuing new certificate: "etcd-clients-ca"
I0406 14:25:44.689931 745188 keypair.go:218] Creating privateKey "etcd-peers-ca-main"
I0406 14:25:44.689942 745188 keypair.go:226] Issuing new certificate: "etcd-peers-ca-main"
I0406 14:25:44.705724 745188 keypair.go:175] creating brand new certificate
I0406 14:25:44.705774 745188 keypair.go:198] Creating PKI keypair "service-account"
I0406 14:25:44.705795 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/service-account/keyset.yaml"
I0406 14:25:44.710259 745188 keypair.go:218] Creating privateKey "apiserver-aggregator-ca"
I0406 14:25:44.710306 745188 keypair.go:226] Issuing new certificate: "apiserver-aggregator-ca"
I0406 14:25:44.710506 745188 keypair.go:218] Creating privateKey "etcd-manager-ca-events"
I0406 14:25:44.710544 745188 keypair.go:226] Issuing new certificate: "etcd-manager-ca-events"
I0406 14:25:44.740051 745188 keypair.go:175] creating brand new certificate
I0406 14:25:44.740110 745188 keypair.go:198] Creating PKI keypair "kubernetes-ca"
I0406 14:25:44.740128 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/kubernetes-ca/keyset.yaml"
I0406 14:25:44.741089 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:monitoring"
I0406 14:25:44.741131 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:monitoring" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:44.741206 745188 keypair.go:218] Creating privateKey "etcd-manager-ca-main"
I0406 14:25:44.741219 745188 keypair.go:226] Issuing new certificate: "etcd-manager-ca-main"
I0406 14:25:44.756274 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-events/keyset.yaml"
I0406 14:25:44.756349 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:44.756277 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/master/keyset.yaml"
W0406 14:25:44.787104 745188 vfs_keystorereader.go:143] CA private key was not found
I0406 14:25:44.787162 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/ca/keyset.yaml"
I0406 14:25:44.803835 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/apiserver-aggregator-ca/keyset.yaml"
I0406 14:25:44.803900 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/apiserver-aggregator-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:44.804624 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-main/keyset.yaml"
I0406 14:25:44.804671 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:44.805593 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:monitoring"
I0406 14:25:44.805689 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kubelet"
I0406 14:25:44.807893 745188 keypair.go:218] Creating privateKey "service-account"
I0406 14:25:44.807937 745188 keypair.go:226] Issuing new certificate: "service-account"
I0406 14:25:44.828401 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-events/keyset.yaml"
I0406 14:25:44.851521 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-main/keyset.yaml"
I0406 14:25:44.851587 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:44.851660 745188 keypair.go:218] Creating privateKey "kubernetes-ca"
I0406 14:25:44.851671 745188 keypair.go:226] Issuing new certificate: "kubernetes-ca"
I0406 14:25:44.883203 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kubelet"
I0406 14:25:44.883242 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kubelet" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:44.890730 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-events/keyset.yaml"
I0406 14:25:44.890939 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:44.903680 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/apiserver-aggregator-ca/keyset.yaml"
I0406 14:25:44.909708 745188 certificate.go:104] Parsing pem block: "CERTIFICATE"
I0406 14:25:44.909783 745188 privatekey.go:194] Parsing pem block: "RSA PRIVATE KEY"
I0406 14:25:44.910071 745188 keypair.go:278] created certificate with cn=etcd-peers-ca-events
I0406 14:25:44.912068 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-peers-ca-main/keyset.yaml"
I0406 14:25:44.938460 745188 dnszone.go:248] Existing zone "bug-report-cluster-public.<DOMAIN_REDACTED>." found; will configure TF to reuse
I0406 14:25:44.949116 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-main/keyset.yaml"
I0406 14:25:44.949153 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:logging"
I0406 14:25:44.949136 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kubelet"
I0406 14:25:44.952671 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/kubernetes-ca/keyset.yaml"
I0406 14:25:44.952739 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/kubernetes-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:44.960868 745188 certificate.go:104] Parsing pem block: "CERTIFICATE"
I0406 14:25:44.960970 745188 privatekey.go:194] Parsing pem block: "RSA PRIVATE KEY"
I0406 14:25:44.961244 745188 keypair.go:278] created certificate with cn=apiserver-aggregator-ca
I0406 14:25:44.973871 745188 certificate.go:104] Parsing pem block: "CERTIFICATE"
I0406 14:25:44.973954 745188 privatekey.go:194] Parsing pem block: "RSA PRIVATE KEY"
I0406 14:25:44.974353 745188 keypair.go:278] created certificate with cn=etcd-peers-ca-main
I0406 14:25:44.983265 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-manager-ca-events/keyset.yaml"
I0406 14:25:45.018608 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:logging"
I0406 14:25:45.018649 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:logging" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.024410 745188 certificate.go:104] Parsing pem block: "CERTIFICATE"
I0406 14:25:45.024688 745188 privatekey.go:194] Parsing pem block: "RSA PRIVATE KEY"
I0406 14:25:45.025079 745188 keypair.go:278] created certificate with cn=etcd-manager-ca-main
I0406 14:25:45.029476 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/service-account/keyset.yaml"
I0406 14:25:45.029530 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/service-account/keyset.yaml" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.054331 745188 certificate.go:104] Parsing pem block: "CERTIFICATE"
I0406 14:25:45.054420 745188 privatekey.go:194] Parsing pem block: "RSA PRIVATE KEY"
I0406 14:25:45.054671 745188 keypair.go:278] created certificate with cn=etcd-manager-ca-events
I0406 14:25:45.062171 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/kubernetes-ca/keyset.yaml"
I0406 14:25:45.077870 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:logging"
I0406 14:25:45.077990 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube-proxy"
I0406 14:25:45.080657 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-clients-ca/keyset.yaml"
I0406 14:25:45.080736 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-clients-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.106115 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/service-account/keyset.yaml"
I0406 14:25:45.117522 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube-proxy"
I0406 14:25:45.117621 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube-proxy" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.131652 745188 certificate.go:104] Parsing pem block: "CERTIFICATE"
