Created
December 12, 2019 13:49
-
-
Save nodje/7f854d00284ced9ce031e2db8084709f to your computer and use it in GitHub Desktop.
kops first run "Getting Started with kops on AWS"
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
I1212 13:18:34.390182 402535 factory.go:68] state store s3://kops-domain-com-state-store | |
I1212 13:18:34.390273 402535 s3context.go:325] unable to read /sys/devices/virtual/dmi/id/product_uuid, assuming not running on EC2: open /sys/devices/virtual/dmi/id/product_uuid: permission denied | |
I1212 13:18:34.390294 402535 s3context.go:170] defaulting region to "us-east-1" | |
I1212 13:18:34.888588 402535 s3context.go:210] found bucket in region "us-east-1" | |
I1212 13:18:34.888634 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/config" | |
I1212 13:18:35.239817 402535 channel.go:99] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/" | |
I1212 13:18:35.239876 402535 channel.go:104] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable" | |
I1212 13:18:35.239891 402535 context.go:177] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable | |
I1212 13:18:35.478611 402535 channel.go:113] Channel contents: spec: | |
images: | |
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 ) | |
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.4.0 <1.5.0" | |
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.5.0 <1.6.0" | |
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.6.0 <1.7.0" | |
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.7.0 <1.8.0" | |
- name: kope.io/k8s-1.8-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.8.0 <1.9.0" | |
- name: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.9.0 <1.10.0" | |
- name: kope.io/k8s-1.10-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.10.0 <1.11.0" | |
# Stretch is the default for 1.11 (for nvme) | |
- name: kope.io/k8s-1.11-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.11.0 <1.12.0" | |
- name: kope.io/k8s-1.12-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.12.0 <1.13.0" | |
- name: kope.io/k8s-1.13-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.13.0 <1.14.0" | |
- name: kope.io/k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.14.0 <1.15.0" | |
- name: kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.15.0" | |
- providerID: gce | |
name: "cos-cloud/cos-stable-65-10323-99-0" | |
cluster: | |
kubernetesVersion: v1.5.8 | |
networking: | |
kubenet: {} | |
kubernetesVersions: | |
- range: ">=1.17.0" | |
recommendedVersion: 1.17.0 | |
requiredVersion: 1.17.0 | |
- range: ">=1.16.0" | |
recommendedVersion: 1.16.2 | |
requiredVersion: 1.16.0 | |
- range: ">=1.15.0" | |
recommendedVersion: 1.15.5 | |
requiredVersion: 1.15.0 | |
- range: ">=1.14.0" | |
recommendedVersion: 1.14.8 | |
requiredVersion: 1.14.0 | |
- range: ">=1.13.0" | |
recommendedVersion: 1.13.12 | |
requiredVersion: 1.13.0 | |
- range: ">=1.12.0" | |
recommendedVersion: 1.12.10 | |
requiredVersion: 1.12.0 | |
- range: ">=1.11.0" | |
recommendedVersion: 1.11.10 | |
requiredVersion: 1.11.0 | |
- range: "<1.11.0" | |
recommendedVersion: 1.11.10 | |
requiredVersion: 1.11.10 | |
kopsVersions: | |
- range: ">=1.17.0-alpha.1" | |
#recommendedVersion: "1.17.0" | |
#requiredVersion: 1.17.0 | |
kubernetesVersion: 1.17.0 | |
- range: ">=1.16.0-alpha.1" | |
#recommendedVersion: "1.16.0" | |
#requiredVersion: 1.16.0 | |
kubernetesVersion: 1.16.2 | |
- range: ">=1.15.0-alpha.1" | |
#recommendedVersion: "1.15.0" | |
#requiredVersion: 1.15.0 | |
kubernetesVersion: 1.15.5 | |
- range: ">=1.14.0-alpha.1" | |
#recommendedVersion: "1.14.0" | |
#requiredVersion: 1.14.0 | |
kubernetesVersion: 1.14.8 | |
- range: ">=1.13.0-alpha.1" | |
#recommendedVersion: "1.13.0" | |
#requiredVersion: 1.13.0 | |
kubernetesVersion: 1.13.12 | |
- range: ">=1.12.0-alpha.1" | |
recommendedVersion: "1.12.1" | |
#requiredVersion: 1.12.0 | |
kubernetesVersion: 1.12.10 | |
- range: ">=1.11.0-alpha.1" | |
recommendedVersion: "1.11.1" | |
#requiredVersion: 1.11.0 | |
kubernetesVersion: 1.11.10 | |
- range: "<1.11.0-alpha.1" | |
recommendedVersion: "1.11.1" | |
#requiredVersion: 1.10.0 | |
kubernetesVersion: 1.11.10 | |
I1212 13:18:35.478692 402535 channel.go:241] version range ">=1.17.0-alpha.1" does not apply to version "1.15.0"; skipping | |
I1212 13:18:35.478720 402535 channel.go:241] version range ">=1.16.0-alpha.1" does not apply to version "1.15.0"; skipping | |
I1212 13:18:35.478857 402535 create_cluster.go:517] Inferred --cloud=aws from zone "us-west-1a" | |
I1212 13:18:35.478932 402535 create_cluster.go:1018] networking mode=kubenet => {"kubenet":{}} | |
I1212 13:18:35.480109 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:35.480271 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:36.154327 402535 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-west-1a | |
I1212 13:18:36.154400 402535 defaults.go:224] Not setting up Proxy Excludes | |
I1212 13:18:36.155486 402535 populate_cluster_spec.go:371] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11 | |
I1212 13:18:36.155542 402535 populate_cluster_spec.go:378] Defaulted ServiceClusterIPRange to 100.64.0.0/13 | |
I1212 13:18:36.155586 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:36.155840 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:36.336661 402535 subnets.go:49] All subnets have CIDRs; skipping assignment logic | |
I1212 13:18:36.336724 402535 defaults.go:224] Not setting up Proxy Excludes | |
I1212 13:18:36.336854 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:36.337050 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:36.516458 402535 utils.go:167] Querying for all DNS zones to find match for "kops.domain.com" | |
I1212 13:18:36.516685 402535 route53.go:53] AWS request: route53 ListHostedZones | |
I1212 13:18:36.861249 402535 populate_cluster_spec.go:253] Defaulting DNS zone to: Z237FHI0B4E3ZX | |
I1212 13:18:36.861324 402535 tagbuilder.go:95] tags: [_aws _k8s_1_6] | |
I1212 13:18:36.861783 402535 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder | |
I1212 13:18:36.861807 402535 options_loader.go:130] executing builder *components.EtcdOptionsBuilder | |
I1212 13:18:36.861836 402535 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder | |
I1212 13:18:36.861880 402535 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder | |
I1212 13:18:36.861894 402535 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder | |
I1212 13:18:36.861985 402535 options_loader.go:130] executing builder *components.DockerOptionsBuilder | |
I1212 13:18:36.862008 402535 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder | |
I1212 13:18:36.862048 402535 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder | |
I1212 13:18:36.862071 402535 options_loader.go:130] executing builder *components.KubeletOptionsBuilder | |
I1212 13:18:36.862126 402535 kubelet.go:171] Cloud Provider: aws | |
I1212 13:18:36.862152 402535 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1212 13:18:36.862171 402535 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure | |
I1212 13:18:36.862220 402535 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s | |
I1212 13:18:36.862252 402535 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder | |
I1212 13:18:36.862294 402535 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder | |
I1212 13:18:36.863257 402535 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder | |
I1212 13:18:36.863313 402535 options_loader.go:130] executing builder *components.EtcdOptionsBuilder | |
I1212 13:18:36.863335 402535 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder | |
I1212 13:18:36.863349 402535 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder | |
I1212 13:18:36.863382 402535 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder | |
I1212 13:18:36.863435 402535 options_loader.go:130] executing builder *components.DockerOptionsBuilder | |
I1212 13:18:36.863474 402535 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder | |
I1212 13:18:36.863490 402535 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder | |
I1212 13:18:36.863529 402535 options_loader.go:130] executing builder *components.KubeletOptionsBuilder | |
I1212 13:18:36.863549 402535 kubelet.go:171] Cloud Provider: aws | |
I1212 13:18:36.863567 402535 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1212 13:18:36.863584 402535 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure | |
I1212 13:18:36.863632 402535 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder | |
I1212 13:18:36.863648 402535 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder | |
I1212 13:18:36.865142 402535 spec_builder.go:49] options: { | |
"channel": "stable", | |
"configBase": "s3://kops-domain-com-state-store/kops.domain.com", | |
"cloudProvider": "aws", | |
"kubernetesVersion": "1.15.5", | |
"subnets": [ | |
{ | |
"name": "us-west-1a", | |
"cidr": "172.20.32.0/19", | |
"zone": "us-west-1a", | |
"type": "Public" | |
} | |
], | |
"masterPublicName": "api.kops.domain.com", | |
"masterInternalName": "api.internal.kops.domain.com", | |
"networkCIDR": "172.20.0.0/16", | |
"topology": { | |
"masters": "public", | |
"nodes": "public", | |
"dns": { | |
"type": "Public" | |
} | |
}, | |
"secretStore": "s3://kops-domain-com-state-store/kops.domain.com/secrets", | |
"keyStore": "s3://kops-domain-com-state-store/kops.domain.com/pki", | |
"configStore": "s3://kops-domain-com-state-store/kops.domain.com", | |
"dnsZone": "Z237FHI0B4E3ZX", | |
"clusterDNSDomain": "cluster.local", | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"sshAccess": [ | |
"0.0.0.0/0" | |
], | |
"kubernetesApiAccess": [ | |
"0.0.0.0/0" | |
], | |
"etcdClusters": [ | |
{ | |
"name": "main", | |
"provider": "Manager", | |
"etcdMembers": [ | |
{ | |
"name": "a", | |
"instanceGroup": "master-us-west-1a" | |
} | |
], | |
"enableEtcdTLS": true, | |
"enableTLSAuth": true, | |
"version": "3.3.10", | |
"backups": { | |
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main" | |
}, | |
"manager": {}, | |
"memoryRequest": "100Mi", | |
"cpuRequest": "200m" | |
}, | |
{ | |
"name": "events", | |
"provider": "Manager", | |
"etcdMembers": [ | |
{ | |
"name": "a", | |
"instanceGroup": "master-us-west-1a" | |
} | |
], | |
"enableEtcdTLS": true, | |
"enableTLSAuth": true, | |
"version": "3.3.10", | |
"backups": { | |
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events" | |
}, | |
"manager": {}, | |
"memoryRequest": "100Mi", | |
"cpuRequest": "100m" | |
} | |
], | |
"docker": { | |
"ipMasq": false, | |
"ipTables": false, | |
"logDriver": "json-file", | |
"logLevel": "warn", | |
"logOpt": [ | |
"max-size=10m", | |
"max-file=5" | |
], | |
"storage": "overlay2,overlay,aufs", | |
"version": "18.06.3" | |
}, | |
"kubeDNS": { | |
"cacheMaxSize": 1000, | |
"cacheMaxConcurrent": 150, | |
"domain": "cluster.local", | |
"replicas": 2, | |
"serverIP": "100.64.0.10", | |
"memoryRequest": "70Mi", | |
"cpuRequest": "100m", | |
"memoryLimit": "170Mi" | |
}, | |
"kubeAPIServer": { | |
"image": "k8s.gcr.io/kube-apiserver:v1.15.5", | |
"logLevel": 2, | |
"cloudProvider": "aws", | |
"securePort": 443, | |
"insecurePort": 8080, | |
"bindAddress": "0.0.0.0", | |
"insecureBindAddress": "127.0.0.1", | |
"enableAdmissionPlugins": [ | |
"NamespaceLifecycle", | |
"LimitRanger", | |
"ServiceAccount", | |
"PersistentVolumeLabel", | |
"DefaultStorageClass", | |
"DefaultTolerationSeconds", | |
"MutatingAdmissionWebhook", | |
"ValidatingAdmissionWebhook", | |
"NodeRestriction", | |
"ResourceQuota" | |
], | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"etcdServers": [ | |
"http://127.0.0.1:4001" | |
], | |
"etcdServersOverrides": [ | |
"/events#http://127.0.0.1:4002" | |
], | |
"allowPrivileged": true, | |
"apiServerCount": 1, | |
"anonymousAuth": false, | |
"kubeletPreferredAddressTypes": [ | |
"InternalIP", | |
"Hostname", | |
"ExternalIP" | |
], | |
"storageBackend": "etcd3", | |
"authorizationMode": "RBAC", | |
"requestheaderUsernameHeaders": [ | |
"X-Remote-User" | |
], | |
"requestheaderGroupHeaders": [ | |
"X-Remote-Group" | |
], | |
"requestheaderExtraHeaderPrefixes": [ | |
"X-Remote-Extra-" | |
], | |
"requestheaderAllowedNames": [ | |
"aggregator" | |
] | |
}, | |
"kubeControllerManager": { | |
"logLevel": 2, | |
"image": "k8s.gcr.io/kube-controller-manager:v1.15.5", | |
"cloudProvider": "aws", | |
"clusterName": "kops.domain.com", | |
"clusterCIDR": "100.96.0.0/11", | |
"allocateNodeCIDRs": true, | |
"configureCloudRoutes": true, | |
"leaderElection": { | |
"leaderElect": true | |
}, | |
"attachDetachReconcileSyncPeriod": "1m0s", | |
"useServiceAccountCredentials": true | |
}, | |
"kubeScheduler": { | |
"logLevel": 2, | |
"image": "k8s.gcr.io/kube-scheduler:v1.15.5", | |
"leaderElection": { | |
"leaderElect": true | |
} | |
}, | |
"kubeProxy": { | |
"image": "k8s.gcr.io/kube-proxy:v1.15.5", | |
"cpuRequest": "100m", | |
"logLevel": 2, | |
"clusterCIDR": "100.96.0.0/11", | |
"hostnameOverride": "@aws" | |
}, | |
"kubelet": { | |
"anonymousAuth": false, | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0", | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "kubenet", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"networkPluginMTU": 9001, | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%", | |
"featureGates": { | |
"ExperimentalCriticalPodAnnotation": "true" | |
} | |
}, | |
"masterKubelet": { | |
"anonymousAuth": false, | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0", | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "kubenet", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"registerSchedulable": false, | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"networkPluginMTU": 9001, | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%", | |
"featureGates": { | |
"ExperimentalCriticalPodAnnotation": "true" | |
} | |
}, | |
"networking": { | |
"kubenet": {} | |
}, | |
"api": { | |
"dns": {} | |
}, | |
"authorization": { | |
"rbac": {} | |
}, | |
"iam": { | |
"legacy": false, | |
"allowContainerRegistry": true | |
} | |
} | |
I1212 13:18:36.865902 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:36.866092 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:37.045267 402535 aws_cloud.go:1407] checking if instance type "m3.medium" is supported in region "us-west-1" | |
I1212 13:18:37.045475 402535 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings | |
I1212 13:18:37.522110 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.4.0 <1.5.0 | |
I1212 13:18:37.522187 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.5.0 <1.6.0 | |
I1212 13:18:37.522227 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.6.0 <1.7.0 | |
I1212 13:18:37.522247 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.7.0 <1.8.0 | |
I1212 13:18:37.522262 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.8.0 <1.9.0 | |
I1212 13:18:37.522276 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.9.0 <1.10.0 | |
I1212 13:18:37.522290 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.10.0 <1.11.0 | |
I1212 13:18:37.522334 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.11.0 <1.12.0 | |
I1212 13:18:37.522349 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.12.0 <1.13.0 | |
I1212 13:18:37.522363 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.13.0 <1.14.0 | |
I1212 13:18:37.522377 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.14.0 <1.15.0 | |
I1212 13:18:37.522617 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:37.522864 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:37.708336 402535 aws_cloud.go:1407] checking if instance type "t2.medium" is supported in region "us-west-1" | |
I1212 13:18:37.708619 402535 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings | |
I1212 13:18:38.065134 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.4.0 <1.5.0 | |
I1212 13:18:38.065213 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.5.0 <1.6.0 | |
I1212 13:18:38.065234 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.6.0 <1.7.0 | |
I1212 13:18:38.065249 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.7.0 <1.8.0 | |
I1212 13:18:38.065263 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.8.0 <1.9.0 | |
I1212 13:18:38.065296 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.9.0 <1.10.0 | |
I1212 13:18:38.065315 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.10.0 <1.11.0 | |
I1212 13:18:38.065336 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.11.0 <1.12.0 | |
I1212 13:18:38.065351 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.12.0 <1.13.0 | |
I1212 13:18:38.065386 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.13.0 <1.14.0 | |
I1212 13:18:38.065403 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.14.0 <1.15.0 | |
I1212 13:18:38.079275 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/config" | |
I1212 13:18:38.164338 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/config" | |
I1212 13:18:38.164388 402535 s3context.go:238] Checking default bucket encryption for "kops-domain-com-state-store" | |
I1212 13:18:38.164395 402535 s3context.go:243] Calling S3 GetBucketEncryption Bucket="kops-domain-com-state-store" | |
I1212 13:18:38.246177 402535 s3context.go:263] bucket "kops-domain-com-state-store" has default encryption set to true | |
I1212 13:18:38.246235 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:38.246242 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/config" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:38.414915 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a" | |
I1212 13:18:38.541185 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a" | |
I1212 13:18:38.541256 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:38.541265 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/master-us-west-1a" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:38.671391 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes" | |
I1212 13:18:38.756277 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes" | |
I1212 13:18:38.756356 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:38.756373 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/nodes" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:38.870038 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/cluster.spec" | |
I1212 13:18:38.870105 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:38.870122 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/cluster.spec" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:38.976629 402535 create_cluster.go:1496] Using SSH public key: /home/user/.ssh/id_rsa.pub | |
I1212 13:18:38.976759 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2" | |
I1212 13:18:38.976781 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:38.976787 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
Previewing changes that will be made: | |
I1212 13:18:39.117271 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/config" | |
I1212 13:18:39.229866 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/instancegroup/" | |
I1212 13:18:39.330955 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/instancegroup: [s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes] | |
I1212 13:18:39.331668 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a" | |
I1212 13:18:39.424805 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes" | |
I1212 13:18:39.514982 402535 channel.go:99] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/" | |
I1212 13:18:39.515080 402535 channel.go:104] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable" | |
I1212 13:18:39.515157 402535 context.go:177] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable | |
I1212 13:18:39.522085 402535 channel.go:113] Channel contents: spec: | |
images: | |
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 ) | |
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.4.0 <1.5.0" | |
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.5.0 <1.6.0" | |
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.6.0 <1.7.0" | |
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.7.0 <1.8.0" | |
- name: kope.io/k8s-1.8-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.8.0 <1.9.0" | |
- name: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.9.0 <1.10.0" | |
- name: kope.io/k8s-1.10-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.10.0 <1.11.0" | |
# Stretch is the default for 1.11 (for nvme) | |
- name: kope.io/k8s-1.11-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.11.0 <1.12.0" | |
- name: kope.io/k8s-1.12-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.12.0 <1.13.0" | |
- name: kope.io/k8s-1.13-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.13.0 <1.14.0" | |
- name: kope.io/k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.14.0 <1.15.0" | |
- name: kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.15.0" | |
- providerID: gce | |
name: "cos-cloud/cos-stable-65-10323-99-0" | |
cluster: | |
kubernetesVersion: v1.5.8 | |
networking: | |
kubenet: {} | |
kubernetesVersions: | |
- range: ">=1.17.0" | |
recommendedVersion: 1.17.0 | |
requiredVersion: 1.17.0 | |
- range: ">=1.16.0" | |
recommendedVersion: 1.16.2 | |
requiredVersion: 1.16.0 | |
- range: ">=1.15.0" | |
recommendedVersion: 1.15.5 | |
requiredVersion: 1.15.0 | |
- range: ">=1.14.0" | |
recommendedVersion: 1.14.8 | |
requiredVersion: 1.14.0 | |
- range: ">=1.13.0" | |
recommendedVersion: 1.13.12 | |
requiredVersion: 1.13.0 | |
- range: ">=1.12.0" | |
recommendedVersion: 1.12.10 | |
requiredVersion: 1.12.0 | |
- range: ">=1.11.0" | |
recommendedVersion: 1.11.10 | |
requiredVersion: 1.11.0 | |
- range: "<1.11.0" | |
recommendedVersion: 1.11.10 | |
requiredVersion: 1.11.10 | |
kopsVersions: | |
- range: ">=1.17.0-alpha.1" | |
#recommendedVersion: "1.17.0" | |
#requiredVersion: 1.17.0 | |
kubernetesVersion: 1.17.0 | |
- range: ">=1.16.0-alpha.1" | |
#recommendedVersion: "1.16.0" | |
#requiredVersion: 1.16.0 | |
kubernetesVersion: 1.16.2 | |
- range: ">=1.15.0-alpha.1" | |
#recommendedVersion: "1.15.0" | |
#requiredVersion: 1.15.0 | |
kubernetesVersion: 1.15.5 | |
- range: ">=1.14.0-alpha.1" | |
#recommendedVersion: "1.14.0" | |
#requiredVersion: 1.14.0 | |
kubernetesVersion: 1.14.8 | |
- range: ">=1.13.0-alpha.1" | |
#recommendedVersion: "1.13.0" | |
#requiredVersion: 1.13.0 | |
kubernetesVersion: 1.13.12 | |
- range: ">=1.12.0-alpha.1" | |
recommendedVersion: "1.12.1" | |
#requiredVersion: 1.12.0 | |
kubernetesVersion: 1.12.10 | |
- range: ">=1.11.0-alpha.1" | |
recommendedVersion: "1.11.1" | |
#requiredVersion: 1.11.0 | |
kubernetesVersion: 1.11.10 | |
- range: "<1.11.0-alpha.1" | |
recommendedVersion: "1.11.1" | |
#requiredVersion: 1.10.0 | |
kubernetesVersion: 1.11.10 | |
I1212 13:18:39.522610 402535 populate_cluster_spec.go:371] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11 | |
I1212 13:18:39.522684 402535 populate_cluster_spec.go:378] Defaulted ServiceClusterIPRange to 100.64.0.0/13 | |
I1212 13:18:39.522782 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:39.522948 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:39.704986 402535 subnets.go:49] All subnets have CIDRs; skipping assignment logic | |
I1212 13:18:39.705032 402535 defaults.go:224] Not setting up Proxy Excludes | |
I1212 13:18:39.705092 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:39.705257 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:39.941969 402535 utils.go:167] Querying for all DNS zones to find match for "kops.domain.com" | |
I1212 13:18:39.942163 402535 route53.go:53] AWS request: route53 ListHostedZones | |
I1212 13:18:40.029798 402535 populate_cluster_spec.go:253] Defaulting DNS zone to: Z237FHI0B4E3ZX | |
I1212 13:18:40.029868 402535 tagbuilder.go:95] tags: [_aws _k8s_1_6] | |
I1212 13:18:40.030128 402535 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder | |
I1212 13:18:40.030162 402535 options_loader.go:130] executing builder *components.EtcdOptionsBuilder | |
I1212 13:18:40.030180 402535 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder | |
I1212 13:18:40.030193 402535 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder | |
I1212 13:18:40.030200 402535 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder | |
I1212 13:18:40.030253 402535 options_loader.go:130] executing builder *components.DockerOptionsBuilder | |
I1212 13:18:40.030266 402535 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder | |
I1212 13:18:40.030275 402535 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder | |
I1212 13:18:40.030289 402535 options_loader.go:130] executing builder *components.KubeletOptionsBuilder | |
I1212 13:18:40.030338 402535 kubelet.go:171] Cloud Provider: aws | |
I1212 13:18:40.030363 402535 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1212 13:18:40.030375 402535 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure | |
I1212 13:18:40.030409 402535 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s | |
I1212 13:18:40.030428 402535 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder | |
I1212 13:18:40.030462 402535 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder | |
I1212 13:18:40.031032 402535 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder | |
I1212 13:18:40.031066 402535 options_loader.go:130] executing builder *components.EtcdOptionsBuilder | |
I1212 13:18:40.031078 402535 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder | |
I1212 13:18:40.031087 402535 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder | |
I1212 13:18:40.031094 402535 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder | |
I1212 13:18:40.031143 402535 options_loader.go:130] executing builder *components.DockerOptionsBuilder | |
I1212 13:18:40.031155 402535 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder | |
I1212 13:18:40.031163 402535 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder | |
I1212 13:18:40.031171 402535 options_loader.go:130] executing builder *components.KubeletOptionsBuilder | |
I1212 13:18:40.031181 402535 kubelet.go:171] Cloud Provider: aws | |
I1212 13:18:40.031191 402535 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1212 13:18:40.031201 402535 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure | |
I1212 13:18:40.031231 402535 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder | |
I1212 13:18:40.031241 402535 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder | |
I1212 13:18:40.031972 402535 spec_builder.go:49] options: { | |
"channel": "stable", | |
"configBase": "s3://kops-domain-com-state-store/kops.domain.com", | |
"cloudProvider": "aws", | |
"kubernetesVersion": "1.15.5", | |
"subnets": [ | |
{ | |
"name": "us-west-1a", | |
"cidr": "172.20.32.0/19", | |
"zone": "us-west-1a", | |
"type": "Public" | |
} | |
], | |
"masterPublicName": "api.kops.domain.com", | |
"masterInternalName": "api.internal.kops.domain.com", | |
"networkCIDR": "172.20.0.0/16", | |
"topology": { | |
"masters": "public", | |
"nodes": "public", | |
"dns": { | |
"type": "Public" | |
} | |
}, | |
"secretStore": "s3://kops-domain-com-state-store/kops.domain.com/secrets", | |
"keyStore": "s3://kops-domain-com-state-store/kops.domain.com/pki", | |
"configStore": "s3://kops-domain-com-state-store/kops.domain.com", | |
"dnsZone": "Z237FHI0B4E3ZX", | |
"clusterDNSDomain": "cluster.local", | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"sshAccess": [ | |
"0.0.0.0/0" | |
], | |
"kubernetesApiAccess": [ | |
"0.0.0.0/0" | |
], | |
"etcdClusters": [ | |
{ | |
"name": "main", | |
"provider": "Manager", | |
"etcdMembers": [ | |
{ | |
"name": "a", | |
"instanceGroup": "master-us-west-1a" | |
} | |
], | |
"enableEtcdTLS": true, | |
"enableTLSAuth": true, | |
"version": "3.3.10", | |
"backups": { | |
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main" | |
}, | |
"manager": {}, | |
"memoryRequest": "100Mi", | |
"cpuRequest": "200m" | |
}, | |
{ | |
"name": "events", | |
"provider": "Manager", | |
"etcdMembers": [ | |
{ | |
"name": "a", | |
"instanceGroup": "master-us-west-1a" | |
} | |
], | |
"enableEtcdTLS": true, | |
"enableTLSAuth": true, | |
"version": "3.3.10", | |
"backups": { | |
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events" | |
}, | |
"manager": {}, | |
"memoryRequest": "100Mi", | |
"cpuRequest": "100m" | |
} | |
], | |
"docker": { | |
"ipMasq": false, | |
"ipTables": false, | |
"logDriver": "json-file", | |
"logLevel": "warn", | |
"logOpt": [ | |
"max-size=10m", | |
"max-file=5" | |
], | |
"storage": "overlay2,overlay,aufs", | |
"version": "18.06.3" | |
}, | |
"kubeDNS": { | |
"cacheMaxSize": 1000, | |
"cacheMaxConcurrent": 150, | |
"domain": "cluster.local", | |
"replicas": 2, | |
"serverIP": "100.64.0.10", | |
"memoryRequest": "70Mi", | |
"cpuRequest": "100m", | |
"memoryLimit": "170Mi" | |
}, | |
"kubeAPIServer": { | |
"image": "k8s.gcr.io/kube-apiserver:v1.15.5", | |
"logLevel": 2, | |
"cloudProvider": "aws", | |
"securePort": 443, | |
"insecurePort": 8080, | |
"bindAddress": "0.0.0.0", | |
"insecureBindAddress": "127.0.0.1", | |
"enableAdmissionPlugins": [ | |
"NamespaceLifecycle", | |
"LimitRanger", | |
"ServiceAccount", | |
"PersistentVolumeLabel", | |
"DefaultStorageClass", | |
"DefaultTolerationSeconds", | |
"MutatingAdmissionWebhook", | |
"ValidatingAdmissionWebhook", | |
"NodeRestriction", | |
"ResourceQuota" | |
], | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"etcdServers": [ | |
"http://127.0.0.1:4001" | |
], | |
"etcdServersOverrides": [ | |
"/events#http://127.0.0.1:4002" | |
], | |
"allowPrivileged": true, | |
"apiServerCount": 1, | |
"anonymousAuth": false, | |
"kubeletPreferredAddressTypes": [ | |
"InternalIP", | |
"Hostname", | |
"ExternalIP" | |
], | |
"storageBackend": "etcd3", | |
"authorizationMode": "RBAC", | |
"requestheaderUsernameHeaders": [ | |
"X-Remote-User" | |
], | |
"requestheaderGroupHeaders": [ | |
"X-Remote-Group" | |
], | |
"requestheaderExtraHeaderPrefixes": [ | |
"X-Remote-Extra-" | |
], | |
"requestheaderAllowedNames": [ | |
"aggregator" | |
] | |
}, | |
"kubeControllerManager": { | |
"logLevel": 2, | |
"image": "k8s.gcr.io/kube-controller-manager:v1.15.5", | |
"cloudProvider": "aws", | |
"clusterName": "kops.domain.com", | |
"clusterCIDR": "100.96.0.0/11", | |
"allocateNodeCIDRs": true, | |
"configureCloudRoutes": true, | |
"leaderElection": { | |
"leaderElect": true | |
}, | |
"attachDetachReconcileSyncPeriod": "1m0s", | |
"useServiceAccountCredentials": true | |
}, | |
"kubeScheduler": { | |
"logLevel": 2, | |
"image": "k8s.gcr.io/kube-scheduler:v1.15.5", | |
"leaderElection": { | |
"leaderElect": true | |
} | |
}, | |
"kubeProxy": { | |
"image": "k8s.gcr.io/kube-proxy:v1.15.5", | |
"cpuRequest": "100m", | |
"logLevel": 2, | |
"clusterCIDR": "100.96.0.0/11", | |
"hostnameOverride": "@aws" | |
}, | |
"kubelet": { | |
"anonymousAuth": false, | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0", | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "kubenet", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"networkPluginMTU": 9001, | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%", | |
"featureGates": { | |
"ExperimentalCriticalPodAnnotation": "true" | |
} | |
}, | |
"masterKubelet": { | |
"anonymousAuth": false, | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0", | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "kubenet", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"registerSchedulable": false, | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"networkPluginMTU": 9001, | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%", | |
"featureGates": { | |