I0406 14:25:45.131893 745188 privatekey.go:194] Parsing pem block: "RSA PRIVATE KEY"
I0406 14:25:45.132260 745188 keypair.go:278] created certificate with cn=kubernetes-ca
I0406 14:25:45.154384 745188 certificate.go:104] Parsing pem block: "CERTIFICATE"
I0406 14:25:45.154469 745188 privatekey.go:194] Parsing pem block: "RSA PRIVATE KEY"
I0406 14:25:45.154708 745188 keypair.go:278] created certificate with cn=service-account
I0406 14:25:45.160190 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/private/etcd-clients-ca/keyset.yaml"
I0406 14:25:45.168143 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube-proxy"
I0406 14:25:45.168198 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube"
I0406 14:25:45.210314 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube"
I0406 14:25:45.210365 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.213810 745188 certificate.go:104] Parsing pem block: "CERTIFICATE"
I0406 14:25:45.213884 745188 privatekey.go:194] Parsing pem block: "RSA PRIVATE KEY"
I0406 14:25:45.214089 745188 keypair.go:278] created certificate with cn=etcd-clients-ca
I0406 14:25:45.271438 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/kube"
I0406 14:25:45.271560 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:controller_manager"
I0406 14:25:45.364966 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:controller_manager"
I0406 14:25:45.365014 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:controller_manager" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.426688 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:controller_manager"
I0406 14:25:45.426838 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:scheduler"
I0406 14:25:45.470569 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:scheduler"
I0406 14:25:45.470627 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:scheduler" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.523293 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:scheduler"
I0406 14:25:45.523385 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/admin"
I0406 14:25:45.565107 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/admin"
I0406 14:25:45.565166 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/admin" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.619551 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/admin"
I0406 14:25:45.619621 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:dns"
I0406 14:25:45.657796 745188 s3fs.go:300] Writing file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:dns"
I0406 14:25:45.657850 745188 s3fs.go:317] Calling S3 PutObject Bucket="kops-state-store-public-terraform-missing-route53-api-endpoint" Key="bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:dns" SSE="DefaultBucketEncryption" ACL=""
I0406 14:25:45.722430 745188 s3fs.go:371] Reading file "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/system:dns"
I0406 14:25:45.768990 745188 executor.go:111] Tasks: 45 done / 104 total; 23 can run
I0406 14:25:45.769088 745188 executor.go:192] Executing task "IAMRolePolicy/master-policyoverride": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"master-policyoverride","Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"masters"},"PolicyDocument":null,"ExternalPolicies":null,"Managed":true}
I0406 14:25:45.769142 745188 executor.go:192] Executing task "Subnet/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.Subnet {"Name":"us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>","ShortName":"us-east-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"VPCCIDRBlock":null,"AmazonIPv6CIDR":null,"AvailabilityZone":"us-east-1a","CIDR":"172.20.0.0/16","IPv6CIDR":null,"ResourceBasedNaming":true,"AssignIPv6AddressOnCreation":null,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>","SubnetType":"Public","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned","kubernetes.io/role/elb":"1","kubernetes.io/role/internal-elb":"1"}}
I0406 14:25:45.769193 745188 executor.go:192] Executing task "BootstrapScript/control-plane-us-east-1a": &{control-plane-us-east-1a Sync 0xc000dd5400 0xc000fb6000 0xc000a94f30 {<nil> 0xc000e98fa0} [] map[apiserver-aggregator-ca:0xc0018eb680 etcd-clients-ca:0xc000ab6d80 etcd-manager-ca-events:0xc0018ea980 etcd-manager-ca-main:0xc000ab6c80 etcd-peers-ca-events:0xc0018eaa00 etcd-peers-ca-main:0xc000ab6d00 kubernetes-ca:0xc0018eb600 service-account:0xc0018eb700] {<nil> 0xc000e98fa0}}
I0406 14:25:45.769330 745188 executor.go:192] Executing task "MirrorSecrets/mirror-secrets": *fitasks.MirrorSecrets {"Name":"mirror-secrets","Lifecycle":"Sync","MirrorPath":{}}
I0406 14:25:45.769374 745188 executor.go:192] Executing task "IAMRolePolicy/node-policyoverride": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"node-policyoverride","Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"nodes"},"PolicyDocument":null,"ExternalPolicies":null,"Managed":true}
I0406 14:25:45.769413 745188 executor.go:192] Executing task "IAMRolePolicy/additional.nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"nodes"},"PolicyDocument":"","ExternalPolicies":null,"Managed":false}
I0406 14:25:45.769425 745188 executor.go:192] Executing task "VPCDHCPOptionsAssociation/bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.VPCDHCPOptionsAssociation {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"DHCPOptions":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"DomainName":"ec2.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}}
I0406 14:25:45.769276 745188 executor.go:192] Executing task "BootstrapScript/nodes-us-east-1a": &{nodes-us-east-1a Sync 0xc000dd5400 0xc000fb6380 0xc000a94f30 {<nil> 0xc000e99040} [] map[etcd-clients-ca:0xc000ab6d80 etcd-manager-ca-events:0xc0018ea980 etcd-manager-ca-main:0xc000ab6c80 etcd-peers-ca-events:0xc0018eaa00 etcd-peers-ca-main:0xc000ab6d00 kubernetes-ca:0xc0018eb600] {<nil> 0xc000e99040}}
I0406 14:25:45.769477 745188 executor.go:192] Executing task "IAMInstanceProfileRole/masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMInstanceProfileRole {"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","InstanceProfile":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ID":null,"Shared":false},"Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"masters"}}
I0406 14:25:45.769516 745188 executor.go:192] Executing task "EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange": *awstasks.EventBridgeRule {"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange","Lifecycle":"Sync","EventPattern":"{\"source\": [\"aws.health\"],\"detail-type\": [\"AWS Health Event\"],\"detail\": {\"service\": [\"EC2\"],\"eventTypeCategory\": [\"scheduledChange\"]}}","SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.769584 745188 executor.go:192] Executing task "MirrorKeystore/mirror-keystore": *fitasks.MirrorKeystore {"Name":"mirror-keystore","Lifecycle":"Sync","MirrorPath":{}}
I0406 14:25:45.769579 745188 executor.go:192] Executing task "EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange": *awstasks.EventBridgeRule {"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange","Lifecycle":"Sync","EventPattern":"{\"source\": [\"aws.ec2\"],\"detail-type\": [\"EC2 Instance State-change Notification\"]}","SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.769588 745188 executor.go:192] Executing task "InternetGateway/bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.InternetGateway {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.769550 745188 executor.go:192] Executing task "SecurityGroup/masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroup {"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.769594 745188 executor.go:192] Executing task "RouteTable/bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.RouteTable {"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned","kubernetes.io/kops/role":"public"}}
I0406 14:25:45.769624 745188 executor.go:192] Executing task "SecurityGroup/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroup {"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.769628 745188 executor.go:192] Executing task "IAMInstanceProfileRole/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMInstanceProfileRole {"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","InstanceProfile":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ID":null,"Shared":false},"Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"nodes"}}
I0406 14:25:45.769650 745188 executor.go:192] Executing task "VPCAmazonIPv6CIDRBlock/AmazonIPv6": *awstasks.VPCAmazonIPv6CIDRBlock {"Name":"AmazonIPv6","Lifecycle":"Sync","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"Shared":false}
I0406 14:25:45.769651 745188 executor.go:192] Executing task "EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle": *awstasks.EventBridgeRule {"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle","Lifecycle":"Sync","EventPattern":"{\"source\":[\"aws.autoscaling\"],\"detail-type\":[\"EC2 Instance-terminate Lifecycle Action\"]}","SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.769665 745188 executor.go:192] Executing task "IAMRolePolicy/additional.masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"masters"},"PolicyDocument":"","ExternalPolicies":null,"Managed":false}
I0406 14:25:45.769660 745188 executor.go:192] Executing task "EventBridgeRule/bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption": *awstasks.EventBridgeRule {"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption","Lifecycle":"Sync","EventPattern":"{\"source\": [\"aws.ec2\"],\"detail-type\": [\"EC2 Spot Instance Interruption Warning\"]}","SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.769910 745188 vfs_secretstore.go:52] Skipping mirror of secret store from "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets" to "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets" (same path)
I0406 14:25:45.769520 745188 executor.go:192] Executing task "IAMRolePolicy/masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"bug-report-cluster-public.<DOMAIN_REDACTED>","creationTimestamp":"2024-04-06T19:25:15Z"},"spec":{"channel":"stable","configStore":{"base":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>","keypairs":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki","secrets":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets"},"cloudProvider":{"aws":{"ebsCSIDriver":{"enabled":true,"version":"v1.14.1"},"nodeTerminationHandler":{"enabled":true,"enableSpotInterruptionDraining":true,"enableScheduledEventDraining":true,"enableRebalanceMonitoring":false,"enableRebalanceDraining":false,"prometheusEnable":false,"excludeFromLoadBalancers":true,"managedASGTag":"aws-node-termination-handler/managed","memoryRequest":"64Mi","cpuRequest":"50m","version":"v1.18.3"}}},"containerRuntime":"containerd","kubernetesVersion":"1.28.6","dnsZone":"Z050288919G22381WZFHT","clusterDNSDomain":"cluster.local","sshAccess":["0.0.0.0/0","::/0"],"etcdClusters":[{"name":"main","etcdMembers":[{"name":"a","instanceGroup":"control-plane-us-east-1a","encryptedVolume":true}],"version":"3.5.9","backups":{"backupStore":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/main"},"manager":{"backupRetentionDays":90},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","etcdMembers":[{"name":"a","instanceGroup":"control-plane-us-east-1a","encryptedVolume":true}],"version":"3.5.9","backups":{"backupStore":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/events"},"manager":{"backupRetentionDays":90},"memoryRequest":"100Mi","cpuRequest":"100m"}],"containerd":{"logLevel":"info","version":"1.7.13","runc":{"version":"1.1.12"}},"docker":{"skipInstall":true},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","provider":"CoreDNS","serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi","nodeLocalDNS":{"enabled":false,"image":"registry.k8s.io/dns/k8s-dns-node-cache:1.22.20","memoryRequest":"5Mi","cpuRequest":"25m"}},"kubeAPIServer":{"image":"registry.k8s.io/kube-apiserver:v1.28.6@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68","logLevel":2,"cloudProvider":"external","securePort":443,"bindAddress":"0.0.0.0","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["https://127.0.0.1:4001"],"etcdServersOverrides":["/events#https://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"Node,RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"],"featureGates":{"InTreePluginAWSUnregister":"true"},"serviceAccountIssuer":"https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>","serviceAccountJWKSURI":"https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>/openid/v1/jwks","apiAudiences":["kubernetes.svc.default"]},"kubeControllerManager":{"logLevel":2,"image":"registry.k8s.io/kube-controller-manager:v1.28.6@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e","cloudProvider":"external","clusterName":"bug-report-cluster-public.<DOMAIN_REDACTED>","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true,"featureGates":{"InTreePluginAWSUnregister":"true"}},"cloudControllerManager":{"image":"registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1","clusterName":"bug-report-cluster-public.<DOMAIN_REDACTED>","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true}},"kubeScheduler":{"logLevel":2,"image":"registry.k8s.io/kube-scheduler:v1.28.6@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39","leaderElection":{"leaderElect":true},"featureGates":{"InTreePluginAWSUnregister":"true"}},"kubeProxy":{"image":"registry.k8s.io/kube-proxy:v1.28.6@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","enabled":false},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","podInfraContainerImage":"registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","cloudProvider":"external","cgroupRoot":"/","registerSchedulable":true,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"InTreePluginAWSUnregister":"true"},"protectKernelDefaults":true,"cgroupDriver":"systemd","shutdownGracePeriod":"30s","shutdownGracePeriodCriticalPods":"10s"},"controlPlaneKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","podInfraContainerImage":"registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","cloudProvider":"external","cgroupRoot":"/","registerSchedulable":true,