"ExperimentalCriticalPodAnnotation": "true" | |
} | |
}, | |
"networking": { | |
"kubenet": {} | |
}, | |
"api": { | |
"dns": {} | |
}, | |
"authorization": { | |
"rbac": {} | |
}, | |
"iam": { | |
"legacy": false, | |
"allowContainerRegistry": true | |
} | |
} | |
I1212 13:18:40.032211 402535 channel.go:241] version range ">=1.17.0-alpha.1" does not apply to version "1.15.0"; skipping | |
I1212 13:18:40.032230 402535 channel.go:241] version range ">=1.16.0-alpha.1" does not apply to version "1.15.0"; skipping | |
I1212 13:18:40.032248 402535 channel.go:152] VersionRecommendationSpec does not specify RecommendedVersion | |
I1212 13:18:40.032272 402535 channel.go:192] VersionRecommendationSpec does not specify RequiredVersion | |
I1212 13:18:40.032281 402535 channel.go:220] version range ">=1.17.0" does not apply to version "1.15.5"; skipping | |
I1212 13:18:40.032288 402535 channel.go:220] version range ">=1.16.0" does not apply to version "1.15.5"; skipping | |
I1212 13:18:40.032298 402535 channel.go:144] RecommendedVersion="1.15.5", Have="1.15.5". No upgrade needed. | |
I1212 13:18:40.032307 402535 channel.go:184] RequiredVersion="1.15.0", Have="1.15.5". No upgrade needed. | |
I1212 13:18:40.032405 402535 context.go:177] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet.sha256 | |
I1212 13:18:40.058376 402535 builder.go:318] Found hash "de590308448a62982aa6209b52da6de69ee4855e449e5508c288c8d12d074ec5" for "https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet" | |
I1212 13:18:40.058520 402535 builder.go:235] adding file: &{DownloadURL:https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet CanonicalURL:<nil> SHAValue:de590308448a62982aa6209b52da6de69ee4855e449e5508c288c8d12d074ec5} | |
I1212 13:18:40.058601 402535 context.go:177] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl.sha256 | |
I1212 13:18:40.062598 402535 builder.go:318] Found hash "be84cf088241f29eca6221430f8fdb3788bc80eccb79b839d721c0daa6b46244" for "https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl" | |
I1212 13:18:40.062738 402535 builder.go:235] adding file: &{DownloadURL:https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl CanonicalURL:<nil> SHAValue:be84cf088241f29eca6221430f8fdb3788bc80eccb79b839d721c0daa6b46244} | |
I1212 13:18:40.062860 402535 networking.go:175] Adding default CNI asset for k8s >= 1.11: https://storage.googleapis.com/kubernetes-release/network-plugins/cni-plugins-amd64-v0.6.0.tgz | |
I1212 13:18:40.062945 402535 urls.go:81] Using default base url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/" | |
I1212 13:18:40.063187 402535 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz.sha256 | |
I1212 13:18:40.466055 402535 builder.go:318] Found hash "71b7bc444ba0a5f7cd7a36e91b594c1c3d13890e160d85e0dfde38c46a24e416" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz" | |
I1212 13:18:40.466108 402535 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz CanonicalURL:<nil> SHAValue:71b7bc444ba0a5f7cd7a36e91b594c1c3d13890e160d85e0dfde38c46a24e416} | |
I1212 13:18:40.466174 402535 urls.go:73] Using cached kopsBaseUrl url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/" | |
I1212 13:18:40.466196 402535 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup.sha256 | |
I1212 13:18:40.566422 402535 builder.go:318] Found hash "9604ef18267ad7b5cf4cebbf7ab64423cf5bb0342d169c608ac6376e6af26d81" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup" | |
I1212 13:18:40.566598 402535 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup CanonicalURL:<nil> SHAValue:9604ef18267ad7b5cf4cebbf7ab64423cf5bb0342d169c608ac6376e6af26d81} | |
I1212 13:18:40.566650 402535 urls.go:137] Using default nodeup location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup" | |
I1212 13:18:40.566720 402535 urls.go:73] Using cached kopsBaseUrl url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/" | |
I1212 13:18:40.566792 402535 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz.sha256 | |
I1212 13:18:40.666620 402535 builder.go:318] Found hash "42a9c4324fe26d63ce11f3dd7836371bc93fa06ca8f479807728f3746e27061b" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz" | |
I1212 13:18:40.666718 402535 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz CanonicalURL:<nil> SHAValue:42a9c4324fe26d63ce11f3dd7836371bc93fa06ca8f479807728f3746e27061b} | |
I1212 13:18:40.666791 402535 urls.go:178] Using default protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz" | |
I1212 13:18:40.666885 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:40.667109 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:40.846829 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/ssh/public/admin/" | |
I1212 13:18:40.946640 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin: [s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2] | |
I1212 13:18:40.946724 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2" | |
I1212 13:18:41.037083 402535 route53.go:53] AWS request: route53 ListHostedZones | |
I1212 13:18:41.124191 402535 dns.go:104] Doing DNS lookup to verify NS records for "kops.domain.com" | |
I1212 13:18:41.133158 402535 dns.go:121] Found NS records for "kops.domain.com": [ns-1946.awsdns-51.co.uk. ns-287.awsdns-35.com. ns-947.awsdns-54.net. ns-1265.awsdns-30.org.] | |
I1212 13:18:41.133229 402535 tagbuilder.go:95] tags: [_aws _k8s_1_6] | |
I1212 13:18:41.133630 402535 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml" | |
I1212 13:18:41.133726 402535 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml" | |
I1212 13:18:41.133895 402535 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml" | |
I1212 13:18:41.134026 402535 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml" | |
I1212 13:18:41.134139 402535 templates.go:80] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml" | |
I1212 13:18:41.134284 402535 templates.go:80] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.134341 402535 templates.go:88] loading resource "addons/limit-range.addons.k8s.io/addon.yaml" | |
I1212 13:18:41.134375 402535 templates.go:88] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:41.134961 402535 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.135847 402535 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.136360 402535 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.138340 402535 templates.go:80] loading (templated) resource "addons/networking.cilium.io/k8s-1.12.yaml" | |
I1212 13:18:41.139933 402535 templates.go:80] loading (templated) resource "addons/networking.cilium.io/k8s-1.7.yaml" | |
I1212 13:18:41.140682 402535 templates.go:88] loading resource "addons/networking.kope.io/k8s-1.12.yaml" | |
I1212 13:18:41.141073 402535 templates.go:88] loading resource "addons/networking.kope.io/k8s-1.6.yaml" | |
I1212 13:18:41.141376 402535 templates.go:88] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.141920 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml" | |
I1212 13:18:41.142531 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.8.yaml" | |
I1212 13:18:41.143159 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.9.yaml" | |
I1212 13:18:41.143675 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" | |
I1212 13:18:41.144629 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.12.yaml" | |
I1212 13:18:41.147035 402535 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.12.yaml" | |
I1212 13:18:41.147151 402535 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml" | |
I1212 13:18:41.147308 402535 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.7.yaml" | |
I1212 13:18:41.147408 402535 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.8.yaml" | |
I1212 13:18:41.147509 402535 templates.go:80] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml" | |
I1212 13:18:41.147583 402535 templates.go:88] loading resource "addons/external-dns.addons.k8s.io/README.md" | |
I1212 13:18:41.147676 402535 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.147779 402535 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.147841 402535 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.147979 402535 templates.go:80] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.148084 402535 templates.go:80] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.148167 402535 templates.go:80] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml" | |
I1212 13:18:41.148252 402535 templates.go:80] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml" | |
I1212 13:18:41.148361 402535 templates.go:88] loading resource "addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:41.148406 402535 templates.go:88] loading resource "addons/core.addons.k8s.io/addon.yaml" | |
I1212 13:18:41.148473 402535 templates.go:80] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.148556 402535 templates.go:80] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.7.yaml" | |
I1212 13:18:41.148594 402535 templates.go:88] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:41.148652 402535 templates.go:88] loading resource "addons/storage-gce.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:41.148695 402535 templates.go:88] loading resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.148770 402535 templates.go:88] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.148862 402535 templates.go:80] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml" | |
I1212 13:18:41.148935 402535 templates.go:80] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml" | |
I1212 13:18:41.148985 402535 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:41.149019 402535 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.149057 402535 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:41.149138 402535 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.149206 402535 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.149254 402535 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.149542 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7-v3.yaml" | |
I1212 13:18:41.149755 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7.yaml" | |
I1212 13:18:41.149934 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml" | |
I1212 13:18:41.150293 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.12.yaml" | |
I1212 13:18:41.150614 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml" | |
I1212 13:18:41.150763 402535 templates.go:80] loading (templated) resource "addons/networking.romana/k8s-1.12.yaml" | |
I1212 13:18:41.150895 402535 templates.go:80] loading (templated) resource "addons/networking.romana/k8s-1.7.yaml" | |
I1212 13:18:41.150969 402535 templates.go:80] loading (templated) resource "addons/authentication.aws/k8s-1.10.yaml" | |
I1212 13:18:41.151041 402535 templates.go:80] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml" | |
I1212 13:18:41.151081 402535 templates.go:88] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:41.151159 402535 templates.go:80] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.11.yaml" | |
I1212 13:18:41.151222 402535 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml" | |
I1212 13:18:41.151273 402535 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.151335 402535 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:41.151418 402535 templates.go:80] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:41.151559 402535 templates.go:80] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml" | |
I1212 13:18:41.151655 402535 templates.go:80] loading (templated) resource "addons/networking.flannel/k8s-1.6.yaml" | |
I1212 13:18:41.151738 402535 templates.go:80] loading (templated) resource "addons/networking.flannel/pre-k8s-1.6.yaml" | |
I1212 13:18:41.151822 402535 templates.go:88] loading resource "addons/authentication.kope.io/k8s-1.12.yaml" | |
I1212 13:18:41.152537 402535 templates.go:88] loading resource "addons/authentication.kope.io/k8s-1.8.yaml" | |
I1212 13:18:41.152661 402535 tree_walker.go:98] visit "cloudup/resources" | |
I1212 13:18:41.152690 402535 tree_walker.go:98] visit "cloudup/resources/addons" | |
I1212 13:18:41.152734 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io" | |
I1212 13:18:41.152760 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:41.152803 402535 loader.go:362] loading resource "addons/storage-gce.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:41.152812 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.152852 402535 loader.go:362] loading resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.152863 402535 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io" | |
I1212 13:18:41.152878 402535 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1212 13:18:41.152930 402535 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.152939 402535 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:41.153032 402535 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.153046 402535 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml.template" | |
I1212 13:18:41.153109 402535 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.153118 402535 tree_walker.go:98] visit "cloudup/resources/addons/scheduler.addons.k8s.io" | |
I1212 13:18:41.153130 402535 tree_walker.go:98] visit "cloudup/resources/addons/scheduler.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.153181 402535 loader.go:362] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.153191 402535 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io" | |
I1212 13:18:41.153205 402535 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml.template" | |
I1212 13:18:41.153300 402535 loader.go:354] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml" | |
I1212 13:18:41.153316 402535 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml.template" | |
I1212 13:18:41.153464 402535 loader.go:354] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml" | |
I1212 13:18:41.153484 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io" | |
I1212 13:18:41.153525 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.153591 402535 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.153604 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:41.153707 402535 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:41.153723 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:41.153760 402535 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:41.153769 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws" | |
I1212 13:18:41.153783 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws/k8s-1.10.yaml.template" | |
I1212 13:18:41.153853 402535 loader.go:354] loading (templated) resource "addons/authentication.aws/k8s-1.10.yaml" | |
I1212 13:18:41.153864 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws/k8s-1.12.yaml.template" | |
I1212 13:18:41.153921 402535 loader.go:354] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml" | |
I1212 13:18:41.153930 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org" | |
I1212 13:18:41.153947 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.12.yaml.template" | |
I1212 13:18:41.154259 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.12.yaml" | |
I1212 13:18:41.154303 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.6.yaml.template" | |
I1212 13:18:41.154717 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml" | |
I1212 13:18:41.154810 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.7-v3.yaml.template" | |
I1212 13:18:41.155051 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7-v3.yaml" | |
I1212 13:18:41.155078 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.7.yaml.template" | |
I1212 13:18:41.155684 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7.yaml" | |
I1212 13:18:41.155992 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/pre-k8s-1.6.yaml.template" | |
I1212 13:18:41.156387 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml" | |
I1212 13:18:41.156409 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana" | |
I1212 13:18:41.156428 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana/k8s-1.7.yaml.template" | |
I1212 13:18:41.156700 402535 loader.go:354] loading (templated) resource "addons/networking.romana/k8s-1.7.yaml" | |
I1212 13:18:41.156723 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana/k8s-1.12.yaml.template" | |
I1212 13:18:41.156986 402535 loader.go:354] loading (templated) resource "addons/networking.romana/k8s-1.12.yaml" | |
I1212 13:18:41.157012 402535 tree_walker.go:98] visit "cloudup/resources/addons/digitalocean-cloud-controller.addons.k8s.io" | |
I1212 13:18:41.157031 402535 tree_walker.go:98] visit "cloudup/resources/addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml.template" | |
I1212 13:18:41.157212 402535 loader.go:354] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:41.157226 402535 tree_walker.go:98] visit "cloudup/resources/addons/kubelet-api.rbac.addons.k8s.io" | |
I1212 13:18:41.157248 402535 tree_walker.go:98] visit "cloudup/resources/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:41.157309 402535 loader.go:362] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:41.157327 402535 tree_walker.go:98] visit "cloudup/resources/addons/openstack.addons.k8s.io" | |
I1212 13:18:41.157350 402535 tree_walker.go:98] visit "cloudup/resources/addons/openstack.addons.k8s.io/k8s-1.11.yaml.template" | |
I1212 13:18:41.157559 402535 loader.go:354] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.11.yaml" | |
I1212 13:18:41.157578 402535 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io" | |
I1212 13:18:41.157604 402535 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml.template" | |
I1212 13:18:41.157797 402535 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml" | |
I1212 13:18:41.157813 402535 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:41.158039 402535 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.158059 402535 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml.template" | |
I1212 13:18:41.158220 402535 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:41.158234 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io" | |
I1212 13:18:41.158252 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.8.yaml" | |
I1212 13:18:41.158343 402535 loader.go:362] loading resource "addons/authentication.kope.io/k8s-1.8.yaml" | |
I1212 13:18:41.158852 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.12.yaml" | |
I1212 13:18:41.158956 402535 loader.go:362] loading resource "addons/authentication.kope.io/k8s-1.12.yaml" | |
I1212 13:18:41.158978 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel" | |
I1212 13:18:41.158997 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/k8s-1.12.yaml.template" | |
I1212 13:18:41.159337 402535 loader.go:354] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml" | |
I1212 13:18:41.159359 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/k8s-1.6.yaml.template" | |
I1212 13:18:41.159658 402535 loader.go:354] loading (templated) resource "addons/networking.flannel/k8s-1.6.yaml" | |
I1212 13:18:41.159683 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/pre-k8s-1.6.yaml.template" | |
I1212 13:18:41.159924 402535 loader.go:354] loading (templated) resource "addons/networking.flannel/pre-k8s-1.6.yaml" | |
I1212 13:18:41.159941 402535 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io" | |
I1212 13:18:41.159960 402535 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io/addon.yaml" | |
I1212 13:18:41.160012 402535 loader.go:362] loading resource "addons/limit-range.addons.k8s.io/addon.yaml" | |
I1212 13:18:41.160023 402535 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:41.162426 402535 loader.go:362] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:41.162464 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni" | |
I1212 13:18:41.162510 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml.template" | |
I1212 13:18:41.162609 402535 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml" | |
I1212 13:18:41.162629 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml.template" | |
I1212 13:18:41.162730 402535 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml" | |
I1212 13:18:41.162748 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml.template" | |
I1212 13:18:41.162867 402535 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml" | |
I1212 13:18:41.162919 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml.template" | |
I1212 13:18:41.163025 402535 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml" | |
I1212 13:18:41.163039 402535 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io" | |
I1212 13:18:41.163056 402535 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml.template" | |
I1212 13:18:41.163198 402535 loader.go:354] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml" | |
I1212 13:18:41.163215 402535 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:41.163367 402535 loader.go:354] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.163384 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io" | |
I1212 13:18:41.163414 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.6.yaml.template" | |
I1212 13:18:41.163482 402535 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.163493 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1212 13:18:41.163577 402535 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.163588 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/README.md" | |
I1212 13:18:41.163730 402535 loader.go:362] loading resource "addons/external-dns.addons.k8s.io/README.md" | |
I1212 13:18:41.163743 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:41.163802 402535 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.163813 402535 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io" | |
I1212 13:18:41.163835 402535 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:41.164015 402535 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.164029 402535 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml.template" | |
I1212 13:18:41.164223 402535 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.164240 402535 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1212 13:18:41.164363 402535 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.164381 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io" | |
I1212 13:18:41.164450 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io/k8s-1.12.yaml.template" | |
I1212 13:18:41.164757 402535 loader.go:354] loading (templated) resource "addons/networking.cilium.io/k8s-1.12.yaml" | |
I1212 13:18:41.164788 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io/k8s-1.7.yaml.template" | |
I1212 13:18:41.165054 402535 loader.go:354] loading (templated) resource "addons/networking.cilium.io/k8s-1.7.yaml" | |
I1212 13:18:41.165078 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io" | |
I1212 13:18:41.165097 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/k8s-1.12.yaml" | |
I1212 13:18:41.165174 402535 loader.go:362] loading resource "addons/networking.kope.io/k8s-1.12.yaml" | |
I1212 13:18:41.165185 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/k8s-1.6.yaml" | |
I1212 13:18:41.165287 402535 loader.go:362] loading resource "addons/networking.kope.io/k8s-1.6.yaml" | |
I1212 13:18:41.165307 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.165363 402535 loader.go:362] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.165374 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal" | |
I1212 13:18:41.165400 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.8.yaml.template" | |
I1212 13:18:41.165664 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.8.yaml" | |
I1212 13:18:41.165692 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.9.yaml.template" | |
I1212 13:18:41.166249 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.9.yaml" | |
I1212 13:18:41.166363 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml.template" | |
I1212 13:18:41.166668 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" | |
I1212 13:18:41.166701 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.12.yaml.template" | |
I1212 13:18:41.167142 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.12.yaml" | |
I1212 13:18:41.167176 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.6.yaml.template" | |
I1212 13:18:41.167697 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml" | |
I1212 13:18:41.167732 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave" | |
I1212 13:18:41.167757 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.12.yaml.template" | |
I1212 13:18:41.167875 402535 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.12.yaml" | |
I1212 13:18:41.167889 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.6.yaml.template" | |
I1212 13:18:41.168157 402535 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml" | |
I1212 13:18:41.168986 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.7.yaml.template" | |
I1212 13:18:41.169214 402535 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.7.yaml" | |
I1212 13:18:41.169229 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.8.yaml.template" | |
I1212 13:18:41.169925 402535 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.8.yaml" | |
I1212 13:18:41.169948 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/pre-k8s-1.6.yaml.template" | |
I1212 13:18:41.170157 402535 loader.go:354] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml" | |
I1212 13:18:41.170175 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io" | |
I1212 13:18:41.170198 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/addon.yaml" | |
I1212 13:18:41.170518 402535 loader.go:362] loading resource "addons/core.addons.k8s.io/addon.yaml" | |
I1212 13:18:41.170535 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:41.170709 402535 loader.go:354] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.170737 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/k8s-1.7.yaml.template" | |
I1212 13:18:41.170991 402535 loader.go:354] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.7.yaml" | |
I1212 13:18:41.171011 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:41.171154 402535 loader.go:362] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:41.171167 402535 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io" | |
I1212 13:18:41.171185 402535 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io/k8s-1.6.yaml.template" | |
I1212 13:18:41.171441 402535 loader.go:354] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.171455 402535 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:41.171935 402535 loader.go:354] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.171962 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter" | |
I1212 13:18:41.171989 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.12.yaml.template" | |
I1212 13:18:41.172346 402535 loader.go:354] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml" | |
I1212 13:18:41.172362 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.6.yaml.template" | |
I1212 13:18:41.172765 402535 loader.go:354] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml" | |
I1212 13:18:41.172784 402535 tree_walker.go:98] visit "cloudup/resources/addons/rbac.addons.k8s.io" | |
I1212 13:18:41.172817 402535 tree_walker.go:98] visit "cloudup/resources/addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:41.173062 402535 loader.go:362] loading resource "addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:41.173363 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: v1 | |
kind: Namespace | |
metadata: | |
name: kube-system | |
I1212 13:18:41.173379 402535 bootstrapchannelbuilder.go:79] hash 3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90 | |
I1212 13:18:41.175254 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0" | |
I1212 13:18:41.176332 402535 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000 | |
I1212 13:18:41.176359 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000 | |
I1212 13:18:41.176370 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000 | |
I1212 13:18:41.176376 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000 | |
I1212 13:18:41.176382 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000 | |
I1212 13:18:41.176387 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.176392 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000 | |
I1212 13:18:41.176404 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/kubedns-amd64:1.9" | |
I1212 13:18:41.176416 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 8080.000000 | |
I1212 13:18:41.176422 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.176427 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.176432 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.176437 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.176443 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10" | |
I1212 13:18:41.176450 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.176455 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.176460 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.176464 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.176469 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 8080.000000 | |
I1212 13:18:41.176475 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000 | |
I1212 13:18:41.176481 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000 | |
I1212 13:18:41.176493 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/dnsmasq-metrics-amd64:1.0" | |
I1212 13:18:41.176518 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.176527 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.176532 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.176537 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:41.176542 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.176548 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000 | |
I1212 13:18:41.176557 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/exechealthz-amd64:1.2" | |
I1212 13:18:41.176565 402535 visitor.go:40] float64 value at spec.template.spec.containers.[3].ports.[0].containerPort: 8080.000000 | |
I1212 13:18:41.177967 402535 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000 | |
I1212 13:18:41.177999 402535 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000 | |
I1212 13:18:41.178320 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns-autoscaler | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
spec: | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", | |
"operator":"Exists"}]' | |
labels: | |
k8s-app: kube-dns-autoscaler | |
spec: | |
containers: | |
- command: | |
- /cluster-proportional-autoscaler | |
- --namespace=kube-system | |
- --configmap=kube-dns-autoscaler | |
- --mode=linear | |
- --target=Deployment/kube-dns | |
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"min":2}} | |
- --logtostderr=true | |
- --v=2 | |
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0 | |
name: autoscaler | |
resources: | |
requests: | |
cpu: 20m | |
memory: 10Mi | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: kube-dns | |
strategy: | |
rollingUpdate: | |
maxSurge: 10% | |
maxUnavailable: 0 | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", | |
"operator":"Exists"}]' | |
labels: | |
k8s-app: kube-dns | |
spec: | |
containers: | |
- args: | |
- --domain=cluster.local. | |
- --dns-port=10053 | |
- --config-map=kube-dns | |
- --v=2 | |
env: | |
- name: PROMETHEUS_PORT | |
value: "10055" | |
image: k8s.gcr.io/kubedns-amd64:1.9 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthz-kubedns | |