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"InTreePluginAWSUnregister":"true"},"protectKernelDefaults":true,"cgroupDriver":"systemd","shutdownGracePeriod":"30s","shutdownGracePeriodCriticalPods":"10s"},"cloudConfig":{"manageStorageClasses":true},"externalDNS":{"provider":"dns-controller"},"networking":{"networkCIDR":"172.20.0.0/16","subnets":[{"name":"us-east-1a","cidr":"172.20.0.0/16","zone":"us-east-1a","type":"Public"}],"topology":{"dns":"Public"},"nonMasqueradeCIDR":"100.64.0.0/10","podCIDR":"100.96.0.0/11","serviceClusterIPRange":"100.64.0.0/13","cilium":{"version":"v1.13.10","memoryRequest":"128Mi","cpuRequest":"25m","agentPrometheusPort":9090,"enableL7Proxy":true,"enableBPFMasquerade":false,"enableEndpointHealthChecking":true,"identityAllocationMode":"crd","identityChangeGracePeriod":"5s","masquerade":true,"tunnel":"vxlan","monitorAggregation":"medium","bpfCTGlobalTCPMax":524288,"bpfCTGlobalAnyMax":262144,"bpfLBAlgorithm":"random","bpfLBMaglevTableSize":"16381","bpfNATGlobalMax":524288,"bpfNeighGlobalMax":524288,"bpfPolicyMapMax":16384,"bpfLBMapMax":65536,"sidecarIstioProxyImage":"cilium/istio_proxy","clusterName":"default","toFQDNsDNSRejectResponseCode":"refused","ipam":"kubernetes","enableNodePort":true,"enableRemoteNodeIdentity":true,"enableUnreachableRoutes":false,"hubble":{"enabled":false},"disableCNPStatusUpdates":true}},"api":{"dns":{},"publicName":"api.bug-report-cluster-public.<DOMAIN_REDACTED>","access":["0.0.0.0/0","::/0"]},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-east-1","Partition":"aws","ResourceARN":null,"Role":{},"UseServiceAccountExternalPermisssions":false},"DNSZone":{"Name":"Z050288919G22381WZFHT","Lifecycle":"Sync","DNSName":null,"ZoneID":"/hostedzone/Z050288919G22381WZFHT","Private":null,"PrivateVPC":null}},"ExternalPolicies":null,"Managed":false}
I0406 14:25:45.769571 745188 executor.go:192] Executing task "IAMRolePolicy/nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"bug-report-cluster-public.<DOMAIN_REDACTED>","creationTimestamp":"2024-04-06T19:25:15Z"},"spec":{"channel":"stable","configStore":{"base":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>","keypairs":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki","secrets":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets"},"cloudProvider":{"aws":{"ebsCSIDriver":{"enabled":true,"version":"v1.14.1"},"nodeTerminationHandler":{"enabled":true,"enableSpotInterruptionDraining":true,"enableScheduledEventDraining":true,"enableRebalanceMonitoring":false,"enableRebalanceDraining":false,"prometheusEnable":false,"excludeFromLoadBalancers":true,"managedASGTag":"aws-node-termination-handler/managed","memoryRequest":"64Mi","cpuRequest":"50m","version":"v1.18.3"}}},"containerRuntime":"containerd","kubernetesVersion":"1.28.6","dnsZone":"Z050288919G22381WZFHT","clusterDNSDomain":"cluster.local","sshAccess":["0.0.0.0/0","::/0"],"etcdClusters":[{"name":"main","etcdMembers":[{"name":"a","instanceGroup":"control-plane-us-east-1a","encryptedVolume":true}],"version":"3.5.9","backups":{"backupStore":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/main"},"manager":{"backupRetentionDays":90},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","etcdMembers":[{"name":"a","instanceGroup":"control-plane-us-east-1a","encryptedVolume":true}],"version":"3.5.9","backups":{"backupStore":"s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/backups/etcd/events"},"manager":{"backupRetentionDays":90},"memoryRequest":"100Mi","cpuRequest":"100m"}],"containerd":{"logLevel":"info","version":"1.7.13","runc":{"version":"1.1.12"}},"docker":{"skipInstall":true},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","provider":"CoreDNS","serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi","nodeLocalDNS":{"enabled":false,"image":"registry.k8s.io/dns/k8s-dns-node-cache:1.22.20","memoryRequest":"5Mi","cpuRequest":"25m"}},"kubeAPIServer":{"image":"registry.k8s.io/kube-apiserver:v1.28.6@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68","logLevel":2,"cloudProvider":"external","securePort":443,"bindAddress":"0.0.0.0","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["https://127.0.0.1:4001"],"etcdServersOverrides":["/events#https://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"Node,RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"],"featureGates":{"InTreePluginAWSUnregister":"true"},"serviceAccountIssuer":"https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>","serviceAccountJWKSURI":"https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>/openid/v1/jwks","apiAudiences":["kubernetes.svc.default"]},"kubeControllerManager":{"logLevel":2,"image":"registry.k8s.io/kube-controller-manager:v1.28.6@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e","cloudProvider":"external","clusterName":"bug-report-cluster-public.<DOMAIN_REDACTED>","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true,"featureGates":{"InTreePluginAWSUnregister":"true"}},"cloudControllerManager":{"image":"registry.k8s.io/provider-aws/cloud-controller-manager:v1.28.1","clusterName":"bug-report-cluster-public.<DOMAIN_REDACTED>","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true}},"kubeScheduler":{"logLevel":2,"image":"registry.k8s.io/kube-scheduler:v1.28.6@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39","leaderElection":{"leaderElect":true},"featureGates":{"InTreePluginAWSUnregister":"true"}},"kubeProxy":{"image":"registry.k8s.io/kube-proxy:v1.28.6@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","enabled":false},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","podInfraContainerImage":"registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","cloudProvider":"external","cgroupRoot":"/","registerSchedulable":true,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"InTreePluginAWSUnregister":"true"},"protectKernelDefaults":true,"cgroupDriver":"systemd","shutdownGracePeriod":"30s","shutdownGracePeriodCriticalPods":"10s"},"controlPlaneKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","podInfraContainerImage":"registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","cloudProvider":"external","cgroupRoot":"/","registerSchedulable":true,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"InTreePluginAWSUnregister":"true"},"protectKernelDefaults":true,"cgroupDriver":"systemd","shutdownGracePeriod":"30s","shutdownGracePeriodCriticalPods":"10s"},"cloudConfig":{"manageStorageClasses":true},"externalDNS":{"provider":"dns-controller"},"networking":{"networkCIDR":"172.20.0.0/16","subnets":[{"name":"us-east-1a","cidr":"172.20.0.0/16","zone":"us-east-1a","type":"Public"}],"topology":{"dns":"Public"},"nonMasqueradeCIDR":"100.64.0.0/10","podCIDR":"100.96.0.0/11","serviceClusterIPRange":"100.64.0.0/13","cilium":{"version":"v1.13.10","memoryRequest":"128Mi","cpuRequest":"25m","agentPrometheusPort":9090,"enableL7Proxy":true,"enableBPFMasquerade":false,"enableEndpointHealthChecking":true,"identityAllocationMode":"crd","identityChangeGracePeriod":"5s","masquerade":true,"tunnel":"vxlan","monitorAggregation":"medium","bpfCTGlobalTCPMax":524288,"bpfCTGlobalAnyMax":262144,"bpfLBAlgorithm":"random","bpfLBMaglevTableSize":"16381","bpfNATGlobalMax":524288,"bpfNeighGlobalMax":524288,"bpfPolicyMapMax":16384,"bpfLBMapMax":65536,"sidecarIstioProxyImage":"cilium/istio_proxy","clusterName":"default","toFQDNsDNSRejectResponseCode":"refused","ipam":"kubernetes","enableNodePort":true,"enableRemoteNodeIdentity":true,"enableUnreachableRoutes":false,"hubble":{"enabled":false},"disableCNPStatusUpdates":true}},"api":{"dns":{},"publicName":"api.bug-report-cluster-public.<DOMAIN_REDACTED>","access":["0.0.0.0/0","::/0"]},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-east-1","Partition":"aws","ResourceARN":null,"Role":{},"UseServiceAccountExternalPermisssions":false},"DNSZone":{"Name":"Z050288919G22381WZFHT","Lifecycle":"Sync","DNSName":null,"ZoneID":"/hostedzone/Z050288919G22381WZFHT","Private":null,"PrivateVPC":null}},"ExternalPolicies":null,"Managed":false}
I0406 14:25:45.770094 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770113 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770121 745188 iam_builder.go:533] Found root location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770130 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770145 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770152 745188 iam_builder.go:533] Found root location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770276 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770296 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770295 745188 vfs_castore.go:198] Skipping key store mirror from "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki" to "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki" (same paths)
I0406 14:25:45.770304 745188 iam_builder.go:533] Found root location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770365 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770383 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770390 745188 iam_builder.go:533] Found root location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770525 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770545 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770552 745188 iam_builder.go:533] Found root location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770907 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770956 745188 iam_builder.go:528] Ignoring location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets/" because found parent "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.770964 745188 iam_builder.go:533] Found root location "s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/"
I0406 14:25:45.771907 745188 executor.go:111] Tasks: 68 done / 104 total; 28 can run
I0406 14:25:45.772024 745188 executor.go:192] Executing task "SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-4003to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-4003to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":null,"PrefixList":null,"Protocol":"tcp","FromPort":4003,"ToPort":65535,"SourceGroup":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-tcp-4003to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772228 745188 executor.go:192] Executing task "SecurityGroupRule/from-::/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-::/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":"::/0","PrefixList":null,"Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-::/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772176 745188 executor.go:192] Executing task "EventBridgeTarget/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange-Target": *awstasks.EventBridgeTarget {"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange-Target","Lifecycle":"Sync","Rule":{"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange","Lifecycle":"Sync","EventPattern":"{\"source\": [\"aws.ec2\"],\"detail-type\": [\"EC2 Instance State-change Notification\"]}","SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceStateChange","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}}
I0406 14:25:45.772218 745188 executor.go:192] Executing task "RouteTableAssociation/us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.RouteTableAssociation {"Name":"us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"RouteTable":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned","kubernetes.io/kops/role":"public"}},"Subnet":{"Name":"us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>","ShortName":"us-east-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"VPCCIDRBlock":null,"AmazonIPv6CIDR":null,"AvailabilityZone":"us-east-1a","CIDR":"172.20.0.0/16","IPv6CIDR":null,"ResourceBasedNaming":true,"AssignIPv6AddressOnCreation":null,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"us-east-1a.bug-report-cluster-public.<DOMAIN_REDACTED>","SubnetType":"Public","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned","kubernetes.io/role/elb":"1","kubernetes.io/role/internal-elb":"1"}}}
I0406 14:25:45.772263 745188 executor.go:192] Executing task "SecurityGroupRule/from-0.0.0.0/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-0.0.0.0/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":"0.0.0.0/0","IPv6CIDR":null,"PrefixList":null,"Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-0.0.0.0/0-ingress-tcp-22to22-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772311 745188 executor.go:192] Executing task "SecurityGroupRule/from-::/0-ingress-tcp-443to443-masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-::/0-ingress-tcp-443to443-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":"::/0","PrefixList":null,"Protocol":"tcp","FromPort":443,"ToPort":443,"SourceGroup":null,"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-::/0-ingress-tcp-443to443-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772312 745188 executor.go:192] Executing task "SecurityGroupRule/from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":null,"PrefixList":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772301 745188 executor.go:192] Executing task "EventBridgeTarget/bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption-Target": *awstasks.EventBridgeTarget {"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption-Target","Lifecycle":"Sync","Rule":{"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption","Lifecycle":"Sync","EventPattern":"{\"source\": [\"aws.ec2\"],\"detail-type\": [\"EC2 Spot Instance Interruption Warning\"]}","SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-SpotInterruption","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}}
I0406 14:25:45.772315 745188 executor.go:192] Executing task "SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-udp-1to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-udp-1to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":null,"PrefixList":null,"Protocol":"udp","FromPort":1,"ToPort":65535,"SourceGroup":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-udp-1to65535-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772328 745188 executor.go:192] Executing task "EventBridgeTarget/bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle-Target": *awstasks.EventBridgeTarget {"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle-Target","Lifecycle":"Sync","Rule":{"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle","Lifecycle":"Sync","EventPattern":"{\"source\":[\"aws.autoscaling\"],\"detail-type\":[\"EC2 Instance-terminate Lifecycle Action\"]}","SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-ASGLifecycle","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}}