port: 8080 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: kubedns | |
ports: | |
- containerPort: 10053 | |
name: dns-local | |
protocol: UDP | |
- containerPort: 10053 | |
name: dns-tcp-local | |
protocol: TCP | |
- containerPort: 10055 | |
name: metrics | |
protocol: TCP | |
readinessProbe: | |
httpGet: | |
path: /readiness | |
port: 8081 | |
scheme: HTTP | |
initialDelaySeconds: 3 | |
timeoutSeconds: 5 | |
resources: | |
limits: | |
memory: 170Mi | |
requests: | |
cpu: 100m | |
memory: 70Mi | |
- args: | |
- --cache-size=1000 | |
- --dns-forward-max=150 | |
- --no-resolv | |
- --server=127.0.0.1#10053 | |
- --log-facility=- | |
- --min-port=1024 | |
image: k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthz-dnsmasq | |
port: 8080 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: dnsmasq | |
ports: | |
- containerPort: 53 | |
name: dns | |
protocol: UDP | |
- containerPort: 53 | |
name: dns-tcp | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 150m | |
memory: 10Mi | |
- args: | |
- --v=2 | |
- --logtostderr | |
image: k8s.gcr.io/dnsmasq-metrics-amd64:1.0 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /metrics | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: dnsmasq-metrics | |
ports: | |
- containerPort: 10054 | |
name: metrics | |
protocol: TCP | |
resources: | |
requests: | |
memory: 10Mi | |
- args: | |
- --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 >/dev/null | |
- --url=/healthz-dnsmasq | |
- --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1:10053 >/dev/null | |
- --url=/healthz-kubedns | |
- --port=8080 | |
- --quiet | |
image: k8s.gcr.io/exechealthz-amd64:1.2 | |
name: healthz | |
ports: | |
- containerPort: 8080 | |
protocol: TCP | |
resources: | |
limits: | |
memory: 50Mi | |
requests: | |
cpu: 10m | |
memory: 50Mi | |
dnsPolicy: Default | |
--- | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
kubernetes.io/name: KubeDNS | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
clusterIP: 100.64.0.10 | |
ports: | |
- name: dns | |
port: 53 | |
protocol: UDP | |
- name: dns-tcp | |
port: 53 | |
protocol: TCP | |
selector: | |
k8s-app: kube-dns | |
I1212 13:18:41.178426 402535 bootstrapchannelbuilder.go:79] hash 895c961cb9365cbedb22edd20a7648182ae7ed3f | |
I1212 13:18:41.180770 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2" | |
I1212 13:18:41.181266 402535 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000 | |
I1212 13:18:41.181288 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10" | |
I1212 13:18:41.181299 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000 | |
I1212 13:18:41.181306 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000 | |
I1212 13:18:41.181311 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.181321 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.181327 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:41.181332 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.181337 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.181342 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.181348 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000 | |
I1212 13:18:41.181354 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000 | |
I1212 13:18:41.181360 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000 | |
I1212 13:18:41.181368 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000 | |
I1212 13:18:41.181373 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000 | |
I1212 13:18:41.181387 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10" | |
I1212 13:18:41.181395 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.181400 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.181405 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.181410 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:41.181415 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.181432 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10" | |
I1212 13:18:41.181439 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.181445 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:41.181450 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.181455 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.181460 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.181466 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000 | |
I1212 13:18:41.181475 402535 visitor.go:35] string value at spec.template.spec.volumes.[0].configMap.optional: true | |
I1212 13:18:41.183429 402535 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000 | |
I1212 13:18:41.183451 402535 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000 | |
I1212 13:18:41.185314 402535 bootstrapchannelbuilder.go:76] Manifest {} | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns-autoscaler | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
spec: | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", | |
"operator":"Exists"}]' | |
labels: | |
k8s-app: kube-dns-autoscaler | |
spec: | |
containers: | |
- command: | |
- /cluster-proportional-autoscaler | |
- --namespace=kube-system | |
- --configmap=kube-dns-autoscaler | |
- --target=Deployment/kube-dns | |
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}} | |
- --logtostderr=true | |
- --v=2 | |
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2 | |
name: autoscaler | |
resources: | |
requests: | |
cpu: 20m | |
memory: 10Mi | |
serviceAccountName: kube-dns-autoscaler | |
tolerations: | |
- key: CriticalAddonsOnly | |
operator: Exists | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: kube-dns | |
strategy: | |
rollingUpdate: | |
maxSurge: 10% | |
maxUnavailable: 0 | |
template: | |
metadata: | |
annotations: | |
prometheus.io/port: "10055" | |
prometheus.io/scrape: "true" | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", | |
"operator":"Exists"}]' | |
labels: | |
k8s-app: kube-dns | |
spec: | |
containers: | |
- args: | |
- --config-dir=/kube-dns-config | |
- --dns-port=10053 | |
- --domain=cluster.local. | |
- --v=2 | |
env: | |
- name: PROMETHEUS_PORT | |
value: "10055" | |
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthcheck/kubedns | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: kubedns | |
ports: | |
- containerPort: 10053 | |
name: dns-local | |
protocol: UDP | |
- containerPort: 10053 | |
name: dns-tcp-local | |
protocol: TCP | |
- containerPort: 10055 | |
name: metrics | |
protocol: TCP | |
readinessProbe: | |
httpGet: | |
path: /readiness | |
port: 8081 | |
scheme: HTTP | |
initialDelaySeconds: 3 | |
timeoutSeconds: 5 | |
resources: | |
limits: | |
memory: 170Mi | |
requests: | |
cpu: 100m | |
memory: 70Mi | |
volumeMounts: | |
- mountPath: /kube-dns-config | |
name: kube-dns-config | |
- args: | |
- -v=2 | |
- -logtostderr | |
- -configDir=/etc/k8s/dns/dnsmasq-nanny | |
- -restartDnsmasq=true | |
- -- | |
- -k | |
- --cache-size=1000 | |
- --dns-forward-max=150 | |
- --no-negcache | |
- --log-facility=- | |
- --server=/cluster.local/127.0.0.1#10053 | |
- --server=/in-addr.arpa/127.0.0.1#10053 | |
- --server=/in6.arpa/127.0.0.1#10053 | |
- --min-port=1024 | |
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthcheck/dnsmasq | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: dnsmasq | |
ports: | |
- containerPort: 53 | |
name: dns | |
protocol: UDP | |
- containerPort: 53 | |
name: dns-tcp | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 150m | |
memory: 20Mi | |
volumeMounts: | |
- mountPath: /etc/k8s/dns/dnsmasq-nanny | |
name: kube-dns-config | |
- args: | |
- --v=2 | |
- --logtostderr | |
- --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A | |
- --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A | |
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /metrics | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: sidecar | |
ports: | |
- containerPort: 10054 | |
name: metrics | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 10m | |
memory: 20Mi | |
dnsPolicy: Default | |
serviceAccountName: kube-dns | |
volumes: | |
- configMap: | |
name: kube-dns | |
optional: true | |
name: kube-dns-config | |
--- | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
kubernetes.io/name: KubeDNS | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
clusterIP: 100.64.0.10 | |
ports: | |
- name: dns | |
port: 53 | |
protocol: UDP | |
- name: dns-tcp | |
port: 53 | |
protocol: TCP | |
selector: | |
k8s-app: kube-dns | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- extensions | |
resources: | |
- deployments/scale | |
- replicasets/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
verbs: | |
- get | |
- create | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kube-dns-autoscaler | |
subjects: | |
- kind: ServiceAccount | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
I1212 13:18:41.185371 402535 bootstrapchannelbuilder.go:79] hash 191685ca6fe009302e55512b0eefc5a676433f10 | |
I1212 13:18:41.190310 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0" | |
I1212 13:18:41.191299 402535 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000 | |
I1212 13:18:41.191360 402535 visitor.go:40] float64 value at spec.template.spec.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution.[0].weight: 1.000000 | |
I1212 13:18:41.191383 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13" | |
I1212 13:18:41.191397 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.191405 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:41.191412 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.191423 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.191428 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.191435 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000 | |
I1212 13:18:41.191442 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000 | |
I1212 13:18:41.191454 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000 | |
I1212 13:18:41.191461 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.191467 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000 | |
I1212 13:18:41.191473 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000 | |
I1212 13:18:41.191489 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000 | |
I1212 13:18:41.191516 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000 | |
I1212 13:18:41.191546 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13" | |
I1212 13:18:41.191555 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.191562 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:41.191599 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.191608 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.191613 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.191620 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13" | |
I1212 13:18:41.191635 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:41.191641 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:41.191647 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:41.191653 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:41.191659 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:41.191670 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000 | |
I1212 13:18:41.191686 402535 visitor.go:35] string value at spec.template.spec.volumes.[0].configMap.optional: true | |
I1212 13:18:41.194307 402535 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000 | |
I1212 13:18:41.194348 402535 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000 | |
I1212 13:18:41.197313 402535 visitor.go:40] float64 value at spec.minAvailable: 1.000000 | |
I1212 13:18:41.197689 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns-autoscaler | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: kube-dns-autoscaler | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
labels: | |
k8s-app: kube-dns-autoscaler | |
spec: | |
containers: | |
- command: | |
- /cluster-proportional-autoscaler | |
- --namespace=kube-system | |
- --configmap=kube-dns-autoscaler | |
- --target=Deployment/kube-dns | |
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}} | |
- --logtostderr=true | |
- --v=2 | |
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0 | |
name: autoscaler | |
resources: | |
requests: | |
cpu: 20m | |
memory: 10Mi | |
serviceAccountName: kube-dns-autoscaler | |
tolerations: | |
- key: CriticalAddonsOnly | |
operator: Exists | |
--- | |
apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: kube-dns | |
strategy: | |
rollingUpdate: | |
maxSurge: 10% | |
maxUnavailable: 0 | |
template: | |
metadata: | |
annotations: | |
prometheus.io/port: "10055" | |
prometheus.io/scrape: "true" | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
labels: | |
k8s-app: kube-dns | |
spec: | |
affinity: | |
podAntiAffinity: | |
preferredDuringSchedulingIgnoredDuringExecution: | |
- podAffinityTerm: | |
labelSelector: | |
matchExpressions: | |
- key: k8s-app | |
operator: In | |
values: | |
- kube-dns | |
topologyKey: kubernetes.io/hostname | |
weight: 1 | |
containers: | |
- args: | |
- --config-dir=/kube-dns-config | |
- --dns-port=10053 | |
- --domain=cluster.local. | |
- --v=2 | |
env: | |
- name: PROMETHEUS_PORT | |
value: "10055" | |
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthcheck/kubedns | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: kubedns | |
ports: | |
- containerPort: 10053 | |
name: dns-local | |
protocol: UDP | |
- containerPort: 10053 | |
name: dns-tcp-local | |
protocol: TCP | |
- containerPort: 10055 | |
name: metrics | |
protocol: TCP | |
readinessProbe: | |
httpGet: | |
path: /readiness | |
port: 8081 | |
scheme: HTTP | |
initialDelaySeconds: 3 | |
timeoutSeconds: 5 | |
resources: | |
limits: | |
memory: 170Mi | |
requests: | |
cpu: 100m | |
memory: 70Mi | |
volumeMounts: | |
- mountPath: /kube-dns-config | |
name: kube-dns-config | |
- args: | |
- -v=2 | |
- -logtostderr | |
- -configDir=/etc/k8s/dns/dnsmasq-nanny | |
- -restartDnsmasq=true | |
- -- | |
- -k | |
- --cache-size=1000 | |
- --dns-forward-max=150 | |
- --no-negcache | |
- --log-facility=- | |
- --server=/cluster.local/127.0.0.1#10053 | |
- --server=/in-addr.arpa/127.0.0.1#10053 | |
- --server=/in6.arpa/127.0.0.1#10053 | |
- --min-port=1024 | |
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthcheck/dnsmasq | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: dnsmasq | |
ports: | |
- containerPort: 53 | |
name: dns | |
protocol: UDP | |
- containerPort: 53 | |
name: dns-tcp | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 150m | |
memory: 20Mi | |
volumeMounts: | |
- mountPath: /etc/k8s/dns/dnsmasq-nanny | |
name: kube-dns-config | |
- args: | |
- --v=2 | |
- --logtostderr | |
- --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A | |
- --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A | |
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /metrics | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: sidecar | |
ports: | |
- containerPort: 10054 | |
name: metrics | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 10m | |
memory: 20Mi | |
dnsPolicy: Default | |
serviceAccountName: kube-dns | |
volumes: | |
- configMap: | |
name: kube-dns | |
optional: true | |
name: kube-dns-config | |
--- | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
kubernetes.io/name: KubeDNS | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
clusterIP: 100.64.0.10 | |
ports: | |
- name: dns | |
port: 53 | |
protocol: UDP | |
- name: dns-tcp | |
port: 53 | |
protocol: TCP | |
selector: | |
k8s-app: kube-dns | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- extensions | |
- apps | |
resources: | |
- deployments/scale | |
- replicasets/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
verbs: | |
- get | |
- create | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kube-dns-autoscaler | |
subjects: | |
- kind: ServiceAccount | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
--- | |
apiVersion: policy/v1beta1 | |
kind: PodDisruptionBudget | |
metadata: | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
minAvailable: 1 | |
selector: | |
matchLabels: | |
k8s-app: kube-dns | |
I1212 13:18:41.197834 402535 bootstrapchannelbuilder.go:79] hash b4dff071aa340fd71650c96f213fdf4b4f799c71 | |
I1212 13:18:41.199211 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
addonmanager.kubernetes.io/mode: Reconcile | |
k8s-addon: rbac.addons.k8s.io | |
kubernetes.io/cluster-service: "true" | |
name: kubelet-cluster-admin | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:node | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: kubelet | |
I1212 13:18:41.199249 402535 bootstrapchannelbuilder.go:79] hash 5d53ce7b920cd1e8d65d2306d80a041420711914 | |
I1212 13:18:41.200081 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: kops:system:kubelet-api-admin | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:kubelet-api-admin | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: kubelet-api | |
I1212 13:18:41.200123 402535 bootstrapchannelbuilder.go:79] hash e1508d77cb4e527d7a2939babe36dc350dd83745 | |
I1212 13:18:41.206934 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: v1 | |
kind: LimitRange | |
metadata: | |
name: limits | |
namespace: default | |
spec: | |
limits: | |
- defaultRequest: | |
cpu: 100m | |
type: Container | |
I1212 13:18:41.206987 402535 bootstrapchannelbuilder.go:79] hash 2ea50e23f1a5aa41df3724630ac25173738cc90c | |
I1212 13:18:41.207233 402535 template_functions.go:190] watch-ingress=false set on dns-controller | |
I1212 13:18:41.208194 402535 visitor.go:40] float64 value at spec.replicas: 1.000000 | |
I1212 13:18:41.208252 402535 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0" | |
I1212 13:18:41.208293 402535 visitor.go:35] string value at spec.template.spec.hostNetwork: true | |
I1212 13:18:41.210328 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
name: dns-controller | |
namespace: kube-system | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
k8s-app: dns-controller | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key": "dedicated", "value": | |
"master"}]' | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
spec: | |
containers: | |
- command: | |
- /usr/bin/dns-controller | |
- --watch-ingress=false | |
- --dns=aws-route53 | |
- --zone=*/Z237FHI0B4E3ZX | |
- --zone=*/* | |
- -v=2 | |
image: kope/dns-controller:1.15.0 | |
name: dns-controller | |
resources: | |
requests: | |
cpu: 50m | |
memory: 50Mi | |
dnsPolicy: Default | |
hostNetwork: true | |
nodeSelector: | |
kubernetes.io/role: master | |
I1212 13:18:41.210367 402535 bootstrapchannelbuilder.go:79] hash 41097765274e5bd95292ae88bd6e26268c5e8c59 | |
I1212 13:18:41.210823 402535 template_functions.go:190] watch-ingress=false set on dns-controller | |
I1212 13:18:41.212662 402535 visitor.go:40] float64 value at spec.replicas: 1.000000 | |
I1212 13:18:41.212718 402535 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0" | |
I1212 13:18:41.212752 402535 visitor.go:35] string value at spec.template.spec.hostNetwork: true | |
I1212 13:18:41.214782 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
name: dns-controller | |
namespace: kube-system | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
k8s-app: dns-controller | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key": "dedicated", "value": | |
"master"}]' | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
spec: | |
containers: | |
- command: | |
- /usr/bin/dns-controller | |
- --watch-ingress=false | |
- --dns=aws-route53 | |
- --zone=*/Z237FHI0B4E3ZX | |
- --zone=*/* | |
- -v=2 | |
image: kope/dns-controller:1.15.0 | |
name: dns-controller | |
resources: | |
requests: | |
cpu: 50m | |
memory: 50Mi | |
dnsPolicy: Default | |
hostNetwork: true | |
nodeSelector: | |
node-role.kubernetes.io/master: "" | |
serviceAccount: dns-controller | |
tolerations: | |
- effect: NoSchedule | |
key: node-role.kubernetes.io/master | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: dns-controller | |
namespace: kube-system | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
- pods | |
- ingress | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- ingresses | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kops:dns-controller | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:serviceaccount:kube-system:dns-controller | |
I1212 13:18:41.214827 402535 bootstrapchannelbuilder.go:79] hash 079663bb21f764bd016174115a00ad1e4d92e07d | |
I1212 13:18:41.216696 402535 template_functions.go:190] watch-ingress=false set on dns-controller | |
I1212 13:18:41.217944 402535 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0" | |
I1212 13:18:41.217974 402535 visitor.go:35] string value at spec.template.spec.hostNetwork: true | |
I1212 13:18:41.217984 402535 visitor.go:40] float64 value at spec.replicas: 1.000000 | |
I1212 13:18:41.219310 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
name: dns-controller | |
namespace: kube-system | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
k8s-app: dns-controller | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
spec: | |
containers: | |
- command: | |
- /usr/bin/dns-controller | |
- --watch-ingress=false | |
- --dns=aws-route53 | |
- --zone=*/Z237FHI0B4E3ZX | |
- --zone=*/* | |
- -v=2 | |
image: kope/dns-controller:1.15.0 | |
name: dns-controller | |
resources: | |
requests: | |
cpu: 50m | |
memory: 50Mi | |
dnsPolicy: Default | |
hostNetwork: true | |
nodeSelector: | |
node-role.kubernetes.io/master: "" | |
serviceAccount: dns-controller | |
tolerations: | |
- effect: NoSchedule | |
key: node-role.kubernetes.io/master | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: dns-controller | |
namespace: kube-system | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
- pods | |
- ingress | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- ingresses | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kops:dns-controller | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:serviceaccount:kube-system:dns-controller | |
I1212 13:18:41.219341 402535 bootstrapchannelbuilder.go:79] hash 767f8242c35ba32b19b13234cedf26ac5f554dab | |
I1212 13:18:41.220625 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: default | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
--- | |
apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
annotations: | |
storageclass.beta.kubernetes.io/is-default-class: "true" | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: gp2 | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: system:aws-cloud-provider | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- list | |
- patch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: system:aws-cloud-provider | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:aws-cloud-provider | |
subjects: | |
- kind: ServiceAccount | |
name: aws-cloud-provider | |
namespace: kube-system | |
I1212 13:18:41.220664 402535 bootstrapchannelbuilder.go:79] hash 23459f7be52d7c818dc060a8bcf5e3565bd87a7b | |
I1212 13:18:41.221143 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: default | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
--- | |
apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
annotations: | |
storageclass.beta.kubernetes.io/is-default-class: "true" | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: gp2 | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
I1212 13:18:41.221163 402535 bootstrapchannelbuilder.go:79] hash 62705a596142e6cc283280e8aa973e51536994c5 | |
I1212 13:18:41.221610 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1beta1 | |
kind: StorageClass | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: default | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
--- | |
apiVersion: storage.k8s.io/v1beta1 | |
kind: StorageClass | |
metadata: | |
annotations: | |
storageclass.beta.kubernetes.io/is-default-class: "true" | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: gp2 | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
I1212 13:18:41.221630 402535 bootstrapchannelbuilder.go:79] hash 7de4b2eb0521d669172038759c521418711d8266 | |
I1212 13:18:41.222812 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222832 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222838 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222844 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222850 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222858 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222867 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222872 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222878 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222884 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222890 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222902 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.222911 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.222920 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.222927 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.222934 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.222939 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.222944 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.222950 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.222955 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.222961 402535 task.go:103] testing task "Secret" | |
I1212 13:18:41.223007 402535 task.go:103] testing task "MirrorSecrets" | |
I1212 13:18:41.223019 402535 task.go:103] testing task "MirrorKeystore" | |
I1212 13:18:41.230493 402535 build_flags.go:50] ignoring non-field: | |
I1212 13:18:41.230546 402535 build_flags.go:50] ignoring non-field: | |
I1212 13:18:41.230604 402535 proxy.go:30] proxies is == nil, returning empty list | |
I1212 13:18:41.236130 402535 task.go:103] testing task "ManagedFile" | |
I1212 13:18:41.236198 402535 task.go:103] testing task "ManagedFile" | |
I1212 13:18:41.236209 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.236216 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.236222 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.236631 402535 build_flags.go:50] ignoring non-field: | |
I1212 13:18:41.236657 402535 build_flags.go:50] ignoring non-field: | |
I1212 13:18:41.236707 402535 proxy.go:30] proxies is == nil, returning empty list | |
I1212 13:18:41.237633 402535 task.go:103] testing task "ManagedFile" | |
I1212 13:18:41.237681 402535 task.go:103] testing task "ManagedFile" | |
I1212 13:18:41.237690 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.237697 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.237703 402535 task.go:103] testing task "Keypair" | |
I1212 13:18:41.237718 402535 task.go:75] EnsureTask ignoring identical | |
I1212 13:18:41.237741 402535 task.go:103] testing task "EBSVolume" | |
I1212 13:18:41.237766 402535 task.go:103] testing task "EBSVolume" | |
I1212 13:18:41.237780 402535 task.go:103] testing task "DNSZone" | |
I1212 13:18:41.237812 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.237826 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.237840 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.237858 402535 task.go:103] testing task "SecurityGroup" | |
I1212 13:18:41.237875 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.237892 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.237904 402535 task.go:103] testing task "SecurityGroup" | |
I1212 13:18:41.237918 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.237959 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.237972 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.239084 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.239100 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.239107 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.239119 402535 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:41.239157 402535 task.go:103] testing task "SSHKey" | |
I1212 13:18:41.239180 402535 task.go:103] testing task "VPC" | |
I1212 13:18:41.239190 402535 task.go:103] testing task "DHCPOptions" | |
I1212 13:18:41.239199 402535 task.go:103] testing task "VPCDHCPOptionsAssociation" | |
I1212 13:18:41.239212 402535 task.go:103] testing task "InternetGateway" | |
I1212 13:18:41.239234 402535 task.go:103] testing task "RouteTable" | |
I1212 13:18:41.239243 402535 task.go:103] testing task "Route" | |
I1212 13:18:41.239273 402535 network.go:202] applying subnet tags | |
I1212 13:18:41.239289 402535 task.go:103] testing task "Subnet" | |
I1212 13:18:41.239298 402535 task.go:103] testing task "RouteTableAssociation" | |
I1212 13:18:41.240210 402535 task.go:103] testing task "IAMRole" | |
I1212 13:18:41.240254 402535 task.go:103] testing task "IAMRolePolicy" | |
I1212 13:18:41.240264 402535 task.go:103] testing task "IAMInstanceProfile" | |
I1212 13:18:41.240274 402535 task.go:103] testing task "IAMInstanceProfileRole" | |
I1212 13:18:41.240282 402535 task.go:103] testing task "IAMRolePolicy" | |
I1212 13:18:41.240320 402535 task.go:103] testing task "IAMRole" | |
I1212 13:18:41.240328 402535 task.go:103] testing task "IAMRolePolicy" | |
I1212 13:18:41.240339 402535 task.go:103] testing task "IAMInstanceProfile" | |
I1212 13:18:41.240345 402535 task.go:103] testing task "IAMInstanceProfileRole" | |
I1212 13:18:41.240352 402535 task.go:103] testing task "IAMRolePolicy" | |
I1212 13:18:41.240487 402535 task.go:103] testing task "LaunchConfiguration" | |
I1212 13:18:41.240529 402535 task.go:103] testing task "AutoscalingGroup" | |
I1212 13:18:41.240696 402535 task.go:103] testing task "LaunchConfiguration" | |
I1212 13:18:41.240711 402535 task.go:103] testing task "AutoscalingGroup" | |
I1212 13:18:41.244105 402535 topological_sort.go:64] Dependencies: | |
I1212 13:18:41.244128 402535 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12: [] | |
I1212 13:18:41.244135 402535 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6: [] | |
I1212 13:18:41.244141 402535 topological_sort.go:66] Keypair/etcd-clients-ca: [] | |
I1212 13:18:41.244145 402535 topological_sort.go:66] Keypair/etcd-manager-ca-events: [] | |
I1212 13:18:41.244151 402535 topological_sort.go:66] Keypair/apiserver-proxy-client: [Keypair/ca] | |
I1212 13:18:41.244157 402535 topological_sort.go:66] VPC/kops.domain.com: [] | |
I1212 13:18:41.244162 402535 topological_sort.go:66] IAMInstanceProfileRole/masters.kops.domain.com: [IAMInstanceProfile/masters.kops.domain.com IAMRole/masters.kops.domain.com] | |
I1212 13:18:41.244185 402535 topological_sort.go:66] IAMInstanceProfile/masters.kops.domain.com: [] | |
I1212 13:18:41.244191 402535 topological_sort.go:66] MirrorKeystore/mirror-keystore: [Secret/system:monitoring Secret/kubelet Secret/system:controller_manager Secret/admin Secret/kube Secret/kube-proxy Secret/system:scheduler Secret/system:logging Secret/system:dns] | |
I1212 13:18:41.244199 402535 topological_sort.go:66] Keypair/apiserver-aggregator: [Keypair/apiserver-aggregator-ca] | |
I1212 13:18:41.244205 402535 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6: [] | |
I1212 13:18:41.244216 402535 topological_sort.go:66] SecurityGroupRule/master-egress: [SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:41.244221 402535 topological_sort.go:66] Keypair/kubelet: [Keypair/ca] | |
I1212 13:18:41.244227 402535 topological_sort.go:66] LaunchConfiguration/master-us-west-1a.masters.kops.domain.com: [IAMInstanceProfile/masters.kops.domain.com SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:41.244234 402535 topological_sort.go:66] SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2: [] | |