I0406 14:25:45.772333 745188 executor.go:192] Executing task "SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":null,"PrefixList":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772166 745188 executor.go:192] Executing task "SecurityGroupRule/from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":"::/0","PrefixList":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772368 745188 executor.go:192] Executing task "SecurityGroupRule/from-::/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-::/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":"::/0","PrefixList":null,"Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-::/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772382 745188 executor.go:192] Executing task "SecurityGroupRule/from-0.0.0.0/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-0.0.0.0/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":"0.0.0.0/0","IPv6CIDR":null,"PrefixList":null,"Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-0.0.0.0/0-ingress-tcp-22to22-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772364 745188 executor.go:192] Executing task "SecurityGroupRule/from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-masters.bug-report-cluster-public.<DOMAIN_REDACTED>": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":null,"PrefixList":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179","port=8443"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Egress":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-masters.bug-report-cluster-public.<DOMAIN_REDACTED>-ingress-all-0to0-masters.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772402 745188 executor.go:192] Executing task "SecurityGroupRule/from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0": *awstasks.SecurityGroupRule {"ID":null,"Name":"from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","AmazonIPv6":true,"IPv6CIDR":null,"EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"nodes.bug-report-cluster-public.<DOMAIN_REDACTED>","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"CIDR":null,"IPv6CIDR":"::/0","PrefixList":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true,"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"from-nodes.bug-report-cluster-public.<DOMAIN_REDACTED>-egress-all-0to0-::/0","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}}
I0406 14:25:45.772124 745188 executor.go:192] Executing task "ManagedFile/nodeupconfig-control-plane-us-east-1a": *fitasks.ManagedFile {"Name":"nodeupconfig-control-plane-us-east-1a","Lifecycle":"Sync","Base":null,"Location":"igconfig/control-plane/control-plane-us-east-1a/nodeupconfig.yaml","Contents":{"resource":"APIServerConfig:\n API:\n dns: {}\n publicName: api.bug-report-cluster-public.<DOMAIN_REDACTED>\n ClusterDNSDomain: cluster.local\n KubeAPIServer:\n allowPrivileged: true\n anonymousAuth: false\n apiAudiences:\n - kubernetes.svc.default\n apiServerCount: 1\n authorizationMode: Node,RBAC\n bindAddress: 0.0.0.0\n cloudProvider: external\n enableAdmissionPlugins:\n - NamespaceLifecycle\n - LimitRanger\n - ServiceAccount\n - DefaultStorageClass\n - DefaultTolerationSeconds\n - MutatingAdmissionWebhook\n - ValidatingAdmissionWebhook\n - NodeRestriction\n - ResourceQuota\n etcdServers:\n - https://127.0.0.1:4001\n etcdServersOverrides:\n - /events#https://127.0.0.1:4002\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n image: registry.k8s.io/kube-apiserver:v1.28.6@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68\n kubeletPreferredAddressTypes:\n - InternalIP\n - Hostname\n - ExternalIP\n logLevel: 2\n requestheaderAllowedNames:\n - aggregator\n requestheaderExtraHeaderPrefixes:\n - X-Remote-Extra-\n requestheaderGroupHeaders:\n - X-Remote-Group\n requestheaderUsernameHeaders:\n - X-Remote-User\n securePort: 443\n serviceAccountIssuer: https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>\n serviceAccountJWKSURI: https://api.internal.bug-report-cluster-public.<DOMAIN_REDACTED>/openid/v1/jwks\n serviceClusterIPRange: 100.64.0.0/13\n storageBackend: etcd3\n ServiceAccountPublicKeys: |\n -----BEGIN RSA PUBLIC KEY-----\n MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAumbgxS/LtwaBYcE8qrN3\n 8AJ4mwYWkfj1/YDZNMfbc6CZz1F2v0SnAb13b4U/AOOiyC4MHlZsVU/4rll5pl4q\n avhduxe5me7BBqBcGTdA1mXy17TbmgXQX8GuWBIV90rY6LgDaLIpDAdcoGFQbpcd\n csNwlfAMvifhXQt9RwEq4zLY9CP0xnlAsP0/x7ZBQXfV+Anj++AQeW5hBN8HGb6B\n Rq0vsK3WX3HA1LwDiVuf6CdysxJCUBRnbnAQWoTN0KxNlKHEblgyHX2Rjx33RgvO\n RDN+frLWkQScjfh+VLq96cPsoJc06b0WYSpux3TjOYpNF0rVag+t41PA4U37ThsI\n lQIDAQAB\n -----END RSA PUBLIC KEY-----\nAssets:\n amd64:\n - 8506df1f20a5f8bba0592f5a4cf5d0cc541047708e664cb88580735400d0b26f@https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubelet,https://cdn.dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubelet\n - c8351fe0611119fd36634dd3f53eb94ec1a2d43ef9e78b92b4846df5cc7aa7e3@https://dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubectl,https://cdn.dl.k8s.io/release/v1.28.6/bin/linux/amd64/kubectl\n - 5035d7814c95cd3cedbc5efb447ef25a4942ef05caab2159746d55ce1698c74a@https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/amd64/ecr-credential-provider-linux-amd64\n - f3a841324845ca6bf0d4091b4fc7f97e18a623172158b72fc3fdcdb9d42d2d37@https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-amd64-v1.2.0.tgz\n - c2371c009dd8b7738663333d91e5ab50d204f8bcae24201f45d59060d12c3a23@https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-amd64.tar.gz\n - aadeef400b8f05645768c1476d1023f7875b78f52c7ff1967a6dbce236b8cbd8@https://github.com/opencontainers/runc/releases/download/v1.1.12/runc.amd64\n - 327e4ec78626156d7e50f46b4f2cf3ad0c1f7022dd32b6a8ea85e08e5774a081@https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/protokube,https://github.com/kubernetes/kops/releases/download/v1.28.4/protokube-linux-amd64\n - 2d6b8d804e29b0df7a570cf7285fed54195e9410c3e9ed7ce745af4c787a14ee@https://artifacts.k8s.io/binaries/kops/1.28.4/linux/amd64/channels,https://github.com/kubernetes/kops/releases/download/v1.28.4/channels-linux-amd64\n arm64:\n - ee2c060deff330d3338e24aec9734c9e5d5aea4fea1905c0795bccff6997a65e@https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubelet,https://cdn.dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubelet\n - 0de705659a80c3fef01df43cc0926610fe31482f728b0f992818abd9bdcd2cb9@https://dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubectl,https://cdn.dl.k8s.io/release/v1.28.6/bin/linux/arm64/kubectl\n - b3d567bda9e2996fc1fbd9d13506bd16763d3865b5c7b0b3c4b48c6088c04481@https://artifacts.k8s.io/binaries/cloud-provider-aws/v1.27.1/linux/arm64/ecr-credential-provider-linux-arm64\n - 525e2b62ba92a1b6f3dc9612449a84aa61652e680f7ebf4eff579795fe464b57@https://storage.googleapis.com/k8s-artifacts-cni/release/v1.2.0/cni-plugins-linux-arm64-v1.2.0.tgz\n - 118759e398f35337109592b4d237538872dc12a207d38832b9d04515d0acbc4d@https://github.com/containerd/containerd/releases/download/v1.7.13/containerd-1.7.13-linux-arm64.tar.gz\n - 879f910a05c95c10c64ad8eb7d5e3aa8e4b30e65587b3d68e009a3565aed5bb8@https://github.com/opencontainers/runc/releases/download/v1.1.12/runc.arm64\n - 2e4dae59f499c7e1d314b47e8a9a4e10d9fcd6c15edd25bc9b691aceb319e3b0@https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/protokube,https://github.com/kubernetes/kops/releases/download/v1.28.4/protokube-linux-arm64\n - e4045de5d7cb88437a1704ac7e3222bcdf5a9b7ee8b9f559ce07b44e577f3f00@https://artifacts.k8s.io/binaries/kops/1.28.4/linux/arm64/channels,https://github.com/kubernetes/kops/releases/download/v1.28.4/channels-linux-arm64\nCAs:\n apiserver-aggregator-ca: |\n -----BEGIN CERTIFICATE-----\n MIIDDDCCAfSgAwIBAgIMF8PHasShpjO0eH5jMA0GCSqGSIb3DQEBCwUAMCIxIDAe\n BgNVBAMTF2FwaXNlcnZlci1hZ2dyZWdhdG9yLWNhMB4XDTI0MDQwNDE5MjU0NFoX\n DTM0MDQwNDE5MjU0NFowIjEgMB4GA1UEAxMXYXBpc2VydmVyLWFnZ3JlZ2F0b3It\n Y2EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC6tCTbwGFT+JN9uue1\n WqrRIxuF+6uHcp39JB4ynfn7nyxw5xvBikRcJ6w40lz6cJ+pEfBZYBnlKcSxk2ay\n sebNHpNQzrhIngKDVGwUYlOEQ3TchR3bwQ+VubMmf639qrqufpxWg6lt8sPJyHQg\n nEQKcoV1Jn1XqklsLiBEGlxYl2eDbIx98wLOAUldcW71td7QMyf8WKArlnDMTiCO\n JjXafO9ACTF7tWMRaGPpxDN2L+Q2MfR8ghlPDC3QWSa87t/AkQ5clisfSoWdPf4Z\n ZXW3+F4if6J1/U93iPwDnH9xOXBoX+l/e/5suWLcUppp8H4gM5ZaH3qTqouK8O1R\n 4CdhAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0G\n A1UdDgQWBBQltRm8ARVE3fLUYhluMAFki8upijANBgkqhkiG9w0BAQsFAAOCAQEA\n SElJBcxkduhT3SPogIwU1jJRxVsSvZiHuZarrHzUAZMLmOsTsUYDIazAsYFKmDIU\n VXWkBbhOB3XKfAZveM7VsAoJ9AczvLXLA2n+o5s06L65xx/5+GYB/fzI1/y6ArM+\n wQuNwWoOIUGsuWeuw+iK6aiNn17M6uqBGkqDCGK1Gt4Z/cirq4hNbY2uD9di7fDK\n tGqWa0Sw4uhioB6nDKms7H4mw8rED/CK+MoXsG/prLNvd4BBFVlruyt/+j8ltBEv\n m8aANju4YvVJixcdFfNlBNdaG0prRBHggYXOA0JI40DAwKWV5uyp7XkqNqdDqD+d\n 3t4YtvmOveBhdVa5Qew4LA==\n -----END CERTIFICATE-----\n etcd-clients-ca: |\n -----BEGIN CERTIFICATE-----\n MIIC/DCCAeSgAwIBAgIMF8PHasNqQcvMElCZMA0GCSqGSIb3DQEBCwUAMBoxGDAW\n BgNVBAMTD2V0Y2QtY2xpZW50cy1jYTAeFw0yNDA0MDQxOTI1NDVaFw0zNDA0MDQx\n OTI1NDVaMBoxGDAWBgNVBAMTD2V0Y2QtY2xpZW50cy1jYTCCASIwDQYJKoZIhvcN\n AQEBBQADggEPADCCAQoCggEBAKDH8oA+9Gx/UxK/dH95YlO6kvSisVVf9Ooi/w/j\n sku7ePbKqcYCP73JvQuyWS8eaay8puhCnGzrACgJPNxLr/g6avIaLyiizlvrfIvk\n nHS0GntYZjk1ioj2w/C/EbnuosCyZxsgEay6O5jI0+svVzdJvoh1JEbuHH2lrxkh\n aDS774Y8wLUCl7S6C4aF0aH1l6XD9u4yD3+H3y+FO8jdYa65gT2WQ0AuqyN2I2yN\n 7p3qV56BJurSUZz14eM8/EkYYG6Q0dxUSqifhKCnZoAs5P2AoUUelfZoQVvX3TJS\n 2Cl2ZXceufrMwGd60a3jWEItKdLahmS53z9rBprKcdE2WmECAwEAAaNCMEAwDgYD\n VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFPMltxmlS3GX\n HhneBJpNOxfK2N+jMA0GCSqGSIb3DQEBCwUAA4IBAQAPi9A2MR44+fkl/hOfL+8L\n Uc1w5hSq9+u8+RM7BhU53XKmpYgXGX+yvDPTaw3J6cQeMRylbQ92EQIMISlU+bqQ\n tsybG+rjVncTao77M7+G9UhKuAar4XmI2vpvEciXZ01R+mPLE9xFHhkc0Ab9sljL\n FXI9NqQ1gedypps89na7kM8Uo5SbYkRr52rYsCBHcikbjbSaTHfRa6fnPwPYNoYv\n 75ltyGwFW+TR4vQPEpzrPCYuMfzpLoRHp/kxVJv/WtaHzPBLucwMk3ntzl/XKkEH\n 7GRAPQQnqaNW7ioIwVcwRxc9a43dfcxL9Bjm6ojOHpO48uWMNkQp9P863tS49zEt\n -----END CERTIFICATE-----\n etcd-manager-ca-events: |\n -----BEGIN CERTIFICATE-----\n MIIDCjCCAfKgAwIBAgIMF8PHasSlSdeA7Yk/MA0GCSqGSIb3DQEBCwUAMCExHzAd\n BgNVBAMTFmV0Y2QtbWFuYWdlci1jYS1ldmVudHMwHhcNMjQwNDA0MTkyNTQ0WhcN\n MzQwNDA0MTkyNTQ0WjAhMR8wHQYDVQQDExZldGNkLW1hbmFnZXItY2EtZXZlbnRz\n MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5plX89mDcmw29+gZX2s1\n 5BpZDXiZ/ggX7lKI7uR5OFn1pMCfZBacNNsVJMFY/mWfEGRF3Er7rAMiHNEwU7Fx\n 1juUnwjzcLZsRQKkA2rH4f4ZUWSDohG1vmRIwy/sigR/OGZ4df+sRiA8HmgwIHzO\n rPa/mubII4/VGLV4gdximeJi//GQOLKl8a3M0SkliOOP0IQKms9eaOQYwHLNgYGk\n tLvQZYnHAPNhgqPXnXadDEL48IMS8JZoIewZsC/guTqmdqhA5QRJL7VgQpWjOIhW\n PGPBPdmkicM3oRkb1JUXSObOWVTAOG1bm2r/lHQWUD1pm3VTXIrqQSl43pUBZvGa\n 6wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV\n HQ4EFgQUaEJ24MIixBqOyMwm2SEY9xa+PgIwDQYJKoZIhvcNAQELBQADggEBANIP\n AfUjZs+FvTvlUYc32PTWKNWM1GTyeMIOlQZwXq3ls7xB66kWykf6LfF0/1ayy+H0\n 4e84A5Z/OJD/4Y/oi2I7PcIX4pIW2Kspb21BowuzmrFD8NPZWUmsDlCIwk7LjetT\n LFmfHYTgkHq1/g+4yed43BsTWx5qPsIu6SImw89fPDTulnt/3GHagz08xGpg5Mut\n Mw36xeUtypH7QbOm4WECs94VG/oK0gvT1mM0ownGwE0Dz6sIpkAMpd9exngVwrtz\n wuUCOt+q/Gh55qlOTHwTafl4VeWKIt0l2Lcla9UnIlTYKxjMZ5g7EQ+kTfBeRn4L\n 7TvmQHIL2aenDeLcy50=\n -----END CERTIFICATE-----\n etcd-manager-ca-main: |\n -----BEGIN CERTIFICATE-----\n MIIDBjCCAe6gAwIBAgIMF8PHasZ5UwhrjlHdMA0GCSqGSIb3DQEBCwUAMB8xHTAb\n BgNVBAMTFGV0Y2QtbWFuYWdlci1jYS1tYWluMB4XDTI0MDQwNDE5MjU0NFoXDTM0\n MDQwNDE5MjU0NFowHzEdMBsGA1UEAxMUZXRjZC1tYW5hZ2VyLWNhLW1haW4wggEi\n MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDtJdy3ZMm5B4za+P+3db4tR+5p\n FWteZ3EzOtGjgcHkEuyOldY0jUR+gBkdviJvmTVJXky8HeDCcT/TWRJoOk8ReLDa\n PB3QEKGaF6h8tzcBIORkvxeegx540YsdoqVeN8NtHInJKhtzAByaGwzyUnPYdhQZ\n zFF0r98ozKPVTn59JtV14+4qf2m3rwCjm/K60GtfldcGv4V3aq0ROv6+6Tj04jxb\n ng1iD+rQ/0hh+pOZS5M9ALxSiFLT8+D6HGQcwi47XaIGKtHVUrbtIG0/WWRcDnIX\n 5eh1147jYWoMq9PdTJKF4Dh9KdtCXFZLV0K5NSI1nkTMoqF6hChRxnp8NEJTAgMB\n AAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n BBS+pfI2fhYWfRk9jyHCDeUf6pQ3xjANBgkqhkiG9w0BAQsFAAOCAQEAoEa+t1cq\n nmtX35hjdaMqJslcCufWhI4UKUIRz3Fg6FZowbvJvVU8Nhbol3RPLhlDJhICBfGQ\n 8Bg+l5KD8YF9VZ+tZDrCpx4b/+E0D+4HIFt6cwRbzB/JkItTtXv06ECWgPzVgovu\n 8eT0ps6FCwCigHW+zTK+z20izkWAb0RQ3wixLH/AmVsbwHjFjakx45h+XtRZmqL2\n XTKzW36i7H4RfcMpy4dD760g55UnPLcTGr9LcLZITPcMUUBAHWc6otKBnn4uxakP\n MtYOIvrftOX64tP0uUoRIu6zV+RgK0Rott09tfH7b7dtw5BvMIj6nmIso2+wBOTn\n E8VJCmS1S42HhQ==\n -----END CERTIFICATE-----\n etcd-peers-ca-events: |\n -----BEGIN CERTIFICATE-----\n MIIDBjCCAe6gAwIBAgIMF8PHasNnZJeGNX/NMA0GCSqGSIb3DQEBCwUAMB8xHTAb\n BgNVBAMTFGV0Y2QtcGVlcnMtY2EtZXZlbnRzMB4XDTI0MDQwNDE5MjU0NFoXDTM0\n MDQwNDE5MjU0NFowHzEdMBsGA1UEAxMUZXRjZC1wZWVycy1jYS1ldmVudHMwggEi\n MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJw+bMGz/odPesipO3I2CS0Jqm\n 1J4n1FpThemP33nTXgdFsClUpFdNdfVksDbwi63kp053Iy8PiMCyoFoiaZmQMMj+\n Dfp5mLAUC2WAI2zqL3+3ieURlPPlcfytsu48QuK/8Y6NrLJloIjhdTWBhVh1ll5/\n uoCZXUg+ENKudVIypINIPzZI+ZDUujZqfdWuU86Hnl4cV2vei6NMHM8owA4C8cS7\n CXrK4sVERXj3C8CRkKqe4WEOTKwlZV3jERhq4N7O72MpCVD2l6oaNbwQ8DutUNON\n ZCG2hgbMBpYmvr89UWTpQBQu2z4ajs0AhQVscq62V4b+Ecvlv7bRldCoXdnvAgMB\n AAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n BBRCkk2z8Pgj8qE+Utyff040XhP+xTANBgkqhkiG9w0BAQsFAAOCAQEAdJ2QFOWt\n ypWZNf3b3ktA661ciKSMMGfinkZlADhGh2Z0b8FpVv0G38V5KlTcMvNwoQZ7j70I\n B1RVsSsdVVDHDg9vb+r6rmcTyxbj5sk1280ySLnpoxGBOEOb57Mr1Tz8mRwPNEtT\n X1Z5LHnVqeoGymdXKUO9pFU9Qs5Yu6DbQHbPK/emKBYvQLQ3R/l4wq7STbccw3sT\n DUKHHpDPoRpv9mhFCzJ7Y0lP2fwow32gwDzE1teJ9BAuwrQzDaTZ77tVPeoN0ldV\n mU3imOAoZAyRTLkpf/j6rWJONogYk6Oy4k6wVOlRZ6B+to8DPTrGgonazbZJfm8B\n txUJO+rMVoN57g==\n -----END CERTIFICATE-----\n etcd-peers-ca-main: |\n -----BEGIN CERTIFICATE-----\n MIIDAjCCAeqgAwIBAgIMF8PHasNq5Xfa2GUJMA0GCSqGSIb3DQEBCwUAMB0xGzAZ\n BgNVBAMTEmV0Y2QtcGVlcnMtY2EtbWFpbjAeFw0yNDA0MDQxOTI1NDRaFw0zNDA0\n MDQxOTI1NDRaMB0xGzAZBgNVBAMTEmV0Y2QtcGVlcnMtY2EtbWFpbjCCASIwDQYJ\n KoZIhvcNAQEBBQADggEPADCCAQoCggEBAN+k7NcTUQ5l1M93XaO1s9bjv0prVPB6\n