I1212 13:18:41.244240 402535 topological_sort.go:66] kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8: [] | |
I1212 13:18:41.244250 402535 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0: [] | |
I1212 13:18:41.244255 402535 topological_sort.go:66] IAMRolePolicy/masters.kops.domain.com: [IAMRole/masters.kops.domain.com DNSZone/Z237FHI0B4E3ZX] | |
I1212 13:18:41.244261 402535 topological_sort.go:66] RouteTableAssociation/us-west-1a.kops.domain.com: [RouteTable/kops.domain.com Subnet/us-west-1a.kops.domain.com] | |
I1212 13:18:41.244266 402535 topological_sort.go:66] IAMRole/masters.kops.domain.com: [] | |
I1212 13:18:41.244271 402535 topological_sort.go:66] ManagedFile/etcd-cluster-spec-events: [] | |
I1212 13:18:41.244276 402535 topological_sort.go:66] IAMRolePolicy/nodes.kops.domain.com: [IAMRole/nodes.kops.domain.com DNSZone/Z237FHI0B4E3ZX] | |
I1212 13:18:41.244286 402535 topological_sort.go:66] IAMRolePolicy/additional.masters.kops.domain.com: [IAMRole/masters.kops.domain.com] | |
I1212 13:18:41.244291 402535 topological_sort.go:66] kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9: [] | |
I1212 13:18:41.244296 402535 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0: [] | |
I1212 13:18:41.244301 402535 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6: [] | |
I1212 13:18:41.244305 402535 topological_sort.go:66] Secret/kube: [] | |
I1212 13:18:41.244310 402535 topological_sort.go:66] Secret/system:scheduler: [] | |
I1212 13:18:41.244319 402535 topological_sort.go:66] Route/0.0.0.0/0: [RouteTable/kops.domain.com InternetGateway/kops.domain.com] | |
I1212 13:18:41.244325 402535 topological_sort.go:66] Secret/system:logging: [] | |
I1212 13:18:41.244329 402535 topological_sort.go:66] kops.domain.com-addons-limit-range.addons.k8s.io: [] | |
I1212 13:18:41.244334 402535 topological_sort.go:66] ManagedFile/manifests-etcdmanager-main: [] | |
I1212 13:18:41.244342 402535 topological_sort.go:66] EBSVolume/a.etcd-main.kops.domain.com: [] | |
I1212 13:18:41.244348 402535 topological_sort.go:66] InternetGateway/kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:41.244389 402535 topological_sort.go:66] Keypair/apiserver-aggregator-ca: [] | |
I1212 13:18:41.244397 402535 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6: [] | |
I1212 13:18:41.244402 402535 topological_sort.go:66] IAMInstanceProfileRole/nodes.kops.domain.com: [IAMInstanceProfile/nodes.kops.domain.com IAMRole/nodes.kops.domain.com] | |
I1212 13:18:41.244413 402535 topological_sort.go:66] SecurityGroupRule/ssh-external-to-node-0.0.0.0/0: [SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:41.244419 402535 topological_sort.go:66] Keypair/kube-proxy: [Keypair/ca] | |
I1212 13:18:41.244428 402535 topological_sort.go:66] ManagedFile/etcd-cluster-spec-main: [] | |
I1212 13:18:41.244433 402535 topological_sort.go:66] Keypair/kubecfg: [Keypair/ca] | |
I1212 13:18:41.244438 402535 topological_sort.go:66] IAMInstanceProfile/nodes.kops.domain.com: [] | |
I1212 13:18:41.244443 402535 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-1-2379: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:41.244449 402535 topological_sort.go:66] SecurityGroupRule/ssh-external-to-master-0.0.0.0/0: [SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:41.244454 402535 topological_sort.go:66] Secret/kubelet: [] | |
I1212 13:18:41.244463 402535 topological_sort.go:66] SecurityGroupRule/all-master-to-node: [SecurityGroup/nodes.kops.domain.com SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:41.244468 402535 topological_sort.go:66] Keypair/etcd-peers-ca-events: [] | |
I1212 13:18:41.244473 402535 topological_sort.go:66] Keypair/kubelet-api: [Keypair/ca] | |
I1212 13:18:41.244478 402535 topological_sort.go:66] IAMRole/nodes.kops.domain.com: [] | |
I1212 13:18:41.244630 402535 topological_sort.go:66] AutoscalingGroup/master-us-west-1a.masters.kops.domain.com: [LaunchConfiguration/master-us-west-1a.masters.kops.domain.com Subnet/us-west-1a.kops.domain.com] | |
I1212 13:18:41.244645 402535 topological_sort.go:66] Subnet/us-west-1a.kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:41.244650 402535 topological_sort.go:66] SecurityGroupRule/all-node-to-node: [SecurityGroup/nodes.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:41.244656 402535 topological_sort.go:66] SecurityGroupRule/node-egress: [SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:41.244661 402535 topological_sort.go:66] DHCPOptions/kops.domain.com: [] | |
I1212 13:18:41.244666 402535 topological_sort.go:66] IAMRolePolicy/additional.nodes.kops.domain.com: [IAMRole/nodes.kops.domain.com] | |
I1212 13:18:41.244671 402535 topological_sort.go:66] Keypair/kube-controller-manager: [Keypair/ca] | |
I1212 13:18:41.244680 402535 topological_sort.go:66] DNSZone/Z237FHI0B4E3ZX: [] | |
I1212 13:18:41.244685 402535 topological_sort.go:66] SecurityGroupRule/https-external-to-master-0.0.0.0/0: [SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:41.244691 402535 topological_sort.go:66] SecurityGroup/masters.kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:41.244696 402535 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-4003-65535: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:41.244701 402535 topological_sort.go:66] ManagedFile/manifests-etcdmanager-events: [] | |
I1212 13:18:41.244710 402535 topological_sort.go:66] Keypair/etcd-peers-ca-main: [] | |
I1212 13:18:41.244715 402535 topological_sort.go:66] SecurityGroupRule/all-master-to-master: [SecurityGroup/masters.kops.domain.com SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:41.244720 402535 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-2382-4000: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:41.244726 402535 topological_sort.go:66] SecurityGroup/nodes.kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:41.244731 402535 topological_sort.go:66] Keypair/ca: [] | |
I1212 13:18:41.244735 402535 topological_sort.go:66] Keypair/kube-scheduler: [Keypair/ca] | |
I1212 13:18:41.244744 402535 topological_sort.go:66] AutoscalingGroup/nodes.kops.domain.com: [LaunchConfiguration/nodes.kops.domain.com Subnet/us-west-1a.kops.domain.com] | |
I1212 13:18:41.244758 402535 topological_sort.go:66] Secret/system:monitoring: [] | |
I1212 13:18:41.244766 402535 topological_sort.go:66] RouteTable/kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:41.244776 402535 topological_sort.go:66] Secret/system:controller_manager: [] | |
I1212 13:18:41.244785 402535 topological_sort.go:66] MirrorSecrets/mirror-secrets: [Secret/system:monitoring Secret/kubelet Secret/system:controller_manager Secret/admin Secret/kube Secret/kube-proxy Secret/system:scheduler Secret/system:dns Secret/system:logging] | |
I1212 13:18:41.244805 402535 topological_sort.go:66] SecurityGroupRule/node-to-master-udp-1-65535: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:41.244813 402535 topological_sort.go:66] Keypair/etcd-manager-ca-main: [] | |
I1212 13:18:41.244818 402535 topological_sort.go:66] Keypair/kops: [Keypair/ca] | |
I1212 13:18:41.244823 402535 topological_sort.go:66] Secret/admin: [] | |
I1212 13:18:41.244828 402535 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0: [] | |
I1212 13:18:41.244837 402535 topological_sort.go:66] LaunchConfiguration/nodes.kops.domain.com: [IAMInstanceProfile/nodes.kops.domain.com SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:41.244848 402535 topological_sort.go:66] Keypair/master: [Keypair/ca] | |
I1212 13:18:41.244855 402535 topological_sort.go:66] Secret/kube-proxy: [] | |
I1212 13:18:41.244860 402535 topological_sort.go:66] kops.domain.com-addons-core.addons.k8s.io: [] | |
I1212 13:18:41.244864 402535 topological_sort.go:66] kops.domain.com-addons-bootstrap: [] | |
I1212 13:18:41.244874 402535 topological_sort.go:66] Secret/system:dns: [] | |
I1212 13:18:41.244879 402535 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12: [] | |
I1212 13:18:41.244884 402535 topological_sort.go:66] EBSVolume/a.etcd-events.kops.domain.com: [] | |
I1212 13:18:41.244889 402535 topological_sort.go:66] VPCDHCPOptionsAssociation/kops.domain.com: [VPC/kops.domain.com DHCPOptions/kops.domain.com] | |
I1212 13:18:41.245035 402535 executor.go:103] Tasks: 0 done / 86 total; 44 can run | |
I1212 13:18:41.247409 402535 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\": \"dedicated\", \"value\":\n \"master\"}]'\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n node-role.kubernetes.io/master: \"\"\n serviceAccount: dns-controller\n tolerations:\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - extensions\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller"}} | |
I1212 13:18:41.247764 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.248118 402535 executor.go:178] Executing task "Secret/system:scheduler": *fitasks.Secret {"Name":"system:scheduler","Lifecycle":"Sync"} | |
I1212 13:18:41.248205 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler" | |
I1212 13:18:41.248738 402535 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.15.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - patch\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - update\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:aws-cloud-provider\nsubjects:\n- kind: ServiceAccount\n name: aws-cloud-provider\n namespace: kube-system"}} | |
I1212 13:18:41.248876 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:41.249091 402535 executor.go:178] Executing task "Keypair/etcd-peers-ca-events": *fitasks.Keypair {"Name":"etcd-peers-ca-events","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-peers-ca-events","type":"ca","format":"v1alpha2"} | |
I1212 13:18:41.249302 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml" | |
I1212 13:18:41.250924 402535 executor.go:178] Executing task "VPC/kops.domain.com": *awstasks.VPC {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:18:41.251220 402535 request_logger.go:45] AWS request: ec2/DescribeVpcs | |
I1212 13:18:41.252001 402535 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.7.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs"}} | |
I1212 13:18:41.252078 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:41.252282 402535 executor.go:178] Executing task "Secret/system:monitoring": *fitasks.Secret {"Name":"system:monitoring","Lifecycle":"Sync"} | |
I1212 13:18:41.252342 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring" | |
I1212 13:18:41.252543 402535 executor.go:178] Executing task "IAMRole/masters.kops.domain.com": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"} | |
I1212 13:18:41.252854 402535 request_logger.go:45] AWS request: iam/GetRole | |
I1212 13:18:41.253263 402535 executor.go:178] Executing task "Keypair/etcd-peers-ca-main": *fitasks.Keypair {"Name":"etcd-peers-ca-main","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-peers-ca-main","type":"ca","format":"v1alpha2"} | |
I1212 13:18:41.253332 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml" | |
I1212 13:18:41.253665 402535 executor.go:178] Executing task "Keypair/etcd-clients-ca": *fitasks.Keypair {"Name":"etcd-clients-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-clients-ca","type":"ca","format":"v1alpha2"} | |
I1212 13:18:41.253783 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml" | |
I1212 13:18:41.253988 402535 executor.go:178] Executing task "Secret/system:logging": *fitasks.Secret {"Name":"system:logging","Lifecycle":"Sync"} | |
I1212 13:18:41.254035 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging" | |
I1212 13:18:41.255625 402535 executor.go:178] Executing task "Keypair/apiserver-aggregator-ca": *fitasks.Keypair {"Name":"apiserver-aggregator-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","type":"ca","format":"v1alpha2"} | |
I1212 13:18:41.255681 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:18:41.255957 402535 executor.go:178] Executing task "Secret/kube": *fitasks.Secret {"Name":"kube","Lifecycle":"Sync"} | |
I1212 13:18:41.256011 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube" | |
I1212 13:18:41.256231 402535 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.12.yaml","Contents":{"Name":"","Resource":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns-autoscaler\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n prometheus.io/port: \"10055\"\n prometheus.io/scrape: \"true\"\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-app: kube-dns\n spec:\n affinity:\n podAntiAffinity:\n preferredDuringSchedulingIgnoredDuringExecution:\n - podAffinityTerm:\n labelSelector:\n matchExpressions:\n - key: k8s-app\n operator: In\n values:\n - kube-dns\n topologyKey: kubernetes.io/hostname\n weight: 1\n containers:\n - args:\n - --config-dir=/kube-dns-config\n - --dns-port=10053\n - --domain=cluster.local.\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/kubedns\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n volumeMounts:\n - mountPath: /kube-dns-config\n name: kube-dns-config\n - args:\n - -v=2\n - -logtostderr\n - -configDir=/etc/k8s/dns/dnsmasq-nanny\n - -restartDnsmasq=true\n - --\n - -k\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-negcache\n - --log-facility=-\n - --server=/cluster.local/127.0.0.1#10053\n - --server=/in-addr.arpa/127.0.0.1#10053\n - --server=/in6.arpa/127.0.0.1#10053\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/dnsmasq\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 20Mi\n volumeMounts:\n - mountPath: /etc/k8s/dns/dnsmasq-nanny\n name: kube-dns-config\n - args:\n - --v=2\n - --logtostderr\n - --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A\n - --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A\n image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: sidecar\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 10m\n memory: 20Mi\n dnsPolicy: Default\n serviceAccountName: kube-dns\n volumes:\n - configMap:\n name: kube-dns\n optional: true\n name: kube-dns-config\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n - apps\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kube-dns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: policy/v1beta1\nkind: PodDisruptionBudget\nmetadata:\n name: kube-dns\n namespace: kube-system\nspec:\n minAvailable: 1\n selector:\n matchLabels:\n k8s-app: kube-dns"}} | |
I1212 13:18:41.256533 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.256722 402535 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\": \"dedicated\", \"value\":\n \"master\"}]'\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n kubernetes.io/role: master"}} | |
I1212 13:18:41.256818 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.257071 402535 executor.go:178] Executing task "EBSVolume/a.etcd-events.kops.domain.com": *awstasks.EBSVolume {"Name":"a.etcd-events.kops.domain.com","Lifecycle":"Sync","AvailabilityZone":"us-west-1a","Encrypted":false,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/events":"a/a","k8s.io/role/master":"1","kubernetes.io/cluster/kops.domain.com":"owned"},"VolumeIops":null,"VolumeType":"gp2"} | |
I1212 13:18:41.257414 402535 request_logger.go:45] AWS request: ec2/DescribeVolumes | |
I1212 13:18:41.257715 402535 executor.go:178] Executing task "kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8","Lifecycle":"Sync","Location":"addons/rbac.addons.k8s.io/k8s-1.8.yaml","Contents":{"Name":"","Resource":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n addonmanager.kubernetes.io/mode: Reconcile\n k8s-addon: rbac.addons.k8s.io\n kubernetes.io/cluster-service: \"true\"\n name: kubelet-cluster-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:node\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet"}} | |
I1212 13:18:41.257784 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:41.258108 402535 executor.go:178] Executing task "Secret/system:dns": *fitasks.Secret {"Name":"system:dns","Lifecycle":"Sync"} | |
I1212 13:18:41.258168 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns" | |
I1212 13:18:41.258655 402535 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.6.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1beta1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1beta1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs"}} | |
I1212 13:18:41.258734 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:41.259173 402535 executor.go:178] Executing task "IAMInstanceProfile/nodes.kops.domain.com": *awstasks.IAMInstanceProfile {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false} | |
I1212 13:18:41.259363 402535 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1212 13:18:41.261179 402535 executor.go:178] Executing task "Secret/admin": *fitasks.Secret {"Name":"admin","Lifecycle":"Sync"} | |
I1212 13:18:41.261292 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin" | |
I1212 13:18:41.261570 402535 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.12.yaml","Contents":{"Name":"","Resource":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n node-role.kubernetes.io/master: \"\"\n serviceAccount: dns-controller\n tolerations:\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - extensions\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller"}} | |
I1212 13:18:41.261809 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:41.262091 402535 executor.go:178] Executing task "ManagedFile/etcd-cluster-spec-events": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-events","Lifecycle":"Sync","Location":"backups/etcd/events/control/etcd-cluster-spec","Contents":{"Name":"","Resource":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.3.10\"\n}"}} | |
I1212 13:18:41.262151 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events/control/etcd-cluster-spec" | |
I1212 13:18:41.262412 402535 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --mode=linear\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"min\":2}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns\n spec:\n containers:\n - args:\n - --domain=cluster.local.\n - --dns-port=10053\n - --config-map=kube-dns\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/kubedns-amd64:1.9\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz-kubedns\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n - args:\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-resolv\n - --server=127.0.0.1#10053\n - --log-facility=-\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz-dnsmasq\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 10Mi\n - args:\n - --v=2\n - --logtostderr\n image: k8s.gcr.io/dnsmasq-metrics-amd64:1.0\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq-metrics\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n memory: 10Mi\n - args:\n - --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 \u003e/dev/null\n - --url=/healthz-dnsmasq\n - --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1:10053 \u003e/dev/null\n - --url=/healthz-kubedns\n - --port=8080\n - --quiet\n image: k8s.gcr.io/exechealthz-amd64:1.2\n name: healthz\n ports:\n - containerPort: 8080\n protocol: TCP\n resources:\n limits:\n memory: 50Mi\n requests:\n cpu: 10m\n memory: 50Mi\n dnsPolicy: Default\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns"}} | |
I1212 13:18:41.262659 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:41.262902 402535 executor.go:178] Executing task "DHCPOptions/kops.domain.com": *awstasks.DHCPOptions {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"DomainName":"us-west-1.compute.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:18:41.263165 402535 request_logger.go:45] AWS request: ec2/DescribeDhcpOptions | |
I1212 13:18:41.263247 402535 executor.go:178] Executing task "Keypair/ca": *fitasks.Keypair {"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"} | |
I1212 13:18:41.263301 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:18:41.263615 402535 executor.go:178] Executing task "DNSZone/Z237FHI0B4E3ZX": *awstasks.DNSZone {"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null} | |
I1212 13:18:41.263866 402535 request_logger.go:45] AWS request: route53/GetHostedZone | |
I1212 13:18:41.264169 402535 executor.go:178] Executing task "ManagedFile/etcd-cluster-spec-main": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-main","Lifecycle":"Sync","Location":"backups/etcd/main/control/etcd-cluster-spec","Contents":{"Name":"","Resource":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.3.10\"\n}"}} | |
I1212 13:18:41.264246 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main/control/etcd-cluster-spec" | |
I1212 13:18:41.264662 402535 executor.go:178] Executing task "IAMInstanceProfile/masters.kops.domain.com": *awstasks.IAMInstanceProfile {"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false} | |
I1212 13:18:41.264847 402535 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1212 13:18:41.264915 402535 executor.go:178] Executing task "ManagedFile/manifests-etcdmanager-events": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-events","Lifecycle":"Sync","Location":"manifests/etcd/events.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Pod\nmetadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-events\n name: etcd-manager-events\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events\n --client-urls=https://__name__:4002 --cluster-name=etcd-events --containerized=true\n --dns-suffix=.internal.kops.domain.com --etcd-insecure=false --grpc-port=3997\n --insecure=false --peer-urls=https://__name__:2381 --quarantine-client-urls=https://__name__:3995\n --v=6 --volume-name-tag=k8s.io/etcd/events --volume-provider=aws --volume-tag=k8s.io/etcd/events\n --volume-tag=k8s.io/role/master=1 --volume-tag=kubernetes.io/cluster/kops.domain.com=owned\n \u003e /tmp/pipe 2\u003e\u00261\n image: kopeio/etcd-manager:3.0.20190930\n name: etcd-manager\n resources:\n requests:\n cpu: 100m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /etc/hosts\n name: hosts\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /etc/hosts\n type: File\n name: hosts\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-events\n type: DirectoryOrCreate\n name: pki\n - hostPath:\n path: /var/log/etcd-events.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n"}} | |
I1212 13:18:41.265007 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/events.yaml" | |
I1212 13:18:41.265171 402535 executor.go:178] Executing task "ManagedFile/manifests-etcdmanager-main": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-main","Lifecycle":"Sync","Location":"manifests/etcd/main.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Pod\nmetadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-main\n name: etcd-manager-main\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main\n --client-urls=https://__name__:4001 --cluster-name=etcd --containerized=true\n --dns-suffix=.internal.kops.domain.com --etcd-insecure=false --grpc-port=3996\n --insecure=false --peer-urls=https://__name__:2380 --quarantine-client-urls=https://__name__:3994\n --v=6 --volume-name-tag=k8s.io/etcd/main --volume-provider=aws --volume-tag=k8s.io/etcd/main\n --volume-tag=k8s.io/role/master=1 --volume-tag=kubernetes.io/cluster/kops.domain.com=owned\n \u003e /tmp/pipe 2\u003e\u00261\n image: kopeio/etcd-manager:3.0.20190930\n name: etcd-manager\n resources:\n requests:\n cpu: 200m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /etc/hosts\n name: hosts\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /etc/hosts\n type: File\n name: hosts\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-main\n type: DirectoryOrCreate\n name: pki\n - hostPath:\n path: /var/log/etcd.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n"}} | |
I1212 13:18:41.265301 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/main.yaml" | |
I1212 13:18:41.265478 402535 executor.go:178] Executing task "Secret/kubelet": *fitasks.Secret {"Name":"kubelet","Lifecycle":"Sync"} | |
I1212 13:18:41.265592 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet" | |
I1212 13:18:41.265790 402535 executor.go:178] Executing task "Secret/system:controller_manager": *fitasks.Secret {"Name":"system:controller_manager","Lifecycle":"Sync"} | |
I1212 13:18:41.265830 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager" | |
I1212 13:18:41.266008 402535 executor.go:178] Executing task "SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2": *awstasks.SSHKey {"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":null} | |
I1212 13:18:41.266205 402535 sshkey.go:109] Computed SSH key fingerprint as "7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45" | |
I1212 13:18:41.266315 402535 request_logger.go:45] AWS request: ec2/DescribeKeyPairs | |
I1212 13:18:41.266384 402535 executor.go:178] Executing task "EBSVolume/a.etcd-main.kops.domain.com": *awstasks.EBSVolume {"Name":"a.etcd-main.kops.domain.com","Lifecycle":"Sync","AvailabilityZone":"us-west-1a","Encrypted":false,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/main":"a/a","k8s.io/role/master":"1","kubernetes.io/cluster/kops.domain.com":"owned"},"VolumeIops":null,"VolumeType":"gp2"} | |
I1212 13:18:41.266547 402535 request_logger.go:45] AWS request: ec2/DescribeVolumes | |
I1212 13:18:41.266661 402535 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":"{}\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n prometheus.io/port: \"10055\"\n prometheus.io/scrape: \"true\"\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns\n spec:\n containers:\n - args:\n - --config-dir=/kube-dns-config\n - --dns-port=10053\n - --domain=cluster.local.\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/kubedns\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n volumeMounts:\n - mountPath: /kube-dns-config\n name: kube-dns-config\n - args:\n - -v=2\n - -logtostderr\n - -configDir=/etc/k8s/dns/dnsmasq-nanny\n - -restartDnsmasq=true\n - --\n - -k\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-negcache\n - --log-facility=-\n - --server=/cluster.local/127.0.0.1#10053\n - --server=/in-addr.arpa/127.0.0.1#10053\n - --server=/in6.arpa/127.0.0.1#10053\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/dnsmasq\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 20Mi\n volumeMounts:\n - mountPath: /etc/k8s/dns/dnsmasq-nanny\n name: kube-dns-config\n - args:\n - --v=2\n - --logtostderr\n - --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A\n - --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A\n image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: sidecar\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 10m\n memory: 20Mi\n dnsPolicy: Default\n serviceAccountName: kube-dns\n volumes:\n - configMap:\n name: kube-dns\n optional: true\n name: kube-dns-config\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kube-dns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system"}} | |
I1212 13:18:41.266861 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:41.267063 402535 executor.go:178] Executing task "Keypair/etcd-manager-ca-events": *fitasks.Keypair {"Name":"etcd-manager-ca-events","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-manager-ca-events","type":"ca","format":"v1alpha2"} | |
I1212 13:18:41.267121 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml" | |
I1212 13:18:41.267382 402535 executor.go:178] Executing task "Keypair/etcd-manager-ca-main": *fitasks.Keypair {"Name":"etcd-manager-ca-main","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-manager-ca-main","type":"ca","format":"v1alpha2"} | |
I1212 13:18:41.267432 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml" | |
I1212 13:18:41.267631 402535 executor.go:178] Executing task "kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9","Lifecycle":"Sync","Location":"addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml","Contents":{"Name":"","Resource":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: kops:system:kubelet-api-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:kubelet-api-admin\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet-api"}} | |
I1212 13:18:41.267743 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:41.267897 402535 executor.go:178] Executing task "Secret/kube-proxy": *fitasks.Secret {"Name":"kube-proxy","Lifecycle":"Sync"} | |
I1212 13:18:41.267933 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy" | |
I1212 13:18:41.268107 402535 executor.go:178] Executing task "kops.domain.com-addons-core.addons.k8s.io": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-core.addons.k8s.io","Lifecycle":"Sync","Location":"addons/core.addons.k8s.io/v1.4.0.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Namespace\nmetadata:\n name: kube-system"}} | |
I1212 13:18:41.268158 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:41.268299 402535 executor.go:178] Executing task "IAMRole/nodes.kops.domain.com": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"} | |
I1212 13:18:41.268395 402535 request_logger.go:45] AWS request: iam/GetRole | |
I1212 13:18:41.268449 402535 executor.go:178] Executing task "kops.domain.com-addons-bootstrap": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-bootstrap","Lifecycle":"Sync","Location":"addons/bootstrap-channel.yaml","Contents":{"Name":"","Resource":"kind: Addons\nmetadata:\n creationTimestamp: null\n name: bootstrap\nspec:\n addons:\n - manifest: core.addons.k8s.io/v1.4.0.yaml\n manifestHash: 3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90\n name: core.addons.k8s.io\n selector:\n k8s-addon: core.addons.k8s.io\n version: 1.4.0\n - id: pre-k8s-1.6\n kubernetesVersion: \u003c1.6.0\n manifest: kube-dns.addons.k8s.io/pre-k8s-1.6.yaml\n manifestHash: 895c961cb9365cbedb22edd20a7648182ae7ed3f\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.6\n kubernetesVersion: '\u003e=1.6.0 \u003c1.12.0'\n manifest: kube-dns.addons.k8s.io/k8s-1.6.yaml\n manifestHash: 191685ca6fe009302e55512b0eefc5a676433f10\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.12\n kubernetesVersion: '\u003e=1.12.0'\n manifest: kube-dns.addons.k8s.io/k8s-1.12.yaml\n manifestHash: b4dff071aa340fd71650c96f213fdf4b4f799c71\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.8\n kubernetesVersion: '\u003e=1.8.0'\n manifest: rbac.addons.k8s.io/k8s-1.8.yaml\n manifestHash: 5d53ce7b920cd1e8d65d2306d80a041420711914\n name: rbac.addons.k8s.io\n selector:\n k8s-addon: rbac.addons.k8s.io\n version: 1.8.0\n - id: k8s-1.9\n kubernetesVersion: '\u003e=1.9.0'\n manifest: kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml\n manifestHash: e1508d77cb4e527d7a2939babe36dc350dd83745\n name: kubelet-api.rbac.addons.k8s.io\n selector:\n k8s-addon: kubelet-api.rbac.addons.k8s.io\n version: v0.0.1\n - manifest: limit-range.addons.k8s.io/v1.5.0.yaml\n manifestHash: 2ea50e23f1a5aa41df3724630ac25173738cc90c\n name: limit-range.addons.k8s.io\n selector:\n k8s-addon: limit-range.addons.k8s.io\n version: 1.5.0\n - id: pre-k8s-1.6\n kubernetesVersion: \u003c1.6.0\n manifest: dns-controller.addons.k8s.io/pre-k8s-1.6.yaml\n manifestHash: 41097765274e5bd95292ae88bd6e26268c5e8c59\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: k8s-1.6\n kubernetesVersion: '\u003e=1.6.0 \u003c1.12.0'\n manifest: dns-controller.addons.k8s.io/k8s-1.6.yaml\n manifestHash: 079663bb21f764bd016174115a00ad1e4d92e07d\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: k8s-1.12\n kubernetesVersion: '\u003e=1.12.0'\n manifest: dns-controller.addons.k8s.io/k8s-1.12.yaml\n manifestHash: 767f8242c35ba32b19b13234cedf26ac5f554dab\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: v1.15.0\n kubernetesVersion: '\u003e=1.15.0'\n manifest: storage-aws.addons.k8s.io/v1.15.0.yaml\n manifestHash: 23459f7be52d7c818dc060a8bcf5e3565bd87a7b\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n - id: v1.7.0\n kubernetesVersion: '\u003e=1.7.0 \u003c1.15.0'\n manifest: storage-aws.addons.k8s.io/v1.7.0.yaml\n manifestHash: 62705a596142e6cc283280e8aa973e51536994c5\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n - id: v1.6.0\n kubernetesVersion: \u003c1.7.0\n manifest: storage-aws.addons.k8s.io/v1.6.0.yaml\n manifestHash: 7de4b2eb0521d669172038759c521418711d8266\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n"}} | |
I1212 13:18:41.268596 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/bootstrap-channel.yaml" | |
I1212 13:18:41.268802 402535 executor.go:178] Executing task "kops.domain.com-addons-limit-range.addons.k8s.io": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-limit-range.addons.k8s.io","Lifecycle":"Sync","Location":"addons/limit-range.addons.k8s.io/v1.5.0.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: LimitRange\nmetadata:\n name: limits\n namespace: default\nspec:\n limits:\n - defaultRequest:\n cpu: 100m\n type: Container"}} | |
I1212 13:18:41.268874 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:41.590146 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.590199 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-events/" | |
I1212 13:18:41.629481 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.629621 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-main/" | |
I1212 13:18:41.631587 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.631777 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-events/" | |
I1212 13:18:41.632564 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.632598 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/" | |
I1212 13:18:41.646326 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.646402 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-clients-ca/" | |
I1212 13:18:41.650696 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.650756 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-main/" | |
I1212 13:18:41.651807 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.651840 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator-ca/" | |
I1212 13:18:41.681886 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events: [] | |
I1212 13:18:41.681964 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml" | |
I1212 13:18:41.723718 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: [] | |
I1212 13:18:41.723802 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:18:41.724766 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events: [] | |
I1212 13:18:41.724823 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml" | |
I1212 13:18:41.738527 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca: [] | |
I1212 13:18:41.738716 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml" | |
I1212 13:18:41.740448 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main: [] | |
I1212 13:18:41.740482 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml" | |
I1212 13:18:41.741102 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main: [] | |
I1212 13:18:41.741132 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml" | |
I1212 13:18:41.743739 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca: [] | |
I1212 13:18:41.743829 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:18:41.796029 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.796071 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-events/" | |
I1212 13:18:41.823876 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.823961 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-main/" | |
I1212 13:18:41.825006 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.825071 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-clients-ca/" | |
I1212 13:18:41.827491 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.827558 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/" | |
I1212 13:18:41.843391 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.843466 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-main/" | |
I1212 13:18:41.888746 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events: [] | |
I1212 13:18:41.903113 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:41.903199 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator-ca/" | |
I1212 13:18:41.916420 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main: [] | |
I1212 13:18:41.920103 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca: [] | |
I1212 13:18:41.935986 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: [] | |
I1212 13:18:41.954346 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main: [] | |
I1212 13:18:41.997118 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca: [] | |
I1212 13:18:42.086007 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.086067 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-events/" | |
I1212 13:18:42.177418 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events: [] | |
I1212 13:18:42.177653 402535 executor.go:103] Tasks: 44 done / 86 total; 24 can run | |
I1212 13:18:42.177764 402535 executor.go:178] Executing task "IAMInstanceProfileRole/nodes.kops.domain.com": *awstasks.IAMInstanceProfileRole {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","InstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}} | |
I1212 13:18:42.178069 402535 iaminstanceprofilerole.go:45] Role/RoleID not set | |
I1212 13:18:42.178190 402535 executor.go:178] Executing task "RouteTable/kops.domain.com": *awstasks.RouteTable {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}} | |
I1212 13:18:42.178797 402535 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1212 13:18:42.179175 402535 executor.go:178] Executing task "MirrorSecrets/mirror-secrets": *fitasks.MirrorSecrets {"Name":"mirror-secrets","Lifecycle":null,"MirrorPath":{}} | |
I1212 13:18:42.179447 402535 executor.go:178] Executing task "SecurityGroup/masters.kops.domain.com": *awstasks.SecurityGroup {"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:18:42.179952 402535 executor.go:178] Executing task "IAMRolePolicy/additional.nodes.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.nodes.kops.domain.com","Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Name":"","Resource":""}} | |
I1212 13:18:42.180327 402535 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1212 13:18:42.180581 402535 executor.go:178] Executing task "SecurityGroup/nodes.kops.domain.com": *awstasks.SecurityGroup {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:18:42.180881 402535 executor.go:178] Executing task "Keypair/kube-proxy": *fitasks.Keypair {"Name":"kube-proxy","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-proxy","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.181023 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml" | |
I1212 13:18:42.181675 402535 executor.go:178] Executing task "IAMRolePolicy/additional.masters.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.masters.kops.domain.com","Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Name":"","Resource":""}} | |
I1212 13:18:42.181913 402535 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1212 13:18:42.182794 402535 executor.go:178] Executing task "Keypair/kubecfg": *fitasks.Keypair {"Name":"kubecfg","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:masters,cn=kubecfg","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.182883 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml" | |
I1212 13:18:42.183284 402535 executor.go:178] Executing task "Keypair/kube-controller-manager": *fitasks.Keypair {"Name":"kube-controller-manager","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-controller-manager","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.183417 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml" | |
I1212 13:18:42.184178 402535 executor.go:178] Executing task "Subnet/us-west-1a.kops.domain.com": *awstasks.Subnet {"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}} | |
I1212 13:18:42.184772 402535 request_logger.go:45] AWS request: ec2/DescribeSubnets | |
I1212 13:18:42.185042 402535 executor.go:178] Executing task "IAMRolePolicy/nodes.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"kops.domain.com","creationTimestamp":"2019-12-12T13:18:38Z"},"spec":{"channel":"stable","configBase":"s3://kops-domain-com-state-store/kops.domain.com","cloudProvider":"aws","kubernetesVersion":"1.15.5","subnets":[{"name":"us-west-1a","cidr":"172.20.32.0/19","zone":"us-west-1a","type":"Public"}],"masterPublicName":"api.kops.domain.com","masterInternalName":"api.internal.kops.domain.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://kops-domain-com-state-store/kops.domain.com/secrets","keyStore":"s3://kops-domain-com-state-store/kops.domain.com/pki","configStore":"s3://kops-domain-com-state-store/kops.domain.com","dnsZone":"Z237FHI0B4E3ZX","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"100m"}],"docker":{"ipMasq":false,"ipTables":false,"logDriver":"json-file","logLevel":"warn","logOpt":["max-size=10m","max-file=5"],"storage":"overlay2,overlay,aufs","version":"18.06.3"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.15.5","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"bindAddress":"0.0.0.0","insecureBindAddress":"127.0.0.1","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.15.5","cloudProvider":"aws","clusterName":"kops.domain.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.15.5","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.15.5","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-west-1","ResourceARN":null,"Role":"Node"},"DNSZone":{"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":"kops.domain.com","ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}}} | |
I1212 13:18:42.185757 402535 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1212 13:18:42.186111 402535 executor.go:178] Executing task "Keypair/master": *fitasks.Keypair {"Name":"master","alternateNames":["kubernetes","kubernetes.default","kubernetes.default.svc","kubernetes.default.svc.cluster.local","api.kops.domain.com","api.internal.kops.domain.com","100.64.0.1","127.0.0.1"],"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=kubernetes-master","type":"server","format":"v1alpha2"} | |
I1212 13:18:42.186223 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml" | |
I1212 13:18:42.186665 402535 executor.go:178] Executing task "Keypair/apiserver-proxy-client": *fitasks.Keypair {"Name":"apiserver-proxy-client","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=apiserver-proxy-client","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.186810 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml" | |
I1212 13:18:42.187216 402535 executor.go:178] Executing task "IAMInstanceProfileRole/masters.kops.domain.com": *awstasks.IAMInstanceProfileRole {"Name":"masters.kops.domain.com","Lifecycle":"Sync","InstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}} | |
I1212 13:18:42.187274 402535 iaminstanceprofilerole.go:45] Role/RoleID not set | |
I1212 13:18:42.187329 402535 executor.go:178] Executing task "InternetGateway/kops.domain.com": *awstasks.InternetGateway {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:18:42.187783 402535 request_logger.go:45] AWS request: ec2/DescribeInternetGateways | |
I1212 13:18:42.188201 402535 executor.go:178] Executing task "MirrorKeystore/mirror-keystore": *fitasks.MirrorKeystore {"Name":"mirror-keystore","Lifecycle":null,"MirrorPath":{}} | |
I1212 13:18:42.188375 402535 executor.go:178] Executing task "VPCDHCPOptionsAssociation/kops.domain.com": *awstasks.VPCDHCPOptionsAssociation {"Name":"kops.domain.com","Lifecycle":"Sync","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"DHCPOptions":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"DomainName":"us-west-1.compute.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}} | |
I1212 13:18:42.188659 402535 executor.go:178] Executing task "IAMRolePolicy/masters.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"kops.domain.com","creationTimestamp":"2019-12-12T13:18:38Z"},"spec":{"channel":"stable","configBase":"s3://kops-domain-com-state-store/kops.domain.com","cloudProvider":"aws","kubernetesVersion":"1.15.5","subnets":[{"name":"us-west-1a","cidr":"172.20.32.0/19","zone":"us-west-1a","type":"Public"}],"masterPublicName":"api.kops.domain.com","masterInternalName":"api.internal.kops.domain.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://kops-domain-com-state-store/kops.domain.com/secrets","keyStore":"s3://kops-domain-com-state-store/kops.domain.com/pki","configStore":"s3://kops-domain-com-state-store/kops.domain.com","dnsZone":"Z237FHI0B4E3ZX","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"100m"}],"docker":{"ipMasq":false,"ipTables":false,"logDriver":"json-file","logLevel":"warn","logOpt":["max-size=10m","max-file=5"],"storage":"overlay2,overlay,aufs","version":"18.06.3"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.15.5","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"bindAddress":"0.0.0.0","insecureBindAddress":"127.0.0.1","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.15.5","cloudProvider":"aws","clusterName":"kops.domain.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.15.5","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.15.5","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-west-1","ResourceARN":null,"Role":"Master"},"DNSZone":{"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":"kops.domain.com","ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}}} | |
I1212 13:18:42.189160 402535 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1212 13:18:42.189322 402535 executor.go:178] Executing task "Keypair/kubelet": *fitasks.Keypair {"Name":"kubelet","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:nodes,cn=kubelet","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.189405 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml" | |
I1212 13:18:42.189789 402535 executor.go:178] Executing task "Keypair/kube-scheduler": *fitasks.Keypair {"Name":"kube-scheduler","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-scheduler","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.189910 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml" | |
I1212 13:18:42.190428 402535 executor.go:178] Executing task "Keypair/apiserver-aggregator": *fitasks.Keypair {"Name":"apiserver-aggregator","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"apiserver-aggregator-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","type":"ca","format":"v1alpha2"},"subject":"cn=aggregator","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.190555 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml" | |
I1212 13:18:42.190966 402535 executor.go:178] Executing task "Keypair/kops": *fitasks.Keypair {"Name":"kops","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:masters,cn=kops","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.191049 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml" | |
I1212 13:18:42.191549 402535 executor.go:178] Executing task "Keypair/kubelet-api": *fitasks.Keypair {"Name":"kubelet-api","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=kubelet-api","type":"client","format":"v1alpha2"} | |
I1212 13:18:42.191656 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml" | |
I1212 13:18:42.271457 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.271550 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-proxy/" | |
I1212 13:18:42.283105 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.283146 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubecfg/" | |
I1212 13:18:42.356122 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.356216 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-controller-manager/" | |
I1212 13:18:42.381998 402535 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:18:42.382045 402535 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:18:42.382199 402535 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:18:42.384565 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.384622 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/master/" | |
I1212 13:18:42.400048 402535 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1212 13:18:42.410174 402535 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:18:42.410247 402535 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:18:42.410426 402535 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:18:42.443560 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.443642 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-proxy-client/" | |
I1212 13:18:42.485790 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.485896 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet/" | |
I1212 13:18:42.523934 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.524005 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-scheduler/" | |
I1212 13:18:42.526613 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.526683 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kops/" | |
I1212 13:18:42.530160 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.530203 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator/" | |
I1212 13:18:42.538799 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy: [] | |
I1212 13:18:42.538840 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml" | |
I1212 13:18:42.542408 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.542481 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet-api/" | |
I1212 13:18:42.543544 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager: [] | |
I1212 13:18:42.543569 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml" | |
I1212 13:18:42.550839 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client: [] | |
I1212 13:18:42.550904 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml" | |
I1212 13:18:42.556358 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg: [] | |
I1212 13:18:42.556424 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml" | |
I1212 13:18:42.561850 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master: [] | |
I1212 13:18:42.561898 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml" | |
I1212 13:18:42.593539 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet: [] | |
I1212 13:18:42.593633 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml" | |
I1212 13:18:42.616561 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler: [] | |
I1212 13:18:42.616647 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml" | |
I1212 13:18:42.617299 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops: [] | |
I1212 13:18:42.617320 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml" | |
I1212 13:18:42.620117 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator: [] | |
I1212 13:18:42.620152 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml" | |
I1212 13:18:42.622028 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.622080 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-proxy/" | |
I1212 13:18:42.628909 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.629011 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-controller-manager/" | |
I1212 13:18:42.633077 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.633101 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-proxy-client/" | |
I1212 13:18:42.646912 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.647016 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubecfg/" | |
I1212 13:18:42.652743 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.652846 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/master/" | |
I1212 13:18:42.686632 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api: [] | |
I1212 13:18:42.686674 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml" | |
I1212 13:18:42.696742 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.696820 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet/" | |
I1212 13:18:42.701628 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.701702 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kops/" | |
I1212 13:18:42.705786 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.705831 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-scheduler/" | |
I1212 13:18:42.706803 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.706835 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator/" | |
I1212 13:18:42.722781 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy: [] | |
I1212 13:18:42.723338 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client: [] | |
I1212 13:18:42.746076 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/master: [] | |
I1212 13:18:42.757246 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager: [] | |
I1212 13:18:42.767918 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg: [] | |
I1212 13:18:42.770163 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml", falling back to directory-list method | |
I1212 13:18:42.770188 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet-api/" | |
I1212 13:18:42.792781 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops: [] | |
I1212 13:18:42.793645 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet: [] | |
I1212 13:18:42.796882 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler: [] | |
I1212 13:18:42.797873 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator: [] | |
I1212 13:18:42.902118 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api: [] | |
I1212 13:18:42.902292 402535 executor.go:103] Tasks: 68 done / 86 total; 16 can run | |
I1212 13:18:42.902373 402535 executor.go:178] Executing task "SecurityGroupRule/all-master-to-master": *awstasks.SecurityGroupRule {"Name":"all-master-to-master","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:18:42.902899 402535 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-2382-4000": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-2382-4000","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":2382,"ToPort":4000,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:18:42.903075 402535 executor.go:178] Executing task "SecurityGroupRule/node-to-master-udp-1-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-udp-1-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"udp","FromPort":1,"ToPort":65535,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:18:42.903236 402535 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-1-2379": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-1-2379","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":1,"ToPort":2379,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:18:42.903458 402535 executor.go:178] Executing task "SecurityGroupRule/ssh-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null} | |
I1212 13:18:42.903641 402535 executor.go:178] Executing task "SecurityGroupRule/https-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"https-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":443,"ToPort":443,"SourceGroup":null,"Egress":null} | |
I1212 13:18:42.903762 402535 executor.go:178] Executing task "LaunchConfiguration/nodes.kops.domain.com": *awstasks.LaunchConfiguration {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"t2.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":128,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC1aWKcsCEQV7fEVed7D8+UQKo4gmM8EKWmFirX1iPSO3eX5cQzHhVyQ/hK4rYPLqOybB3OTUNLFjjeSlvsS+yj1+5DrNjqdX5XDCqpJTKJZJBALuPzRNgBmCPZ7eRk3sHzgU4cXqJxVlX135yQIK+ii6oGCKD6JWWHUCo3SQKtiIQHyMI8j3XXvanJhHUlbLhO/BKSkNd/3ER24IPdMmKl+3LuvsR3UhDGdB3F3m4l+Y8RWq2bOyffgTfv4zGRJFNPuBD+afICXsd07p8s5xAmZLL3x///uQr9Hmw5zwb6zVnciT+1s0hxn/MK6OWGABNOhqTYBpunxsceirSDzqRHNd3b7dG9DR+Foek/xELVXCJ+wJXEhA9wBMSO38eJTSUXfId66MbfQB5qvMwxTvoOmJA+AW/9CPawmrZgSYxkALNhkbVY9PLCMnDhl7NqLOpHp8OSLY1owsRc/bRH9l8wHpuBVR0qrZ70KP/w4j9WrQ5g+ygf3H5Q+OjA5SO6mhk= user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}} | |
I1212 13:18:42.904376 402535 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1212 13:18:42.905029 402535 executor.go:178] Executing task "RouteTableAssociation/us-west-1a.kops.domain.com": *awstasks.RouteTableAssociation {"Name":"us-west-1a.kops.domain.com","Lifecycle":"Sync","ID":null,"RouteTable":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}},"Subnet":{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}} | |
I1212 13:18:42.905319 402535 executor.go:178] Executing task "SecurityGroupRule/all-master-to-node": *awstasks.SecurityGroupRule {"Name":"all-master-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:18:42.905556 402535 executor.go:178] Executing task "SecurityGroupRule/node-egress": *awstasks.SecurityGroupRule {"Name":"node-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true} | |
I1212 13:18:42.905771 402535 executor.go:178] Executing task "Route/0.0.0.0/0": *awstasks.Route {"Name":"0.0.0.0/0","Lifecycle":"Sync","RouteTable":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}},"Instance":null,"CIDR":"0.0.0.0/0","InternetGateway":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"NatGateway":null} | |
I1212 13:18:42.906194 402535 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-4003-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-4003-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":4003,"ToPort":65535,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:18:42.906319 402535 executor.go:178] Executing task "SecurityGroupRule/master-egress": *awstasks.SecurityGroupRule {"Name":"master-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true} | |
I1212 13:18:42.906451 402535 executor.go:178] Executing task "LaunchConfiguration/master-us-west-1a.masters.kops.domain.com": *awstasks.LaunchConfiguration {"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"m3.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":64,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}} | |
I1212 13:18:42.907016 402535 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1212 13:18:42.907152 402535 executor.go:178] Executing task "SecurityGroupRule/ssh-external-to-node-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-node-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null} | |
I1212 13:18:42.907304 402535 executor.go:178] Executing task "SecurityGroupRule/all-node-to-node": *awstasks.SecurityGroupRule {"Name":"all-node-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:18:43.531490 402535 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1212 13:18:43.550702 402535 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1212 13:18:43.717543 402535 executor.go:103] Tasks: 84 done / 86 total; 2 can run | |
I1212 13:18:43.717607 402535 executor.go:178] Executing task "AutoscalingGroup/nodes.kops.domain.com": *awstasks.AutoscalingGroup {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","Granularity":"1Minute","InstanceProtection":null,"LaunchConfiguration":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"t2.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":128,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}},"LaunchTemplate":null,"MaxSize":2,"Metrics":["GroupDesiredCapacity","GroupInServiceInstances","GroupMaxSize","GroupMinSize","GroupPendingInstances","GroupStandbyInstances","GroupTerminatingInstances","GroupTotalInstances"],"MinSize":2,"MixedInstanceOverrides":null,"MixedOnDemandAllocationStrategy":null,"MixedOnDemandBase":null,"MixedOnDemandAboveBase":null,"MixedSpotAllocationStrategy":null,"MixedSpotInstancePools":null,"MixedSpotMaxPrice":null,"Subnets":[{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}],"SuspendProcesses":[],"Tags":{"k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup":"nodes","k8s.io/role/node":"1","kops.k8s.io/instancegroup":"nodes"}} | |
I1212 13:18:43.718164 402535 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups | |
I1212 13:18:43.718363 402535 executor.go:178] Executing task "AutoscalingGroup/master-us-west-1a.masters.kops.domain.com": *awstasks.AutoscalingGroup {"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","Granularity":"1Minute","InstanceProtection":null,"LaunchConfiguration":{"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"m3.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":64,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}},"LaunchTemplate":null,"MaxSize":1,"Metrics":["GroupDesiredCapacity","GroupInServiceInstances","GroupMaxSize","GroupMinSize","GroupPendingInstances","GroupStandbyInstances","GroupTerminatingInstances","GroupTotalInstances"],"MinSize":1,"MixedInstanceOverrides":null,"MixedOnDemandAllocationStrategy":null,"MixedOnDemandBase":null,"MixedOnDemandAboveBase":null,"MixedSpotAllocationStrategy":null,"MixedSpotInstancePools":null,"MixedSpotMaxPrice":null,"Subnets":[{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}],"SuspendProcesses":[],"Tags":{"k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup":"master-us-west-1a","k8s.io/role/master":"1","kops.k8s.io/instancegroup":"master-us-west-1a"}} | |
I1212 13:18:43.718646 402535 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups | |
I1212 13:18:43.933012 402535 executor.go:103] Tasks: 86 done / 86 total; 0 can run | |
I1212 13:18:43.934872 402535 dryrun_target.go:255] ContainerAssets: | |
I1212 13:18:43.934888 402535 dryrun_target.go:257] k8s.gcr.io/kube-apiserver:v1.15.5 | |
I1212 13:18:43.934896 402535 dryrun_target.go:257] k8s.gcr.io/pause-amd64:3.0 | |
I1212 13:18:43.934916 402535 dryrun_target.go:257] k8s.gcr.io/kube-controller-manager:v1.15.5 | |
I1212 13:18:43.934924 402535 dryrun_target.go:257] k8s.gcr.io/kube-scheduler:v1.15.5 | |
I1212 13:18:43.934930 402535 dryrun_target.go:257] k8s.gcr.io/kube-proxy:v1.15.5 | |
I1212 13:18:43.934936 402535 dryrun_target.go:257] k8s.gcr.io/kube-apiserver:v1.15.5 | |
I1212 13:18:43.934942 402535 dryrun_target.go:257] k8s.gcr.io/pause-amd64:3.0 | |
I1212 13:18:43.934949 402535 dryrun_target.go:257] k8s.gcr.io/kube-controller-manager:v1.15.5 | |
I1212 13:18:43.934955 402535 dryrun_target.go:257] k8s.gcr.io/kube-proxy:v1.15.5 | |
I1212 13:18:43.934961 402535 dryrun_target.go:257] k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0 | |
I1212 13:18:43.934967 402535 dryrun_target.go:257] k8s.gcr.io/kubedns-amd64:1.9 | |
I1212 13:18:43.934973 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10 | |
I1212 13:18:43.934979 402535 dryrun_target.go:257] k8s.gcr.io/dnsmasq-metrics-amd64:1.0 | |
I1212 13:18:43.934997 402535 dryrun_target.go:257] k8s.gcr.io/exechealthz-amd64:1.2 | |
I1212 13:18:43.935004 402535 dryrun_target.go:257] k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2 | |
I1212 13:18:43.935011 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10 | |
I1212 13:18:43.935017 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10 | |
I1212 13:18:43.935024 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10 | |
I1212 13:18:43.935030 402535 dryrun_target.go:257] k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0 | |
I1212 13:18:43.935036 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13 | |
I1212 13:18:43.935042 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13 | |
I1212 13:18:43.935048 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13 | |
I1212 13:18:43.935054 402535 dryrun_target.go:257] kope/dns-controller:1.15.0 | |
I1212 13:18:43.935060 402535 dryrun_target.go:257] kope/dns-controller:1.15.0 | |
I1212 13:18:43.935080 402535 dryrun_target.go:257] kope/dns-controller:1.15.0 | |
I1212 13:18:43.935086 402535 dryrun_target.go:257] kopeio/etcd-manager:3.0.20190930 | |
I1212 13:18:43.935092 402535 dryrun_target.go:257] kopeio/etcd-manager:3.0.20190930 | |
I1212 13:18:43.935097 402535 dryrun_target.go:262] FileAssets: | |
I1212 13:18:43.935118 402535 dryrun_target.go:267] https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet | |
I1212 13:18:43.935125 402535 dryrun_target.go:267] https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl | |
I1212 13:18:43.935132 402535 dryrun_target.go:267] https://storage.googleapis.com/kubernetes-release/network-plugins/cni-plugins-amd64-v0.7.5.tgz | |
I1212 13:18:43.935139 402535 dryrun_target.go:267] https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz | |
I1212 13:18:43.935159 402535 dryrun_target.go:267] https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup | |
I1212 13:18:43.935166 402535 dryrun_target.go:267] https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz | |
Will create resources: | |
AutoscalingGroup/master-us-west-1a.masters.kops.domain.com | |
Granularity 1Minute | |
LaunchConfiguration name:master-us-west-1a.masters.kops.domain.com | |
MaxSize 1 | |
Metrics [GroupDesiredCapacity, GroupInServiceInstances, GroupMaxSize, GroupMinSize, GroupPendingInstances, GroupStandbyInstances, GroupTerminatingInstances, GroupTotalInstances] | |
MinSize 1 | |
Subnets [name:us-west-1a.kops.domain.com] | |
SuspendProcesses [] | |
Tags {k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup: master-us-west-1a, k8s.io/role/master: 1, kops.k8s.io/instancegroup: master-us-west-1a, Name: master-us-west-1a.masters.kops.domain.com, KubernetesCluster: kops.domain.com} | |
AutoscalingGroup/nodes.kops.domain.com | |
Granularity 1Minute | |
LaunchConfiguration name:nodes.kops.domain.com | |
MaxSize 2 | |
Metrics [GroupDesiredCapacity, GroupInServiceInstances, GroupMaxSize, GroupMinSize, GroupPendingInstances, GroupStandbyInstances, GroupTerminatingInstances, GroupTotalInstances] | |
MinSize 2 | |
Subnets [name:us-west-1a.kops.domain.com] | |
SuspendProcesses [] | |
Tags {k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup: nodes, k8s.io/role/node: 1, kops.k8s.io/instancegroup: nodes, Name: nodes.kops.domain.com, KubernetesCluster: kops.domain.com} | |
DHCPOptions/kops.domain.com | |
DomainName us-west-1.compute.internal | |
DomainNameServers AmazonProvidedDNS | |
Shared false | |
Tags {Name: kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned} | |
EBSVolume/a.etcd-events.kops.domain.com | |
AvailabilityZone us-west-1a | |
Encrypted false | |
SizeGB 20 | |
Tags {k8s.io/etcd/events: a/a, k8s.io/role/master: 1, kubernetes.io/cluster/kops.domain.com: owned, Name: a.etcd-events.kops.domain.com, KubernetesCluster: kops.domain.com} | |
VolumeType gp2 | |
EBSVolume/a.etcd-main.kops.domain.com | |
AvailabilityZone us-west-1a | |
Encrypted false | |
SizeGB 20 | |
Tags {k8s.io/etcd/main: a/a, k8s.io/role/master: 1, kubernetes.io/cluster/kops.domain.com: owned, Name: a.etcd-main.kops.domain.com, KubernetesCluster: kops.domain.com} | |
VolumeType gp2 | |
IAMInstanceProfile/masters.kops.domain.com | |
Shared false | |
IAMInstanceProfile/nodes.kops.domain.com | |
Shared false | |
IAMInstanceProfileRole/masters.kops.domain.com | |
InstanceProfile name:masters.kops.domain.com id:masters.kops.domain.com | |
Role name:masters.kops.domain.com | |
IAMInstanceProfileRole/nodes.kops.domain.com | |
InstanceProfile name:nodes.kops.domain.com id:nodes.kops.domain.com | |
Role name:nodes.kops.domain.com | |
IAMRole/masters.kops.domain.com | |
ExportWithID masters | |
IAMRole/nodes.kops.domain.com | |
ExportWithID nodes | |
IAMRolePolicy/masters.kops.domain.com | |
Role name:masters.kops.domain.com | |
IAMRolePolicy/nodes.kops.domain.com | |
Role name:nodes.kops.domain.com | |
InternetGateway/kops.domain.com | |
VPC name:kops.domain.com | |
Shared false | |
Tags {Name: kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned} | |
Keypair/apiserver-aggregator | |
Signer name:apiserver-aggregator-ca id:cn=apiserver-aggregator-ca | |
Subject cn=aggregator | |
Type client | |
Format v1alpha2 | |
Keypair/apiserver-aggregator-ca | |
Subject cn=apiserver-aggregator-ca | |
Type ca | |
Format v1alpha2 | |
Keypair/apiserver-proxy-client | |
Signer name:ca id:cn=kubernetes | |
Subject cn=apiserver-proxy-client | |
Type client | |
Format v1alpha2 | |
Keypair/ca | |
Subject cn=kubernetes | |
Type ca | |
Format v1alpha2 | |
Keypair/etcd-clients-ca | |
Subject cn=etcd-clients-ca | |
Type ca | |
Format v1alpha2 | |
Keypair/etcd-manager-ca-events | |
Subject cn=etcd-manager-ca-events | |
Type ca | |
Format v1alpha2 | |
Keypair/etcd-manager-ca-main | |
Subject cn=etcd-manager-ca-main | |
Type ca | |
Format v1alpha2 | |
Keypair/etcd-peers-ca-events | |
Subject cn=etcd-peers-ca-events | |
Type ca | |
Format v1alpha2 | |
Keypair/etcd-peers-ca-main | |
Subject cn=etcd-peers-ca-main | |
Type ca | |
Format v1alpha2 | |
Keypair/kops | |
Signer name:ca id:cn=kubernetes | |
Subject o=system:masters,cn=kops | |
Type client | |
Format v1alpha2 | |
Keypair/kube-controller-manager | |
Signer name:ca id:cn=kubernetes | |
Subject cn=system:kube-controller-manager | |
Type client | |
Format v1alpha2 | |
Keypair/kube-proxy | |
Signer name:ca id:cn=kubernetes | |
Subject cn=system:kube-proxy | |
Type client | |
Format v1alpha2 | |
Keypair/kube-scheduler | |
Signer name:ca id:cn=kubernetes | |
Subject cn=system:kube-scheduler | |
Type client | |
Format v1alpha2 | |
Keypair/kubecfg | |
Signer name:ca id:cn=kubernetes | |
Subject o=system:masters,cn=kubecfg | |
Type client | |
Format v1alpha2 | |
Keypair/kubelet | |
Signer name:ca id:cn=kubernetes | |
Subject o=system:nodes,cn=kubelet | |
Type client | |
Format v1alpha2 | |
Keypair/kubelet-api | |
Signer name:ca id:cn=kubernetes | |
Subject cn=kubelet-api | |
Type client | |
Format v1alpha2 | |
Keypair/master | |
AlternateNames [100.64.0.1, 127.0.0.1, api.kops.domain.com, api.internal.kops.domain.com, kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local] | |
Signer name:ca id:cn=kubernetes | |
Subject cn=kubernetes-master | |
Type server | |
Format v1alpha2 | |
LaunchConfiguration/master-us-west-1a.masters.kops.domain.com | |
AssociatePublicIP true | |
IAMInstanceProfile name:masters.kops.domain.com id:masters.kops.domain.com | |
ImageID kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
InstanceType m3.medium | |
RootVolumeSize 64 | |
RootVolumeType gp2 | |
SSHKey name:kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 id:kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 | |
SecurityGroups [name:masters.kops.domain.com] | |
SpotPrice | |
LaunchConfiguration/nodes.kops.domain.com | |
AssociatePublicIP true | |
IAMInstanceProfile name:nodes.kops.domain.com id:nodes.kops.domain.com | |
ImageID kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
InstanceType t2.medium | |
RootVolumeSize 128 | |
RootVolumeType gp2 | |
SSHKey name:kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 id:kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 | |
SecurityGroups [name:nodes.kops.domain.com] | |
SpotPrice | |
ManagedFile/kops.domain.com-addons-bootstrap | |
Location addons/bootstrap-channel.yaml | |
ManagedFile/kops.domain.com-addons-core.addons.k8s.io | |
Location addons/core.addons.k8s.io/v1.4.0.yaml | |
ManagedFile/kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12 | |
Location addons/dns-controller.addons.k8s.io/k8s-1.12.yaml | |
ManagedFile/kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6 | |
Location addons/dns-controller.addons.k8s.io/k8s-1.6.yaml | |
ManagedFile/kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6 | |
Location addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml | |
ManagedFile/kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12 | |
Location addons/kube-dns.addons.k8s.io/k8s-1.12.yaml | |
ManagedFile/kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6 | |
Location addons/kube-dns.addons.k8s.io/k8s-1.6.yaml | |
ManagedFile/kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6 | |
Location addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml | |
ManagedFile/kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9 | |
Location addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml | |
ManagedFile/kops.domain.com-addons-limit-range.addons.k8s.io | |
Location addons/limit-range.addons.k8s.io/v1.5.0.yaml | |
ManagedFile/kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8 | |
Location addons/rbac.addons.k8s.io/k8s-1.8.yaml | |
ManagedFile/kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0 | |
Location addons/storage-aws.addons.k8s.io/v1.15.0.yaml | |
ManagedFile/kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0 | |
Location addons/storage-aws.addons.k8s.io/v1.6.0.yaml | |
ManagedFile/kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0 | |
Location addons/storage-aws.addons.k8s.io/v1.7.0.yaml | |
ManagedFile/etcd-cluster-spec-events | |
Location backups/etcd/events/control/etcd-cluster-spec | |
ManagedFile/etcd-cluster-spec-main | |
Location backups/etcd/main/control/etcd-cluster-spec | |
ManagedFile/manifests-etcdmanager-events | |
Location manifests/etcd/events.yaml | |
ManagedFile/manifests-etcdmanager-main | |
Location manifests/etcd/main.yaml | |
Route/0.0.0.0/0 | |
RouteTable name:kops.domain.com | |
CIDR 0.0.0.0/0 | |
InternetGateway name:kops.domain.com | |
RouteTable/kops.domain.com | |
VPC name:kops.domain.com | |
Shared false | |
Tags {Name: kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned, kubernetes.io/kops/role: public} | |
RouteTableAssociation/us-west-1a.kops.domain.com | |
RouteTable name:kops.domain.com | |
Subnet name:us-west-1a.kops.domain.com | |
SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 | |
KeyFingerprint 7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45 | |
Secret/admin | |
Secret/kube | |
Secret/kube-proxy | |
Secret/kubelet | |
Secret/system:controller_manager | |
Secret/system:dns | |
Secret/system:logging | |
Secret/system:monitoring | |
Secret/system:scheduler | |
SecurityGroup/masters.kops.domain.com | |
Description Security group for masters | |
VPC name:kops.domain.com | |
RemoveExtraRules [port=22, port=443, port=2380, port=2381, port=4001, port=4002, port=4789, port=179] | |
Tags {kubernetes.io/cluster/kops.domain.com: owned, Name: masters.kops.domain.com, KubernetesCluster: kops.domain.com} | |
SecurityGroup/nodes.kops.domain.com | |
Description Security group for nodes | |
VPC name:kops.domain.com | |
RemoveExtraRules [port=22] | |
Tags {Name: nodes.kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned} | |
SecurityGroupRule/all-master-to-master | |
SecurityGroup name:masters.kops.domain.com | |
SourceGroup name:masters.kops.domain.com | |
SecurityGroupRule/all-master-to-node | |
SecurityGroup name:nodes.kops.domain.com | |
SourceGroup name:masters.kops.domain.com | |
SecurityGroupRule/all-node-to-node | |
SecurityGroup name:nodes.kops.domain.com | |
SourceGroup name:nodes.kops.domain.com | |
SecurityGroupRule/https-external-to-master-0.0.0.0/0 | |
SecurityGroup name:masters.kops.domain.com | |
CIDR 0.0.0.0/0 | |
Protocol tcp | |
FromPort 443 | |
ToPort 443 | |
SecurityGroupRule/master-egress | |
SecurityGroup name:masters.kops.domain.com | |
CIDR 0.0.0.0/0 | |
Egress true | |
SecurityGroupRule/node-egress | |
SecurityGroup name:nodes.kops.domain.com | |
CIDR 0.0.0.0/0 | |
Egress true | |
SecurityGroupRule/node-to-master-tcp-1-2379 | |
SecurityGroup name:masters.kops.domain.com | |
Protocol tcp | |
FromPort 1 | |
ToPort 2379 | |
SourceGroup name:nodes.kops.domain.com | |
SecurityGroupRule/node-to-master-tcp-2382-4000 | |
SecurityGroup name:masters.kops.domain.com | |
Protocol tcp | |
FromPort 2382 | |
ToPort 4000 | |
SourceGroup name:nodes.kops.domain.com | |
SecurityGroupRule/node-to-master-tcp-4003-65535 | |
SecurityGroup name:masters.kops.domain.com | |
Protocol tcp | |
FromPort 4003 | |
ToPort 65535 | |
SourceGroup name:nodes.kops.domain.com | |
SecurityGroupRule/node-to-master-udp-1-65535 | |
SecurityGroup name:masters.kops.domain.com | |
Protocol udp | |
FromPort 1 | |
ToPort 65535 | |
SourceGroup name:nodes.kops.domain.com | |
SecurityGroupRule/ssh-external-to-master-0.0.0.0/0 | |
SecurityGroup name:masters.kops.domain.com | |
CIDR 0.0.0.0/0 | |
Protocol tcp | |
FromPort 22 | |
ToPort 22 | |
SecurityGroupRule/ssh-external-to-node-0.0.0.0/0 | |
SecurityGroup name:nodes.kops.domain.com | |
CIDR 0.0.0.0/0 | |
Protocol tcp | |
FromPort 22 | |
ToPort 22 | |
Subnet/us-west-1a.kops.domain.com | |
ShortName us-west-1a | |
VPC name:kops.domain.com | |
AvailabilityZone us-west-1a | |
CIDR 172.20.32.0/19 | |
Shared false | |
Tags {Name: us-west-1a.kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned, SubnetType: Public, kubernetes.io/role/elb: 1} | |
VPC/kops.domain.com | |
CIDR 172.20.0.0/16 | |
EnableDNSHostnames true | |
EnableDNSSupport true | |
Shared false | |
Tags {KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned, Name: kops.domain.com} | |
VPCDHCPOptionsAssociation/kops.domain.com | |
VPC name:kops.domain.com | |
DHCPOptions name:kops.domain.com | |
I1212 13:18:43.935186 402535 context.go:91] deleting temp dir: "/tmp/deploy342416001" | |
Must specify --yes to apply changes | |
Cluster configuration has been created. | |
Suggestions: | |
* list clusters with: kops get cluster | |
* edit this cluster with: kops edit cluster kops.domain.com | |
* edit your node instance group: kops edit ig --name=kops.domain.com nodes | |
* edit your master instance group: kops edit ig --name=kops.domain.com master-us-west-1a | |
Finally configure your cluster with: kops update cluster --name kops.domain.com --yes | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
I1212 13:18:53.203105 402540 factory.go:68] state store s3://kops-domain-com-state-store | |
I1212 13:18:53.203226 402540 s3context.go:325] unable to read /sys/devices/virtual/dmi/id/product_uuid, assuming not running on EC2: open /sys/devices/virtual/dmi/id/product_uuid: permission denied | |
I1212 13:18:53.203259 402540 s3context.go:170] defaulting region to "us-east-1" | |
I1212 13:18:53.597036 402540 s3context.go:210] found bucket in region "us-east-1" | |
I1212 13:18:53.597086 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/config" | |
I1212 13:18:53.993087 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/instancegroup/" | |
I1212 13:18:54.093564 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/instancegroup: [s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes] | |
I1212 13:18:54.093630 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a" | |
I1212 13:18:54.185766 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes" | |
I1212 13:18:54.274462 402540 channel.go:99] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/" | |
I1212 13:18:54.274558 402540 channel.go:104] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable" | |
I1212 13:18:54.274600 402540 context.go:177] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable | |
I1212 13:18:54.301959 402540 channel.go:113] Channel contents: spec: | |
images: | |
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 ) | |
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28 | |
providerID: aws | |
kubernetesVersion: ">=1.4.0 <1.5.0" | |
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.5.0 <1.6.0" | |
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.6.0 <1.7.0" | |
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.7.0 <1.8.0" | |
- name: kope.io/k8s-1.8-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.8.0 <1.9.0" | |
- name: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.9.0 <1.10.0" | |
- name: kope.io/k8s-1.10-debian-jessie-amd64-hvm-ebs-2018-08-17 | |
providerID: aws | |
kubernetesVersion: ">=1.10.0 <1.11.0" | |
# Stretch is the default for 1.11 (for nvme) | |
- name: kope.io/k8s-1.11-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.11.0 <1.12.0" | |
- name: kope.io/k8s-1.12-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.12.0 <1.13.0" | |
- name: kope.io/k8s-1.13-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.13.0 <1.14.0" | |
- name: kope.io/k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.14.0 <1.15.0" | |
- name: kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26 | |
providerID: aws | |
kubernetesVersion: ">=1.15.0" | |
- providerID: gce | |
name: "cos-cloud/cos-stable-65-10323-99-0" | |
cluster: | |
kubernetesVersion: v1.5.8 | |
networking: | |
kubenet: {} | |
kubernetesVersions: | |
- range: ">=1.17.0" | |
recommendedVersion: 1.17.0 | |
requiredVersion: 1.17.0 | |
- range: ">=1.16.0" | |
recommendedVersion: 1.16.2 | |
requiredVersion: 1.16.0 | |
- range: ">=1.15.0" | |
recommendedVersion: 1.15.5 | |
requiredVersion: 1.15.0 | |
- range: ">=1.14.0" | |
recommendedVersion: 1.14.8 | |
requiredVersion: 1.14.0 | |
- range: ">=1.13.0" | |
recommendedVersion: 1.13.12 | |
requiredVersion: 1.13.0 | |
- range: ">=1.12.0" | |
recommendedVersion: 1.12.10 | |
requiredVersion: 1.12.0 | |
- range: ">=1.11.0" | |
recommendedVersion: 1.11.10 | |
requiredVersion: 1.11.0 | |
- range: "<1.11.0" | |
recommendedVersion: 1.11.10 | |
requiredVersion: 1.11.10 | |
kopsVersions: | |
- range: ">=1.17.0-alpha.1" | |
#recommendedVersion: "1.17.0" | |
#requiredVersion: 1.17.0 | |
kubernetesVersion: 1.17.0 | |
- range: ">=1.16.0-alpha.1" | |
#recommendedVersion: "1.16.0" | |
#requiredVersion: 1.16.0 | |
kubernetesVersion: 1.16.2 | |
- range: ">=1.15.0-alpha.1" | |
#recommendedVersion: "1.15.0" | |
#requiredVersion: 1.15.0 | |
kubernetesVersion: 1.15.5 | |
- range: ">=1.14.0-alpha.1" | |
#recommendedVersion: "1.14.0" | |
#requiredVersion: 1.14.0 | |
kubernetesVersion: 1.14.8 | |
- range: ">=1.13.0-alpha.1" | |
#recommendedVersion: "1.13.0" | |
#requiredVersion: 1.13.0 | |
kubernetesVersion: 1.13.12 | |
- range: ">=1.12.0-alpha.1" | |
recommendedVersion: "1.12.1" | |
#requiredVersion: 1.12.0 | |
kubernetesVersion: 1.12.10 | |
- range: ">=1.11.0-alpha.1" | |
recommendedVersion: "1.11.1" | |
#requiredVersion: 1.11.0 | |
kubernetesVersion: 1.11.10 | |
- range: "<1.11.0-alpha.1" | |
recommendedVersion: "1.11.1" | |
#requiredVersion: 1.10.0 | |
kubernetesVersion: 1.11.10 | |
I1212 13:18:54.302473 402540 populate_cluster_spec.go:371] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11 | |
I1212 13:18:54.302520 402540 populate_cluster_spec.go:378] Defaulted ServiceClusterIPRange to 100.64.0.0/13 | |
I1212 13:18:54.304003 402540 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:54.304167 402540 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:54.964206 402540 subnets.go:49] All subnets have CIDRs; skipping assignment logic | |
I1212 13:18:54.964255 402540 defaults.go:224] Not setting up Proxy Excludes | |
I1212 13:18:54.964381 402540 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:54.964618 402540 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:55.147951 402540 utils.go:167] Querying for all DNS zones to find match for "kops.domain.com" | |
I1212 13:18:55.148141 402540 route53.go:53] AWS request: route53 ListHostedZones | |
I1212 13:18:55.498357 402540 populate_cluster_spec.go:253] Defaulting DNS zone to: Z237FHI0B4E3ZX | |
I1212 13:18:55.498396 402540 tagbuilder.go:95] tags: [_aws _k8s_1_6] | |
I1212 13:18:55.498721 402540 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder | |
I1212 13:18:55.498738 402540 options_loader.go:130] executing builder *components.EtcdOptionsBuilder | |
I1212 13:18:55.498770 402540 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder | |
I1212 13:18:55.498784 402540 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder | |
I1212 13:18:55.498792 402540 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder | |
I1212 13:18:55.498850 402540 options_loader.go:130] executing builder *components.DockerOptionsBuilder | |
I1212 13:18:55.498864 402540 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder | |
I1212 13:18:55.498873 402540 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder | |
I1212 13:18:55.498887 402540 options_loader.go:130] executing builder *components.KubeletOptionsBuilder | |
I1212 13:18:55.498902 402540 kubelet.go:171] Cloud Provider: aws | |
I1212 13:18:55.498932 402540 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1212 13:18:55.498944 402540 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure | |
I1212 13:18:55.498961 402540 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s | |
I1212 13:18:55.498979 402540 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder | |
I1212 13:18:55.498991 402540 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder | |
I1212 13:18:55.499535 402540 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder | |
I1212 13:18:55.499550 402540 options_loader.go:130] executing builder *components.EtcdOptionsBuilder | |
I1212 13:18:55.499576 402540 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder | |
I1212 13:18:55.499585 402540 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder | |
I1212 13:18:55.499592 402540 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder | |
I1212 13:18:55.499624 402540 options_loader.go:130] executing builder *components.DockerOptionsBuilder | |
I1212 13:18:55.499666 402540 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder | |
I1212 13:18:55.499691 402540 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder | |
I1212 13:18:55.499707 402540 options_loader.go:130] executing builder *components.KubeletOptionsBuilder | |
I1212 13:18:55.499727 402540 kubelet.go:171] Cloud Provider: aws | |
I1212 13:18:55.499784 402540 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder | |
I1212 13:18:55.499803 402540 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure | |
I1212 13:18:55.499863 402540 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder | |
I1212 13:18:55.499880 402540 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder | |
I1212 13:18:55.500654 402540 spec_builder.go:49] options: { | |
"channel": "stable", | |
"configBase": "s3://kops-domain-com-state-store/kops.domain.com", | |
"cloudProvider": "aws", | |
"kubernetesVersion": "1.15.5", | |
"subnets": [ | |
{ | |
"name": "us-west-1a", | |
"cidr": "172.20.32.0/19", | |
"zone": "us-west-1a", | |
"type": "Public" | |
} | |
], | |
"masterPublicName": "api.kops.domain.com", | |
"masterInternalName": "api.internal.kops.domain.com", | |
"networkCIDR": "172.20.0.0/16", | |
"topology": { | |
"masters": "public", | |
"nodes": "public", | |
"dns": { | |
"type": "Public" | |
} | |
}, | |
"secretStore": "s3://kops-domain-com-state-store/kops.domain.com/secrets", | |
"keyStore": "s3://kops-domain-com-state-store/kops.domain.com/pki", | |
"configStore": "s3://kops-domain-com-state-store/kops.domain.com", | |
"dnsZone": "Z237FHI0B4E3ZX", | |
"clusterDNSDomain": "cluster.local", | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"sshAccess": [ | |
"0.0.0.0/0" | |
], | |
"kubernetesApiAccess": [ | |
"0.0.0.0/0" | |
], | |
"etcdClusters": [ | |
{ | |
"name": "main", | |
"provider": "Manager", | |
"etcdMembers": [ | |
{ | |
"name": "a", | |
"instanceGroup": "master-us-west-1a" | |
} | |
], | |
"enableEtcdTLS": true, | |
"enableTLSAuth": true, | |
"version": "3.3.10", | |
"backups": { | |
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main" | |
}, | |
"manager": {}, | |
"memoryRequest": "100Mi", | |
"cpuRequest": "200m" | |
}, | |
{ | |
"name": "events", | |
"provider": "Manager", | |
"etcdMembers": [ | |
{ | |
"name": "a", | |
"instanceGroup": "master-us-west-1a" | |
} | |
], | |
"enableEtcdTLS": true, | |
"enableTLSAuth": true, | |
"version": "3.3.10", | |
"backups": { | |
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events" | |
}, | |
"manager": {}, | |
"memoryRequest": "100Mi", | |
"cpuRequest": "100m" | |
} | |
], | |
"docker": { | |
"ipMasq": false, | |
"ipTables": false, | |
"logDriver": "json-file", | |
"logLevel": "warn", | |
"logOpt": [ | |
"max-size=10m", | |
"max-file=5" | |
], | |
"storage": "overlay2,overlay,aufs", | |
"version": "18.06.3" | |
}, | |
"kubeDNS": { | |
"cacheMaxSize": 1000, | |
"cacheMaxConcurrent": 150, | |
"domain": "cluster.local", | |
"replicas": 2, | |
"serverIP": "100.64.0.10", | |
"memoryRequest": "70Mi", | |
"cpuRequest": "100m", | |
"memoryLimit": "170Mi" | |
}, | |
"kubeAPIServer": { | |
"image": "k8s.gcr.io/kube-apiserver:v1.15.5", | |
"logLevel": 2, | |
"cloudProvider": "aws", | |
"securePort": 443, | |
"insecurePort": 8080, | |
"bindAddress": "0.0.0.0", | |
"insecureBindAddress": "127.0.0.1", | |
"enableAdmissionPlugins": [ | |
"NamespaceLifecycle", | |
"LimitRanger", | |
"ServiceAccount", | |
"PersistentVolumeLabel", | |
"DefaultStorageClass", | |
"DefaultTolerationSeconds", | |
"MutatingAdmissionWebhook", | |
"ValidatingAdmissionWebhook", | |
"NodeRestriction", | |
"ResourceQuota" | |
], | |
"serviceClusterIPRange": "100.64.0.0/13", | |
"etcdServers": [ | |
"http://127.0.0.1:4001" | |
], | |
"etcdServersOverrides": [ | |
"/events#http://127.0.0.1:4002" | |
], | |
"allowPrivileged": true, | |
"apiServerCount": 1, | |
"anonymousAuth": false, | |
"kubeletPreferredAddressTypes": [ | |
"InternalIP", | |
"Hostname", | |
"ExternalIP" | |
], | |
"storageBackend": "etcd3", | |
"authorizationMode": "RBAC", | |
"requestheaderUsernameHeaders": [ | |
"X-Remote-User" | |
], | |
"requestheaderGroupHeaders": [ | |
"X-Remote-Group" | |
], | |
"requestheaderExtraHeaderPrefixes": [ | |
"X-Remote-Extra-" | |
], | |
"requestheaderAllowedNames": [ | |
"aggregator" | |
] | |
}, | |
"kubeControllerManager": { | |
"logLevel": 2, | |
"image": "k8s.gcr.io/kube-controller-manager:v1.15.5", | |
"cloudProvider": "aws", | |
"clusterName": "kops.domain.com", | |
"clusterCIDR": "100.96.0.0/11", | |
"allocateNodeCIDRs": true, | |
"configureCloudRoutes": true, | |
"leaderElection": { | |
"leaderElect": true | |
}, | |
"attachDetachReconcileSyncPeriod": "1m0s", | |
"useServiceAccountCredentials": true | |
}, | |
"kubeScheduler": { | |
"logLevel": 2, | |
"image": "k8s.gcr.io/kube-scheduler:v1.15.5", | |
"leaderElection": { | |
"leaderElect": true | |
} | |
}, | |
"kubeProxy": { | |
"image": "k8s.gcr.io/kube-proxy:v1.15.5", | |
"cpuRequest": "100m", | |
"logLevel": 2, | |
"clusterCIDR": "100.96.0.0/11", | |
"hostnameOverride": "@aws" | |
}, | |
"kubelet": { | |
"anonymousAuth": false, | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0", | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "kubenet", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"networkPluginMTU": 9001, | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%", | |
"featureGates": { | |
"ExperimentalCriticalPodAnnotation": "true" | |
} | |
}, | |
"masterKubelet": { | |
"anonymousAuth": false, | |
"kubeconfigPath": "/var/lib/kubelet/kubeconfig", | |
"logLevel": 2, | |
"podManifestPath": "/etc/kubernetes/manifests", | |
"hostnameOverride": "@aws", | |
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0", | |
"enableDebuggingHandlers": true, | |
"clusterDomain": "cluster.local", | |
"clusterDNS": "100.64.0.10", | |
"networkPluginName": "kubenet", | |
"cloudProvider": "aws", | |
"cgroupRoot": "/", | |
"registerSchedulable": false, | |
"nonMasqueradeCIDR": "100.64.0.0/10", | |
"networkPluginMTU": 9001, | |
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%", | |
"featureGates": { | |
"ExperimentalCriticalPodAnnotation": "true" | |
} | |
}, | |
"networking": { | |
"kubenet": {} | |
}, | |
"api": { | |
"dns": {} | |
}, | |
"authorization": { | |
"rbac": {} | |
}, | |
"iam": { | |
"legacy": false, | |
"allowContainerRegistry": true | |
} | |
} | |
I1212 13:18:55.501242 402540 channel.go:241] version range ">=1.17.0-alpha.1" does not apply to version "1.15.0"; skipping | |
I1212 13:18:55.501313 402540 channel.go:241] version range ">=1.16.0-alpha.1" does not apply to version "1.15.0"; skipping | |
I1212 13:18:55.501375 402540 channel.go:152] VersionRecommendationSpec does not specify RecommendedVersion | |
I1212 13:18:55.501384 402540 channel.go:192] VersionRecommendationSpec does not specify RequiredVersion | |
I1212 13:18:55.501394 402540 channel.go:220] version range ">=1.17.0" does not apply to version "1.15.5"; skipping | |
I1212 13:18:55.501402 402540 channel.go:220] version range ">=1.16.0" does not apply to version "1.15.5"; skipping | |
I1212 13:18:55.501418 402540 channel.go:144] RecommendedVersion="1.15.5", Have="1.15.5". No upgrade needed. | |
I1212 13:18:55.501435 402540 channel.go:184] RequiredVersion="1.15.0", Have="1.15.5". No upgrade needed. | |
I1212 13:18:55.501615 402540 context.go:177] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet.sha256 | |
I1212 13:18:55.529854 402540 builder.go:318] Found hash "de590308448a62982aa6209b52da6de69ee4855e449e5508c288c8d12d074ec5" for "https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet" | |
I1212 13:18:55.529931 402540 builder.go:235] adding file: &{DownloadURL:https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet CanonicalURL:<nil> SHAValue:de590308448a62982aa6209b52da6de69ee4855e449e5508c288c8d12d074ec5} | |
I1212 13:18:55.530008 402540 context.go:177] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl.sha256 | |
I1212 13:18:55.534227 402540 builder.go:318] Found hash "be84cf088241f29eca6221430f8fdb3788bc80eccb79b839d721c0daa6b46244" for "https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl" | |
I1212 13:18:55.534282 402540 builder.go:235] adding file: &{DownloadURL:https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl CanonicalURL:<nil> SHAValue:be84cf088241f29eca6221430f8fdb3788bc80eccb79b839d721c0daa6b46244} | |
I1212 13:18:55.534344 402540 networking.go:175] Adding default CNI asset for k8s >= 1.11: https://storage.googleapis.com/kubernetes-release/network-plugins/cni-plugins-amd64-v0.6.0.tgz | |
I1212 13:18:55.534366 402540 urls.go:81] Using default base url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/" | |
I1212 13:18:55.534394 402540 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz.sha256 | |
I1212 13:18:55.869754 402540 builder.go:318] Found hash "71b7bc444ba0a5f7cd7a36e91b594c1c3d13890e160d85e0dfde38c46a24e416" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz" | |
I1212 13:18:55.869827 402540 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz CanonicalURL:<nil> SHAValue:71b7bc444ba0a5f7cd7a36e91b594c1c3d13890e160d85e0dfde38c46a24e416} | |
I1212 13:18:55.869877 402540 urls.go:73] Using cached kopsBaseUrl url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/" | |
I1212 13:18:55.869915 402540 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup.sha256 | |
I1212 13:18:55.954782 402540 builder.go:318] Found hash "9604ef18267ad7b5cf4cebbf7ab64423cf5bb0342d169c608ac6376e6af26d81" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup" | |
I1212 13:18:55.954850 402540 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup CanonicalURL:<nil> SHAValue:9604ef18267ad7b5cf4cebbf7ab64423cf5bb0342d169c608ac6376e6af26d81} | |
I1212 13:18:55.954902 402540 urls.go:137] Using default nodeup location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup" | |
I1212 13:18:55.954925 402540 urls.go:73] Using cached kopsBaseUrl url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/" | |
I1212 13:18:55.954947 402540 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz.sha256 | |
I1212 13:18:56.037523 402540 builder.go:318] Found hash "42a9c4324fe26d63ce11f3dd7836371bc93fa06ca8f479807728f3746e27061b" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz" | |
I1212 13:18:56.037624 402540 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz CanonicalURL:<nil> SHAValue:42a9c4324fe26d63ce11f3dd7836371bc93fa06ca8f479807728f3746e27061b} | |
I1212 13:18:56.037661 402540 urls.go:178] Using default protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz" | |
I1212 13:18:56.037722 402540 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1" | |
I1212 13:18:56.037873 402540 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones | |
I1212 13:18:56.209044 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/ssh/public/admin/" | |
I1212 13:18:56.303554 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin: [s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2] | |
I1212 13:18:56.303656 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2" | |
I1212 13:18:56.392833 402540 route53.go:53] AWS request: route53 ListHostedZones | |
I1212 13:18:56.481736 402540 dns.go:104] Doing DNS lookup to verify NS records for "kops.domain.com" | |
I1212 13:18:56.490632 402540 dns.go:121] Found NS records for "kops.domain.com": [ns-947.awsdns-54.net. ns-1265.awsdns-30.org. ns-1946.awsdns-51.co.uk. ns-287.awsdns-35.com.] | |
I1212 13:18:56.490736 402540 tagbuilder.go:95] tags: [_aws _k8s_1_6] | |
I1212 13:18:56.491151 402540 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:56.491221 402540 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.491304 402540 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.491376 402540 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.491453 402540 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:56.491820 402540 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.492177 402540 templates.go:88] loading resource "addons/external-dns.addons.k8s.io/README.md" | |
I1212 13:18:56.492541 402540 templates.go:80] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml" | |
I1212 13:18:56.492758 402540 templates.go:80] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml" | |
I1212 13:18:56.493000 402540 templates.go:80] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:56.493429 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.9.yaml" | |
I1212 13:18:56.493719 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" | |
I1212 13:18:56.494239 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.12.yaml" | |
I1212 13:18:56.495138 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml" | |
I1212 13:18:56.495722 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.8.yaml" | |
I1212 13:18:56.495986 402540 templates.go:80] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.11.yaml" | |
I1212 13:18:56.496181 402540 templates.go:80] loading (templated) resource "addons/networking.romana/k8s-1.12.yaml" | |
I1212 13:18:56.496703 402540 templates.go:80] loading (templated) resource "addons/networking.romana/k8s-1.7.yaml" | |
I1212 13:18:56.497057 402540 templates.go:80] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml" | |
I1212 13:18:56.497536 402540 templates.go:80] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml" | |
I1212 13:18:56.497858 402540 templates.go:88] loading resource "addons/core.addons.k8s.io/addon.yaml" | |
I1212 13:18:56.498115 402540 templates.go:80] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.498394 402540 templates.go:80] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.7.yaml" | |
I1212 13:18:56.498767 402540 templates.go:88] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:56.498849 402540 templates.go:88] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:56.499034 402540 templates.go:88] loading resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.499177 402540 templates.go:88] loading resource "addons/storage-gce.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:56.499422 402540 templates.go:80] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml" | |
I1212 13:18:56.499676 402540 templates.go:80] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.499793 402540 templates.go:88] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:56.500008 402540 templates.go:88] loading resource "addons/limit-range.addons.k8s.io/addon.yaml" | |
I1212 13:18:56.500581 402540 templates.go:80] loading (templated) resource "addons/networking.cilium.io/k8s-1.12.yaml" | |
I1212 13:18:56.501232 402540 templates.go:80] loading (templated) resource "addons/networking.cilium.io/k8s-1.7.yaml" | |
I1212 13:18:56.501519 402540 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.8.yaml" | |
I1212 13:18:56.501607 402540 templates.go:80] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml" | |
I1212 13:18:56.501747 402540 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.12.yaml" | |
I1212 13:18:56.502047 402540 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml" | |
I1212 13:18:56.502392 402540 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.7.yaml" | |
I1212 13:18:56.502642 402540 templates.go:88] loading resource "addons/authentication.kope.io/k8s-1.12.yaml" | |
I1212 13:18:56.502868 402540 templates.go:88] loading resource "addons/authentication.kope.io/k8s-1.8.yaml" | |
I1212 13:18:56.503243 402540 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml" | |
I1212 13:18:56.503529 402540 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml" | |
I1212 13:18:56.503957 402540 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml" | |
I1212 13:18:56.504345 402540 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml" | |
I1212 13:18:56.504679 402540 templates.go:88] loading resource "addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:56.505040 402540 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:56.505298 402540 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:56.506045 402540 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.506149 402540 templates.go:80] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml" | |
I1212 13:18:56.506290 402540 templates.go:80] loading (templated) resource "addons/authentication.aws/k8s-1.10.yaml" | |
I1212 13:18:56.506391 402540 templates.go:80] loading (templated) resource "addons/networking.flannel/pre-k8s-1.6.yaml" | |
I1212 13:18:56.506529 402540 templates.go:80] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml" | |
I1212 13:18:56.506626 402540 templates.go:80] loading (templated) resource "addons/networking.flannel/k8s-1.6.yaml" | |
I1212 13:18:56.506944 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.12.yaml" | |
I1212 13:18:56.507182 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml" | |
I1212 13:18:56.507570 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7-v3.yaml" | |
I1212 13:18:56.507776 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7.yaml" | |
I1212 13:18:56.507931 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml" | |
I1212 13:18:56.507995 402540 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml" | |
I1212 13:18:56.508044 402540 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.508086 402540 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:56.508134 402540 templates.go:88] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.508211 402540 templates.go:80] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:56.508319 402540 templates.go:80] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.508564 402540 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.508747 402540 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:56.508878 402540 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.508943 402540 templates.go:88] loading resource "addons/networking.kope.io/k8s-1.12.yaml" | |
I1212 13:18:56.508995 402540 templates.go:88] loading resource "addons/networking.kope.io/k8s-1.6.yaml" | |
I1212 13:18:56.509295 402540 templates.go:88] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.509381 402540 tree_walker.go:98] visit "cloudup/resources" | |
I1212 13:18:56.509404 402540 tree_walker.go:98] visit "cloudup/resources/addons" | |
I1212 13:18:56.509546 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io" | |
I1212 13:18:56.509579 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:56.509667 402540 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:56.509680 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:56.509719 402540 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:56.509728 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.509937 402540 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.509947 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws" | |
I1212 13:18:56.509963 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws/k8s-1.10.yaml.template" | |
I1212 13:18:56.510046 402540 loader.go:354] loading (templated) resource "addons/authentication.aws/k8s-1.10.yaml" | |
I1212 13:18:56.510058 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws/k8s-1.12.yaml.template" | |
I1212 13:18:56.510130 402540 loader.go:354] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml" | |
I1212 13:18:56.510140 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel" | |
I1212 13:18:56.510157 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/k8s-1.12.yaml.template" | |
I1212 13:18:56.510238 402540 loader.go:354] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml" | |
I1212 13:18:56.510251 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/k8s-1.6.yaml.template" | |
I1212 13:18:56.510637 402540 loader.go:354] loading (templated) resource "addons/networking.flannel/k8s-1.6.yaml" | |
I1212 13:18:56.510680 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/pre-k8s-1.6.yaml.template" | |
I1212 13:18:56.510754 402540 loader.go:354] loading (templated) resource "addons/networking.flannel/pre-k8s-1.6.yaml" | |
I1212 13:18:56.510769 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org" | |
I1212 13:18:56.511365 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.12.yaml.template" | |
I1212 13:18:56.511990 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.12.yaml" | |
I1212 13:18:56.512403 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.6.yaml.template" | |
I1212 13:18:56.512738 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml" | |
I1212 13:18:56.512778 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.7-v3.yaml.template" | |
I1212 13:18:56.513130 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7-v3.yaml" | |
I1212 13:18:56.513160 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.7.yaml.template" | |
I1212 13:18:56.513537 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7.yaml" | |
I1212 13:18:56.513558 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/pre-k8s-1.6.yaml.template" | |
I1212 13:18:56.513797 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml" | |
I1212 13:18:56.513832 402540 tree_walker.go:98] visit "cloudup/resources/addons/rbac.addons.k8s.io" | |
I1212 13:18:56.513855 402540 tree_walker.go:98] visit "cloudup/resources/addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:56.514004 402540 loader.go:362] loading resource "addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:56.514022 402540 tree_walker.go:98] visit "cloudup/resources/addons/scheduler.addons.k8s.io" | |
I1212 13:18:56.514042 402540 tree_walker.go:98] visit "cloudup/resources/addons/scheduler.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.514130 402540 loader.go:362] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.514141 402540 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io" | |
I1212 13:18:56.514163 402540 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:56.514297 402540 loader.go:354] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.514315 402540 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io/k8s-1.6.yaml.template" | |
I1212 13:18:56.514575 402540 loader.go:354] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:56.514594 402540 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io" | |
I1212 13:18:56.514629 402540 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:56.514787 402540 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.514859 402540 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml.template" | |
I1212 13:18:56.515029 402540 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:56.515049 402540 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1212 13:18:56.515265 402540 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.515284 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io" | |
I1212 13:18:56.515309 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/k8s-1.12.yaml" | |
I1212 13:18:56.515385 402540 loader.go:362] loading resource "addons/networking.kope.io/k8s-1.12.yaml" | |
I1212 13:18:56.515434 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/k8s-1.6.yaml" | |
I1212 13:18:56.515555 402540 loader.go:362] loading resource "addons/networking.kope.io/k8s-1.6.yaml" | |
I1212 13:18:56.515571 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.515714 402540 loader.go:362] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.515726 402540 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io" | |
I1212 13:18:56.515746 402540 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml.template" | |
I1212 13:18:56.515817 402540 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:56.515830 402540 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml.template" | |
I1212 13:18:56.515954 402540 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml" | |
I1212 13:18:56.515970 402540 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:56.516036 402540 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.516053 402540 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io" | |
I1212 13:18:56.516071 402540 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:56.516458 402540 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.516486 402540 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml.template" | |
I1212 13:18:56.516650 402540 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:56.516675 402540 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1212 13:18:56.516749 402540 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.516766 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io" | |
I1212 13:18:56.516799 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/README.md" | |
I1212 13:18:56.516894 402540 loader.go:362] loading resource "addons/external-dns.addons.k8s.io/README.md" | |
I1212 13:18:56.516906 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:56.517192 402540 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.517211 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.6.yaml.template" | |
I1212 13:18:56.517325 402540 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:56.517338 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml.template" | |
I1212 13:18:56.517400 402540 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:56.517423 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter" | |
I1212 13:18:56.517444 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.12.yaml.template" | |
I1212 13:18:56.517559 402540 loader.go:354] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml" | |
I1212 13:18:56.517786 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.6.yaml.template" | |
I1212 13:18:56.517890 402540 loader.go:354] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml" | |
I1212 13:18:56.517906 402540 tree_walker.go:98] visit "cloudup/resources/addons/digitalocean-cloud-controller.addons.k8s.io" | |
I1212 13:18:56.517946 402540 tree_walker.go:98] visit "cloudup/resources/addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml.template" | |
I1212 13:18:56.518017 402540 loader.go:354] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:56.518083 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal" | |
I1212 13:18:56.518116 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.12.yaml.template" | |
I1212 13:18:56.518394 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.12.yaml" | |
I1212 13:18:56.518585 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.6.yaml.template" | |
I1212 13:18:56.518792 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml" | |
I1212 13:18:56.518816 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.8.yaml.template" | |
I1212 13:18:56.519011 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.8.yaml" | |
I1212 13:18:56.519033 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.9.yaml.template" | |
I1212 13:18:56.519435 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.9.yaml" | |
I1212 13:18:56.519469 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml.template" | |
I1212 13:18:56.519629 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml" | |
I1212 13:18:56.519654 402540 tree_walker.go:98] visit "cloudup/resources/addons/openstack.addons.k8s.io" | |
I1212 13:18:56.519688 402540 tree_walker.go:98] visit "cloudup/resources/addons/openstack.addons.k8s.io/k8s-1.11.yaml.template" | |
I1212 13:18:56.519818 402540 loader.go:354] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.11.yaml" | |
I1212 13:18:56.519845 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana" | |
I1212 13:18:56.519863 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana/k8s-1.12.yaml.template" | |
I1212 13:18:56.520079 402540 loader.go:354] loading (templated) resource "addons/networking.romana/k8s-1.12.yaml" | |
I1212 13:18:56.520099 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana/k8s-1.7.yaml.template" | |
I1212 13:18:56.520278 402540 loader.go:354] loading (templated) resource "addons/networking.romana/k8s-1.7.yaml" | |
I1212 13:18:56.520307 402540 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io" | |
I1212 13:18:56.520327 402540 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml.template" | |
I1212 13:18:56.520442 402540 loader.go:354] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml" | |
I1212 13:18:56.520460 402540 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml.template" | |
I1212 13:18:56.520730 402540 loader.go:354] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml" | |
I1212 13:18:56.520755 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io" | |
I1212 13:18:56.520789 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/addon.yaml" | |
I1212 13:18:56.520843 402540 loader.go:362] loading resource "addons/core.addons.k8s.io/addon.yaml" | |
I1212 13:18:56.520855 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:56.520969 402540 loader.go:354] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.520988 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/k8s-1.7.yaml.template" | |
I1212 13:18:56.521086 402540 loader.go:354] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.7.yaml" | |
I1212 13:18:56.521101 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:56.521463 402540 loader.go:362] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:56.521483 402540 tree_walker.go:98] visit "cloudup/resources/addons/kubelet-api.rbac.addons.k8s.io" | |
I1212 13:18:56.521516 402540 tree_walker.go:98] visit "cloudup/resources/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:56.521573 402540 loader.go:362] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:56.521585 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io" | |
I1212 13:18:56.521601 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:56.521671 402540 loader.go:362] loading resource "addons/storage-gce.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:56.521683 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.521726 402540 loader.go:362] loading resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:56.521752 402540 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io" | |
I1212 13:18:56.521768 402540 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io/addon.yaml" | |
I1212 13:18:56.521811 402540 loader.go:362] loading resource "addons/limit-range.addons.k8s.io/addon.yaml" | |
I1212 13:18:56.521823 402540 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:56.522059 402540 loader.go:362] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:56.522081 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io" | |
I1212 13:18:56.522098 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io/k8s-1.12.yaml.template" | |
I1212 13:18:56.522451 402540 loader.go:354] loading (templated) resource "addons/networking.cilium.io/k8s-1.12.yaml" | |
I1212 13:18:56.522486 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io/k8s-1.7.yaml.template" | |
I1212 13:18:56.523108 402540 loader.go:354] loading (templated) resource "addons/networking.cilium.io/k8s-1.7.yaml" | |
I1212 13:18:56.523161 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave" | |
I1212 13:18:56.523214 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/pre-k8s-1.6.yaml.template" | |
I1212 13:18:56.523344 402540 loader.go:354] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml" | |
I1212 13:18:56.523379 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.12.yaml.template" | |
I1212 13:18:56.523640 402540 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.12.yaml" | |
I1212 13:18:56.523672 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.6.yaml.template" | |
I1212 13:18:56.523988 402540 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml" | |
I1212 13:18:56.524017 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.7.yaml.template" | |
I1212 13:18:56.524240 402540 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.7.yaml" | |
I1212 13:18:56.524271 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.8.yaml.template" | |
I1212 13:18:56.524447 402540 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.8.yaml" | |
I1212 13:18:56.524471 402540 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io" | |
I1212 13:18:56.524571 402540 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml.template" | |
I1212 13:18:56.524882 402540 loader.go:354] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml" | |
I1212 13:18:56.524928 402540 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml.template" | |
I1212 13:18:56.525099 402540 loader.go:354] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:56.525125 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io" | |
I1212 13:18:56.525155 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.12.yaml" | |
I1212 13:18:56.525369 402540 loader.go:362] loading resource "addons/authentication.kope.io/k8s-1.12.yaml" | |
I1212 13:18:56.525393 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.8.yaml" | |
I1212 13:18:56.525787 402540 loader.go:362] loading resource "addons/authentication.kope.io/k8s-1.8.yaml" | |
I1212 13:18:56.525814 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni" | |
I1212 13:18:56.525848 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml.template" | |
I1212 13:18:56.525986 402540 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml" | |
I1212 13:18:56.526011 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml.template" | |
I1212 13:18:56.526149 402540 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml" | |
I1212 13:18:56.526179 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml.template" | |
I1212 13:18:56.526450 402540 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml" | |
I1212 13:18:56.526481 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml.template" | |
I1212 13:18:56.526886 402540 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml" | |
I1212 13:18:56.527439 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: v1 | |
kind: Namespace | |
metadata: | |
name: kube-system | |
I1212 13:18:56.527469 402540 bootstrapchannelbuilder.go:79] hash 3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90 | |
I1212 13:18:56.537030 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0" | |
I1212 13:18:56.537891 402540 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000 | |
I1212 13:18:56.537931 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000 | |
I1212 13:18:56.537946 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000 | |
I1212 13:18:56.537957 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000 | |
I1212 13:18:56.537971 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000 | |
I1212 13:18:56.537981 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000 | |
I1212 13:18:56.537990 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.538007 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/kubedns-amd64:1.9" | |
I1212 13:18:56.538024 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.538035 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 8080.000000 | |
I1212 13:18:56.538043 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.538050 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.538058 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.538099 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10" | |
I1212 13:18:56.538112 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.538121 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 8080.000000 | |
I1212 13:18:56.538176 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.538189 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.538198 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.538215 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000 | |
I1212 13:18:56.538226 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000 | |
I1212 13:18:56.538237 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.538245 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.538253 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.538261 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.538270 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:56.538281 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000 | |
I1212 13:18:56.538294 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/dnsmasq-metrics-amd64:1.0" | |
I1212 13:18:56.538314 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/exechealthz-amd64:1.2" | |
I1212 13:18:56.538328 402540 visitor.go:40] float64 value at spec.template.spec.containers.[3].ports.[0].containerPort: 8080.000000 | |
I1212 13:18:56.540980 402540 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000 | |
I1212 13:18:56.541020 402540 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000 | |
I1212 13:18:56.541559 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns-autoscaler | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
spec: | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", | |
"operator":"Exists"}]' | |
labels: | |
k8s-app: kube-dns-autoscaler | |
spec: | |
containers: | |
- command: | |
- /cluster-proportional-autoscaler | |
- --namespace=kube-system | |
- --configmap=kube-dns-autoscaler | |
- --mode=linear | |
- --target=Deployment/kube-dns | |
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"min":2}} | |
- --logtostderr=true | |
- --v=2 | |
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0 | |
name: autoscaler | |
resources: | |
requests: | |
cpu: 20m | |
memory: 10Mi | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: kube-dns | |
strategy: | |
rollingUpdate: | |
maxSurge: 10% | |
maxUnavailable: 0 | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", | |
"operator":"Exists"}]' | |
labels: | |
k8s-app: kube-dns | |
spec: | |
containers: | |
- args: | |
- --domain=cluster.local. | |
- --dns-port=10053 | |
- --config-map=kube-dns | |
- --v=2 | |
env: | |
- name: PROMETHEUS_PORT | |
value: "10055" | |
image: k8s.gcr.io/kubedns-amd64:1.9 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthz-kubedns | |
port: 8080 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: kubedns | |
ports: | |
- containerPort: 10053 | |
name: dns-local | |
protocol: UDP | |
- containerPort: 10053 | |
name: dns-tcp-local | |
protocol: TCP | |
- containerPort: 10055 | |
name: metrics | |
protocol: TCP | |
readinessProbe: | |
httpGet: | |
path: /readiness | |
port: 8081 | |
scheme: HTTP | |
initialDelaySeconds: 3 | |
timeoutSeconds: 5 | |
resources: | |
limits: | |
memory: 170Mi | |
requests: | |
cpu: 100m | |
memory: 70Mi | |
- args: | |
- --cache-size=1000 | |
- --dns-forward-max=150 | |
- --no-resolv | |
- --server=127.0.0.1#10053 | |
- --log-facility=- | |
- --min-port=1024 | |
image: k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthz-dnsmasq | |
port: 8080 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: dnsmasq | |
ports: | |
- containerPort: 53 | |
name: dns | |
protocol: UDP | |
- containerPort: 53 | |
name: dns-tcp | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 150m | |
memory: 10Mi | |
- args: | |
- --v=2 | |
- --logtostderr | |
image: k8s.gcr.io/dnsmasq-metrics-amd64:1.0 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /metrics | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: dnsmasq-metrics | |
ports: | |
- containerPort: 10054 | |
name: metrics | |
protocol: TCP | |
resources: | |
requests: | |
memory: 10Mi | |
- args: | |
- --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 >/dev/null | |
- --url=/healthz-dnsmasq | |
- --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1:10053 >/dev/null | |
- --url=/healthz-kubedns | |
- --port=8080 | |
- --quiet | |
image: k8s.gcr.io/exechealthz-amd64:1.2 | |
name: healthz | |
ports: | |
- containerPort: 8080 | |
protocol: TCP | |
resources: | |
limits: | |
memory: 50Mi | |
requests: | |
cpu: 10m | |
memory: 50Mi | |
dnsPolicy: Default | |
--- | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
kubernetes.io/name: KubeDNS | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
clusterIP: 100.64.0.10 | |
ports: | |
- name: dns | |
port: 53 | |
protocol: UDP | |
- name: dns-tcp | |
port: 53 | |
protocol: TCP | |
selector: | |
k8s-app: kube-dns | |
I1212 13:18:56.541631 402540 bootstrapchannelbuilder.go:79] hash 895c961cb9365cbedb22edd20a7648182ae7ed3f | |
I1212 13:18:56.545237 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2" | |
I1212 13:18:56.546069 402540 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000 | |
I1212 13:18:56.546104 402540 visitor.go:35] string value at spec.template.spec.volumes.[0].configMap.optional: true | |
I1212 13:18:56.546120 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000 | |
I1212 13:18:56.546131 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000 | |
I1212 13:18:56.546228 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000 | |
I1212 13:18:56.546244 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000 | |
I1212 13:18:56.546254 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000 | |
I1212 13:18:56.546263 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.546279 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10" | |
I1212 13:18:56.546297 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.546309 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:56.546317 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.546326 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.546335 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.546348 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.546357 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:56.546367 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.546375 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.546383 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.546393 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000 | |
I1212 13:18:56.546403 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000 | |
I1212 13:18:56.546427 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10" | |
I1212 13:18:56.546457 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:56.546468 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.546478 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.546487 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.546513 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.546527 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000 | |
I1212 13:18:56.546542 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10" | |
I1212 13:18:56.550840 402540 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000 | |
I1212 13:18:56.550888 402540 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000 | |
I1212 13:18:56.553941 402540 bootstrapchannelbuilder.go:76] Manifest {} | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns-autoscaler | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
spec: | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", | |
"operator":"Exists"}]' | |
labels: | |
k8s-app: kube-dns-autoscaler | |
spec: | |
containers: | |
- command: | |
- /cluster-proportional-autoscaler | |
- --namespace=kube-system | |
- --configmap=kube-dns-autoscaler | |
- --target=Deployment/kube-dns | |
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}} | |
- --logtostderr=true | |
- --v=2 | |
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2 | |
name: autoscaler | |
resources: | |
requests: | |
cpu: 20m | |
memory: 10Mi | |
serviceAccountName: kube-dns-autoscaler | |
tolerations: | |
- key: CriticalAddonsOnly | |
operator: Exists | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: kube-dns | |
strategy: | |
rollingUpdate: | |
maxSurge: 10% | |
maxUnavailable: 0 | |
template: | |
metadata: | |
annotations: | |
prometheus.io/port: "10055" | |
prometheus.io/scrape: "true" | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", | |
"operator":"Exists"}]' | |
labels: | |
k8s-app: kube-dns | |
spec: | |
containers: | |
- args: | |
- --config-dir=/kube-dns-config | |
- --dns-port=10053 | |
- --domain=cluster.local. | |
- --v=2 | |
env: | |
- name: PROMETHEUS_PORT | |
value: "10055" | |
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthcheck/kubedns | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: kubedns | |
ports: | |
- containerPort: 10053 | |
name: dns-local | |
protocol: UDP | |
- containerPort: 10053 | |
name: dns-tcp-local | |
protocol: TCP | |
- containerPort: 10055 | |
name: metrics | |
protocol: TCP | |
readinessProbe: | |
httpGet: | |
path: /readiness | |
port: 8081 | |
scheme: HTTP | |
initialDelaySeconds: 3 | |
timeoutSeconds: 5 | |
resources: | |
limits: | |
memory: 170Mi | |
requests: | |
cpu: 100m | |
memory: 70Mi | |
volumeMounts: | |
- mountPath: /kube-dns-config | |
name: kube-dns-config | |
- args: | |
- -v=2 | |
- -logtostderr | |
- -configDir=/etc/k8s/dns/dnsmasq-nanny | |
- -restartDnsmasq=true | |
- -- | |
- -k | |
- --cache-size=1000 | |
- --dns-forward-max=150 | |
- --no-negcache | |
- --log-facility=- | |
- --server=/cluster.local/127.0.0.1#10053 | |
- --server=/in-addr.arpa/127.0.0.1#10053 | |
- --server=/in6.arpa/127.0.0.1#10053 | |
- --min-port=1024 | |
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthcheck/dnsmasq | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: dnsmasq | |
ports: | |
- containerPort: 53 | |
name: dns | |
protocol: UDP | |
- containerPort: 53 | |
name: dns-tcp | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 150m | |
memory: 20Mi | |
volumeMounts: | |
- mountPath: /etc/k8s/dns/dnsmasq-nanny | |
name: kube-dns-config | |
- args: | |
- --v=2 | |
- --logtostderr | |
- --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A | |
- --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A | |
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /metrics | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: sidecar | |
ports: | |
- containerPort: 10054 | |
name: metrics | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 10m | |
memory: 20Mi | |
dnsPolicy: Default | |
serviceAccountName: kube-dns | |
volumes: | |
- configMap: | |
name: kube-dns | |
optional: true | |
name: kube-dns-config | |
--- | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
kubernetes.io/name: KubeDNS | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
clusterIP: 100.64.0.10 | |
ports: | |
- name: dns | |
port: 53 | |
protocol: UDP | |
- name: dns-tcp | |
port: 53 | |
protocol: TCP | |
selector: | |
k8s-app: kube-dns | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- extensions | |
resources: | |
- deployments/scale | |
- replicasets/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
verbs: | |
- get | |
- create | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kube-dns-autoscaler | |
subjects: | |
- kind: ServiceAccount | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
I1212 13:18:56.554053 402540 bootstrapchannelbuilder.go:79] hash 191685ca6fe009302e55512b0eefc5a676433f10 | |
I1212 13:18:56.563594 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0" | |
I1212 13:18:56.564907 402540 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000 | |
I1212 13:18:56.564955 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.564968 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:56.564979 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.564988 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.565007 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.565019 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000 | |
I1212 13:18:56.565029 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000 | |
I1212 13:18:56.565038 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.565112 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13" | |
I1212 13:18:56.565138 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000 | |
I1212 13:18:56.565160 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000 | |
I1212 13:18:56.565170 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000 | |
I1212 13:18:56.565206 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000 | |
I1212 13:18:56.565234 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000 | |
I1212 13:18:56.565272 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13" | |
I1212 13:18:56.565294 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.565303 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.565312 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.565321 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.565331 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:56.565354 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13" | |
I1212 13:18:56.565368 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000 | |
I1212 13:18:56.565377 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000 | |
I1212 13:18:56.565385 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000 | |
I1212 13:18:56.565402 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000 | |
I1212 13:18:56.565411 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000 | |
I1212 13:18:56.565423 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000 | |
I1212 13:18:56.565449 402540 visitor.go:35] string value at spec.template.spec.volumes.[0].configMap.optional: true | |
I1212 13:18:56.565480 402540 visitor.go:40] float64 value at spec.template.spec.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution.[0].weight: 1.000000 | |
I1212 13:18:56.573455 402540 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000 | |
I1212 13:18:56.573542 402540 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000 | |
I1212 13:18:56.576064 402540 visitor.go:40] float64 value at spec.minAvailable: 1.000000 | |
I1212 13:18:56.576413 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns-autoscaler | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: kube-dns-autoscaler | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
labels: | |
k8s-app: kube-dns-autoscaler | |
spec: | |
containers: | |
- command: | |
- /cluster-proportional-autoscaler | |
- --namespace=kube-system | |
- --configmap=kube-dns-autoscaler | |
- --target=Deployment/kube-dns | |
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}} | |
- --logtostderr=true | |
- --v=2 | |
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0 | |
name: autoscaler | |
resources: | |
requests: | |
cpu: 20m | |
memory: 10Mi | |
serviceAccountName: kube-dns-autoscaler | |
tolerations: | |
- key: CriticalAddonsOnly | |
operator: Exists | |
--- | |
apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: kube-dns | |
strategy: | |
rollingUpdate: | |
maxSurge: 10% | |
maxUnavailable: 0 | |
template: | |
metadata: | |
annotations: | |
prometheus.io/port: "10055" | |
prometheus.io/scrape: "true" | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
labels: | |
k8s-app: kube-dns | |
spec: | |
affinity: | |
podAntiAffinity: | |
preferredDuringSchedulingIgnoredDuringExecution: | |
- podAffinityTerm: | |
labelSelector: | |
matchExpressions: | |
- key: k8s-app | |
operator: In | |
values: | |
- kube-dns | |
topologyKey: kubernetes.io/hostname | |
weight: 1 | |
containers: | |
- args: | |
- --config-dir=/kube-dns-config | |
- --dns-port=10053 | |
- --domain=cluster.local. | |
- --v=2 | |
env: | |
- name: PROMETHEUS_PORT | |
value: "10055" | |
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthcheck/kubedns | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: kubedns | |
ports: | |
- containerPort: 10053 | |
name: dns-local | |
protocol: UDP | |
- containerPort: 10053 | |
name: dns-tcp-local | |
protocol: TCP | |
- containerPort: 10055 | |
name: metrics | |
protocol: TCP | |
readinessProbe: | |
httpGet: | |
path: /readiness | |
port: 8081 | |
scheme: HTTP | |
initialDelaySeconds: 3 | |
timeoutSeconds: 5 | |
resources: | |
limits: | |
memory: 170Mi | |
requests: | |
cpu: 100m | |
memory: 70Mi | |
volumeMounts: | |
- mountPath: /kube-dns-config | |
name: kube-dns-config | |
- args: | |
- -v=2 | |
- -logtostderr | |
- -configDir=/etc/k8s/dns/dnsmasq-nanny | |
- -restartDnsmasq=true | |
- -- | |
- -k | |
- --cache-size=1000 | |
- --dns-forward-max=150 | |
- --no-negcache | |
- --log-facility=- | |
- --server=/cluster.local/127.0.0.1#10053 | |
- --server=/in-addr.arpa/127.0.0.1#10053 | |
- --server=/in6.arpa/127.0.0.1#10053 | |
- --min-port=1024 | |
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthcheck/dnsmasq | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: dnsmasq | |
ports: | |
- containerPort: 53 | |
name: dns | |
protocol: UDP | |
- containerPort: 53 | |
name: dns-tcp | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 150m | |
memory: 20Mi | |
volumeMounts: | |
- mountPath: /etc/k8s/dns/dnsmasq-nanny | |
name: kube-dns-config | |
- args: | |
- --v=2 | |
- --logtostderr | |
- --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A | |
- --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A | |
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13 | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /metrics | |
port: 10054 | |
scheme: HTTP | |
initialDelaySeconds: 60 | |
successThreshold: 1 | |
timeoutSeconds: 5 | |
name: sidecar | |
ports: | |
- containerPort: 10054 | |
name: metrics | |
protocol: TCP | |
resources: | |
requests: | |
cpu: 10m | |
memory: 20Mi | |
dnsPolicy: Default | |
serviceAccountName: kube-dns | |
volumes: | |
- configMap: | |
name: kube-dns | |
optional: true | |
name: kube-dns-config | |
--- | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
k8s-app: kube-dns | |
kubernetes.io/cluster-service: "true" | |
kubernetes.io/name: KubeDNS | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
clusterIP: 100.64.0.10 | |
ports: | |
- name: dns | |
port: 53 | |
protocol: UDP | |
- name: dns-tcp | |
port: 53 | |
protocol: TCP | |
selector: | |
k8s-app: kube-dns | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- replicationcontrollers/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- extensions | |
- apps | |
resources: | |
- deployments/scale | |
- replicasets/scale | |
verbs: | |
- get | |
- update | |
- apiGroups: | |
- "" | |
resources: | |
- configmaps | |
verbs: | |
- get | |
- create | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: kube-dns.addons.k8s.io | |
name: kube-dns-autoscaler | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kube-dns-autoscaler | |
subjects: | |
- kind: ServiceAccount | |
name: kube-dns-autoscaler | |
namespace: kube-system | |
--- | |
apiVersion: policy/v1beta1 | |
kind: PodDisruptionBudget | |
metadata: | |
name: kube-dns | |
namespace: kube-system | |
spec: | |
minAvailable: 1 | |
selector: | |
matchLabels: | |
k8s-app: kube-dns | |
I1212 13:18:56.576569 402540 bootstrapchannelbuilder.go:79] hash b4dff071aa340fd71650c96f213fdf4b4f799c71 | |
I1212 13:18:56.577539 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
addonmanager.kubernetes.io/mode: Reconcile | |
k8s-addon: rbac.addons.k8s.io | |
kubernetes.io/cluster-service: "true" | |
name: kubelet-cluster-admin | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:node | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: kubelet | |
I1212 13:18:56.577629 402540 bootstrapchannelbuilder.go:79] hash 5d53ce7b920cd1e8d65d2306d80a041420711914 | |
I1212 13:18:56.578452 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: kops:system:kubelet-api-admin | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:kubelet-api-admin | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: kubelet-api | |
I1212 13:18:56.578483 402540 bootstrapchannelbuilder.go:79] hash e1508d77cb4e527d7a2939babe36dc350dd83745 | |
I1212 13:18:56.578947 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: v1 | |
kind: LimitRange | |
metadata: | |
name: limits | |
namespace: default | |
spec: | |
limits: | |
- defaultRequest: | |
cpu: 100m | |
type: Container | |
I1212 13:18:56.578967 402540 bootstrapchannelbuilder.go:79] hash 2ea50e23f1a5aa41df3724630ac25173738cc90c | |
I1212 13:18:56.581922 402540 template_functions.go:190] watch-ingress=false set on dns-controller | |
I1212 13:18:56.582258 402540 visitor.go:40] float64 value at spec.replicas: 1.000000 | |
I1212 13:18:56.582313 402540 visitor.go:35] string value at spec.template.spec.hostNetwork: true | |
I1212 13:18:56.582327 402540 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0" | |
I1212 13:18:56.582798 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
name: dns-controller | |
namespace: kube-system | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
k8s-app: dns-controller | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key": "dedicated", "value": | |
"master"}]' | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
spec: | |
containers: | |
- command: | |
- /usr/bin/dns-controller | |
- --watch-ingress=false | |
- --dns=aws-route53 | |
- --zone=*/Z237FHI0B4E3ZX | |
- --zone=*/* | |
- -v=2 | |
image: kope/dns-controller:1.15.0 | |
name: dns-controller | |
resources: | |
requests: | |
cpu: 50m | |
memory: 50Mi | |
dnsPolicy: Default | |
hostNetwork: true | |
nodeSelector: | |
kubernetes.io/role: master | |
I1212 13:18:56.582838 402540 bootstrapchannelbuilder.go:79] hash 41097765274e5bd95292ae88bd6e26268c5e8c59 | |
I1212 13:18:56.583035 402540 template_functions.go:190] watch-ingress=false set on dns-controller | |
I1212 13:18:56.583730 402540 visitor.go:40] float64 value at spec.replicas: 1.000000 | |
I1212 13:18:56.583761 402540 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0" | |
I1212 13:18:56.583777 402540 visitor.go:35] string value at spec.template.spec.hostNetwork: true | |
I1212 13:18:56.584893 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
name: dns-controller | |
namespace: kube-system | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
k8s-app: dns-controller | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
scheduler.alpha.kubernetes.io/tolerations: '[{"key": "dedicated", "value": | |
"master"}]' | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
spec: | |
containers: | |
- command: | |
- /usr/bin/dns-controller | |
- --watch-ingress=false | |
- --dns=aws-route53 | |
- --zone=*/Z237FHI0B4E3ZX | |
- --zone=*/* | |
- -v=2 | |
image: kope/dns-controller:1.15.0 | |
name: dns-controller | |
resources: | |
requests: | |
cpu: 50m | |
memory: 50Mi | |
dnsPolicy: Default | |
hostNetwork: true | |
nodeSelector: | |
node-role.kubernetes.io/master: "" | |
serviceAccount: dns-controller | |
tolerations: | |
- effect: NoSchedule | |
key: node-role.kubernetes.io/master | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: dns-controller | |
namespace: kube-system | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
- pods | |
- ingress | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- ingresses | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kops:dns-controller | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:serviceaccount:kube-system:dns-controller | |
I1212 13:18:56.584922 402540 bootstrapchannelbuilder.go:79] hash 079663bb21f764bd016174115a00ad1e4d92e07d | |
I1212 13:18:56.585057 402540 template_functions.go:190] watch-ingress=false set on dns-controller | |
I1212 13:18:56.585862 402540 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0" | |
I1212 13:18:56.585889 402540 visitor.go:35] string value at spec.template.spec.hostNetwork: true | |
I1212 13:18:56.585895 402540 visitor.go:40] float64 value at spec.replicas: 1.000000 | |
I1212 13:18:56.586987 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: apps/v1 | |
kind: Deployment | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
name: dns-controller | |
namespace: kube-system | |
spec: | |
replicas: 1 | |
selector: | |
matchLabels: | |
k8s-app: dns-controller | |
template: | |
metadata: | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: "" | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
k8s-app: dns-controller | |
version: v1.15.0 | |
spec: | |
containers: | |
- command: | |
- /usr/bin/dns-controller | |
- --watch-ingress=false | |
- --dns=aws-route53 | |
- --zone=*/Z237FHI0B4E3ZX | |
- --zone=*/* | |
- -v=2 | |
image: kope/dns-controller:1.15.0 | |
name: dns-controller | |
resources: | |
requests: | |
cpu: 50m | |
memory: 50Mi | |
dnsPolicy: Default | |
hostNetwork: true | |
nodeSelector: | |
node-role.kubernetes.io/master: "" | |
serviceAccount: dns-controller | |
tolerations: | |
- effect: NoSchedule | |
key: node-role.kubernetes.io/master | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: dns-controller | |
namespace: kube-system | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- endpoints | |
- services | |
- pods | |
- ingress | |
- nodes | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- extensions | |
resources: | |
- ingresses | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: dns-controller.addons.k8s.io | |
name: kops:dns-controller | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: kops:dns-controller | |
subjects: | |
- apiGroup: rbac.authorization.k8s.io | |
kind: User | |
name: system:serviceaccount:kube-system:dns-controller | |
I1212 13:18:56.587045 402540 bootstrapchannelbuilder.go:79] hash 767f8242c35ba32b19b13234cedf26ac5f554dab | |
I1212 13:18:56.588286 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: default | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
--- | |
apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
annotations: | |
storageclass.beta.kubernetes.io/is-default-class: "true" | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: gp2 | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: system:aws-cloud-provider | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- get | |
- list | |
- patch | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- update | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: system:aws-cloud-provider | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:aws-cloud-provider | |
subjects: | |
- kind: ServiceAccount | |
name: aws-cloud-provider | |
namespace: kube-system | |
I1212 13:18:56.588308 402540 bootstrapchannelbuilder.go:79] hash 23459f7be52d7c818dc060a8bcf5e3565bd87a7b | |
I1212 13:18:56.588840 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: default | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
--- | |
apiVersion: storage.k8s.io/v1 | |
kind: StorageClass | |
metadata: | |
annotations: | |
storageclass.beta.kubernetes.io/is-default-class: "true" | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: gp2 | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
I1212 13:18:56.588861 402540 bootstrapchannelbuilder.go:79] hash 62705a596142e6cc283280e8aa973e51536994c5 | |
I1212 13:18:56.589218 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1beta1 | |
kind: StorageClass | |
metadata: | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: default | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
--- | |
apiVersion: storage.k8s.io/v1beta1 | |
kind: StorageClass | |
metadata: | |
annotations: | |
storageclass.beta.kubernetes.io/is-default-class: "true" | |
labels: | |
k8s-addon: storage-aws.addons.k8s.io | |
name: gp2 | |
parameters: | |
type: gp2 | |
provisioner: kubernetes.io/aws-ebs | |
I1212 13:18:56.589233 402540 bootstrapchannelbuilder.go:79] hash 7de4b2eb0521d669172038759c521418711d8266 | |
I1212 13:18:56.590610 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590636 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590654 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590660 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590666 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590671 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590678 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590684 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590690 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590695 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590701 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590712 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.590720 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590736 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590743 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590749 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590756 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590762 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590767 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590772 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590777 402540 task.go:103] testing task "Secret" | |
I1212 13:18:56.590793 402540 task.go:103] testing task "MirrorSecrets" | |
I1212 13:18:56.590802 402540 task.go:103] testing task "MirrorKeystore" | |
I1212 13:18:56.598236 402540 build_flags.go:50] ignoring non-field: | |
I1212 13:18:56.598282 402540 build_flags.go:50] ignoring non-field: | |
I1212 13:18:56.598341 402540 proxy.go:30] proxies is == nil, returning empty list | |
I1212 13:18:56.607582 402540 task.go:103] testing task "ManagedFile" | |
I1212 13:18:56.607734 402540 task.go:103] testing task "ManagedFile" | |
I1212 13:18:56.607751 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.607759 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.607766 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.608529 402540 build_flags.go:50] ignoring non-field: | |
I1212 13:18:56.608554 402540 build_flags.go:50] ignoring non-field: | |
I1212 13:18:56.608638 402540 proxy.go:30] proxies is == nil, returning empty list | |
I1212 13:18:56.610223 402540 task.go:103] testing task "ManagedFile" | |
I1212 13:18:56.610253 402540 task.go:103] testing task "ManagedFile" | |
I1212 13:18:56.610262 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.610269 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.610282 402540 task.go:103] testing task "Keypair" | |
I1212 13:18:56.610297 402540 task.go:75] EnsureTask ignoring identical | |
I1212 13:18:56.610316 402540 task.go:103] testing task "EBSVolume" | |
I1212 13:18:56.610343 402540 task.go:103] testing task "EBSVolume" | |
I1212 13:18:56.610363 402540 task.go:103] testing task "DNSZone" | |
I1212 13:18:56.610403 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.610433 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.610460 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.610474 402540 task.go:103] testing task "SecurityGroup" | |
I1212 13:18:56.610519 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.610537 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.610571 402540 task.go:103] testing task "SecurityGroup" | |
I1212 13:18:56.610586 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.610609 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.610620 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.611760 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.611783 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.611791 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.611798 402540 task.go:103] testing task "SecurityGroupRule" | |
I1212 13:18:56.611854 402540 task.go:103] testing task "SSHKey" | |
I1212 13:18:56.611873 402540 task.go:103] testing task "VPC" | |
I1212 13:18:56.611883 402540 task.go:103] testing task "DHCPOptions" | |
I1212 13:18:56.611905 402540 task.go:103] testing task "VPCDHCPOptionsAssociation" | |
I1212 13:18:56.611923 402540 task.go:103] testing task "InternetGateway" | |
I1212 13:18:56.611941 402540 task.go:103] testing task "RouteTable" | |
I1212 13:18:56.611996 402540 task.go:103] testing task "Route" | |
I1212 13:18:56.612039 402540 network.go:202] applying subnet tags | |
I1212 13:18:56.612053 402540 task.go:103] testing task "Subnet" | |
I1212 13:18:56.612063 402540 task.go:103] testing task "RouteTableAssociation" | |
I1212 13:18:56.616949 402540 task.go:103] testing task "IAMRole" | |
I1212 13:18:56.617005 402540 task.go:103] testing task "IAMRolePolicy" | |
I1212 13:18:56.617018 402540 task.go:103] testing task "IAMInstanceProfile" | |
I1212 13:18:56.617033 402540 task.go:103] testing task "IAMInstanceProfileRole" | |
I1212 13:18:56.617042 402540 task.go:103] testing task "IAMRolePolicy" | |
I1212 13:18:56.617083 402540 task.go:103] testing task "IAMRole" | |
I1212 13:18:56.617096 402540 task.go:103] testing task "IAMRolePolicy" | |
I1212 13:18:56.617103 402540 task.go:103] testing task "IAMInstanceProfile" | |
I1212 13:18:56.617109 402540 task.go:103] testing task "IAMInstanceProfileRole" | |
I1212 13:18:56.617116 402540 task.go:103] testing task "IAMRolePolicy" | |
I1212 13:18:56.617332 402540 task.go:103] testing task "LaunchConfiguration" | |
I1212 13:18:56.617359 402540 task.go:103] testing task "AutoscalingGroup" | |
I1212 13:18:56.617487 402540 task.go:103] testing task "LaunchConfiguration" | |
I1212 13:18:56.617531 402540 task.go:103] testing task "AutoscalingGroup" | |
I1212 13:18:56.621755 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/cluster.spec" | |
I1212 13:18:56.621785 402540 s3context.go:238] Checking default bucket encryption for "kops-domain-com-state-store" | |
I1212 13:18:56.621793 402540 s3context.go:243] Calling S3 GetBucketEncryption Bucket="kops-domain-com-state-store" | |
I1212 13:18:56.705802 402540 s3context.go:263] bucket "kops-domain-com-state-store" has default encryption set to true | |
I1212 13:18:56.705938 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:56.705962 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/cluster.spec" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:56.823898 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a" | |
I1212 13:18:56.915089 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a" | |
I1212 13:18:57.005633 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a" | |
I1212 13:18:57.005695 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:57.005703 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/master-us-west-1a" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:57.144410 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a" | |
I1212 13:18:57.144455 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:57.144462 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/master-us-west-1a" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:57.247333 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes" | |
I1212 13:18:57.341430 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes" | |
I1212 13:18:57.436044 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes" | |
I1212 13:18:57.436130 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:57.436188 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/nodes" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:57.625832 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes" | |
I1212 13:18:57.625946 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:57.625969 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/nodes" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:57.756938 402540 topological_sort.go:64] Dependencies: | |
I1212 13:18:57.756961 402540 topological_sort.go:66] Keypair/apiserver-proxy-client: [Keypair/ca] | |
I1212 13:18:57.756974 402540 topological_sort.go:66] SecurityGroupRule/https-external-to-master-0.0.0.0/0: [SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:57.756984 402540 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0: [] | |
I1212 13:18:57.756992 402540 topological_sort.go:66] LaunchConfiguration/nodes.kops.domain.com: [IAMInstanceProfile/nodes.kops.domain.com SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:57.757022 402540 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12: [] | |
I1212 13:18:57.757033 402540 topological_sort.go:66] SecurityGroupRule/ssh-external-to-master-0.0.0.0/0: [SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:57.757041 402540 topological_sort.go:66] AutoscalingGroup/nodes.kops.domain.com: [LaunchConfiguration/nodes.kops.domain.com Subnet/us-west-1a.kops.domain.com] | |
I1212 13:18:57.757049 402540 topological_sort.go:66] EBSVolume/a.etcd-main.kops.domain.com: [] | |
I1212 13:18:57.757058 402540 topological_sort.go:66] Keypair/kubecfg: [Keypair/ca] | |
I1212 13:18:57.757066 402540 topological_sort.go:66] Keypair/etcd-peers-ca-events: [] | |
I1212 13:18:57.757074 402540 topological_sort.go:66] Keypair/apiserver-aggregator: [Keypair/apiserver-aggregator-ca] | |
I1212 13:18:57.757101 402540 topological_sort.go:66] SecurityGroup/nodes.kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:57.757108 402540 topological_sort.go:66] VPC/kops.domain.com: [] | |
I1212 13:18:57.757112 402540 topological_sort.go:66] Keypair/kubelet-api: [Keypair/ca] | |
I1212 13:18:57.757117 402540 topological_sort.go:66] kops.domain.com-addons-limit-range.addons.k8s.io: [] | |
I1212 13:18:57.757122 402540 topological_sort.go:66] IAMRole/masters.kops.domain.com: [] | |
I1212 13:18:57.757127 402540 topological_sort.go:66] kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8: [] | |
I1212 13:18:57.757131 402540 topological_sort.go:66] Keypair/etcd-manager-ca-main: [] | |
I1212 13:18:57.757142 402540 topological_sort.go:66] ManagedFile/manifests-etcdmanager-main: [] | |
I1212 13:18:57.757147 402540 topological_sort.go:66] kops.domain.com-addons-bootstrap: [] | |
I1212 13:18:57.757151 402540 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6: [] | |
I1212 13:18:57.757156 402540 topological_sort.go:66] Keypair/etcd-peers-ca-main: [] | |
I1212 13:18:57.757160 402540 topological_sort.go:66] SecurityGroupRule/master-egress: [SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:57.757179 402540 topological_sort.go:66] kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9: [] | |
I1212 13:18:57.757185 402540 topological_sort.go:66] DNSZone/