qmWVWD1AKjaPYNWc7U2NDpgZsDcrjhpEP1tRLmcT9llDByA+z/pQ0lgrWAYTO9aB\n s04ZTCV3cM5hrslbznr2IE1/cWkYGZKN/YpkblfJ/4yM5yzmPaLyjOCGdEivpBm3\n 2aGGDcPTYebZuTDdMcBReGR1JuMByk/Zsp3Z3YPprthCo/otI8k4CbiFW6oDqmZu\n ASmSZdTkNbdX4Xpi5Qe9Hi2n8tpLraNTxw9so5t/ebmPfC1Gjm97cxyDR/VbIDNZ\n QvsxLJeTYyb4zWl0/KQgqa7hQbo7k7gbvhm7mCMSoXy6nT9+93vMXxkCAwEAAaNC\n MEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFB7Q\n fGjEavJvU+t51W/LeyAMzYowMA0GCSqGSIb3DQEBCwUAA4IBAQB5Fu50I1v0zfWZ\n LfKJuWDNftgc3+cIbzHePpCPfHVFyAVLUhsD29LybgPg1mfmrWDX9vTIILxM74b/\n nVqSNkMFJfrav9uufno2zNO2jnkpv5oipXsx/U+4O5ga01aCOXyCbxQLAxDoQjbd\n gMBclq3wkXWRWa0kiU0y5K9PjzZFfnQ4ceD4I06yJOMTpJl3qp7SmHEOdQCil8K7\n qdIP67m2yUDiK2qLkAdRBpG0FW9qjx51AO7o2H6XBUnzu4VKQLIBcnVzWU8GWqti\n YB/Ddgp4vJYK0lkBNwrzzbVR+PEEu8CGMbC4gbBsbdWLw8TEj+xMUIotaQM6aPi6\n ye5xqVoT\n -----END CERTIFICATE-----\n kubernetes-ca: |\n -----BEGIN CERTIFICATE-----\n MIIC+DCCAeCgAwIBAgIMF8PHas0Osh5fBPkbMA0GCSqGSIb3DQEBCwUAMBgxFjAU\n BgNVBAMTDWt1YmVybmV0ZXMtY2EwHhcNMjQwNDA0MTkyNTQ0WhcNMzQwNDA0MTky\n NTQ0WjAYMRYwFAYDVQQDEw1rdWJlcm5ldGVzLWNhMIIBIjANBgkqhkiG9w0BAQEF\n AAOCAQ8AMIIBCgKCAQEAqNMxNQPVx2GQ/ejrT6+9VsY64N6n5fSW/rJg11PrxlJ1\n JEYjHLXWfTTccsnsBZxW9f+IPjlBJrSBVTLX2JwYEaKHAf5ij0A9+QWGINeszP85\n avZpJMFJskAFR6UPNJwIeuuwYcwXozilvL4nDKVR/Lxs2rBDfjCopjBmBHHT18jf\n maexWqgU4jTjXtiO9mvixqescrKaUU+WaXDHNhBomivtgiCBaeVG17bwPSUYAiuk\n pPJwZhLHUqVvgS2GZ2KpErvNPGeqCLqTTDCLDn4wRyDPllzuOAZKicZutTrgqIcS\n xCu59Tq4E6kdF1a9DhOxwxlpu3yrRsPCZyq6J0MOPwIDAQABo0IwQDAOBgNVHQ8B\n Af8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUpRg8Yt6kGATFqPd/\n IL9rPt9X9MQwDQYJKoZIhvcNAQELBQADggEBAE3hYvvMpBidw9qzFUhch7DG/tuN\n JhtvB8h53u/L5y/WD25y6PIjRLmrInlWMI2BItAXwVYNUVKceeFmaFyfTV+slMB8\n 8HEaHjXELMxYwKexpu2G0S2ZUVEHOjf5/CNkf8Yy/FdpcR+ioVGzlkc5JHSmdfUv\n qAGPvVdL+U5PRgRdqmXDETI2bAt4/0y10m9damRbmmSj5VFAnyLFzRa0p8Io2hce\n TFYjhnRm+3nl+nidXM0dzvmpUImcuend9ftJLW18CUeboTq0QKEjGNIUDhDMa2h3\n 07wSQFBUQsstJDoojSY8QfQYwJ61D/d6SDWU9yWFaN3ah6kdMFjn6SACB74=\n -----END CERTIFICATE-----\nClusterName: bug-report-cluster-public.<DOMAIN_REDACTED>\nContainerRuntime: containerd\nControlPlaneConfig:\n KubeControllerManager:\n allocateNodeCIDRs: true\n attachDetachReconcileSyncPeriod: 1m0s\n cloudProvider: external\n clusterCIDR: 100.96.0.0/11\n clusterName: bug-report-cluster-public.<DOMAIN_REDACTED>\n configureCloudRoutes: false\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n image: registry.k8s.io/kube-controller-manager:v1.28.6@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e\n leaderElection:\n leaderElect: true\n logLevel: 2\n useServiceAccountCredentials: true\n KubeScheduler:\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n image: registry.k8s.io/kube-scheduler:v1.28.6@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39\n leaderElection:\n leaderElect: true\n logLevel: 2\nDNSZone: Z050288919G22381WZFHT\nEtcdClusterNames:\n- main\n- events\nFileAssets:\n- content: |\n apiVersion: kubescheduler.config.k8s.io/v1\n clientConnection:\n kubeconfig: /var/lib/kube-scheduler/kubeconfig\n kind: KubeSchedulerConfiguration\n path: /var/lib/kube-scheduler/config.yaml\nHooks:\n- null\n- null\nKeypairIDs:\n apiserver-aggregator-ca: \"7354837481169540786033294947\"\n etcd-clients-ca: \"7354837481081891670832861337\"\n etcd-manager-ca-events: \"7354837481170565134868646207\"\n etcd-manager-ca-main: \"7354837481302305529668719069\"\n etcd-peers-ca-events: \"7354837481081085504299302861\"\n etcd-peers-ca-main: \"7354837481082071630210426121\"\n kubernetes-ca: \"7354837481776695413309765915\"\n service-account: \"7354837481588861887967264867\"\nKubeProxy: null\nKubeletConfig:\n anonymousAuth: false\n cgroupDriver: systemd\n cgroupRoot: /\n cloudProvider: external\n clusterDNS: 100.64.0.10\n clusterDomain: cluster.local\n enableDebuggingHandlers: true\n evictionHard: memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%\n featureGates:\n InTreePluginAWSUnregister: \"true\"\n kubeconfigPath: /var/lib/kubelet/kubeconfig\n logLevel: 2\n nodeLabels:\n kops.k8s.io/kops-controller-pki: \"\"\n node-role.kubernetes.io/control-plane: \"\"\n node.kubernetes.io/exclude-from-external-load-balancers: \"\"\n podInfraContainerImage: registry.k8s.io/pause:3.9@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097\n podManifestPath: /etc/kubernetes/manifests\n protectKernelDefaults: true\n registerSchedulable: true\n shutdownGracePeriod: 30s\n shutdownGracePeriodCriticalPods: 10s\n taints:\n - node-role.kubernetes.io/control-plane=:NoSchedule\nKubernetesVersion: 1.28.6\nNetworking:\n cilium: {}\n nonMasqueradeCIDR: 100.64.0.0/10\n serviceClusterIPRange: 100.64.0.0/13\nUpdatePolicy: automatic\nchannels:\n- s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/addons/bootstrap-channel.yaml\nconfigStore:\n keypairs: s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/pki\n secrets: s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/secrets\ncontainerdConfig:\n logLevel: info\n runc:\n version: 1.1.12\n version: 1.7.13\ndocker:\n skipInstall: true\netcdManifests:\n- s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/manifests/etcd/main-control-plane-us-east-1a.yaml\n- s3://kops-state-store-public-terraform-missing-route53-api-endpoint/bug-report-cluster-public.<DOMAIN_REDACTED>/manifests/etcd/events-control-plane-us-east-1a.yaml\nstaticManifests:\n- key: kube-apiserver-healthcheck\n path: manifests/static/kube-apiserver-healthcheck.yaml\nuseInstanceIDForNodeName: true\nusesLegacyGossip: false\nusesNoneDNS: false\n","task":{"Name":"control-plane-us-east-1a","Lifecycle":"Sync"}},"PublicACL":null}
I0406 14:25:45.772408 745188 executor.go:192] Executing task "EventBridgeTarget/bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange-Target": *awstasks.EventBridgeTarget {"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange-Target","Lifecycle":"Sync","Rule":{"ID":null,"Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange","Lifecycle":"Sync","EventPattern":"{\"source\": [\"aws.health\"],\"detail-type\": [\"AWS Health Event\"],\"detail\": {\"service\": [\"EC2\"],\"eventTypeCategory\": [\"scheduledChange\"]}}","SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-report-cluster-public.<DOMAIN_REDACTED>-InstanceScheduledChange","kubernetes.io/cluster/bug-report-cluster-public.<DOMAIN_REDACTED>":"owned"}},"SQSQueue":{"Name":"bug-report-cluster-public-<DOMAIN_REDACTED>-nth","Lifecycle":"Sync","ARN":null,"URL":null,"MessageRetentionPeriod":300,"Policy":"{\n\t\t\"Version\": \"2012-10-17\",\n\t\t\"Statement\": [{ \n\t\t\t\"Effect\": \"Allow\",\n\t\t\t\"Principal\": {\n\t\t\t\t\"Service\": [\"events.amazonaws.com\", \"sqs.amazonaws.com\"]\n\t\t\t},\n\t\t\t\"Action\": \"sqs:SendMessage\",\n\t\t\t\"Resource\": \"arn:aws:sqs:us-east-1:<ACCOUNTID_REDACTED>:bug-report-cluster-public-<DOMAIN_REDACTED>-nth\"\n\t\t}]\n\t}","Tags":{"KubernetesCluster":"bug-report-cluster-public.<DOMAIN_REDACTED>","Name":"bug-re
View raw

(Sorry about that, but we can’t show files that are this big right now.)

View raw

(Sorry about that, but we can’t show files that are this big right now.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment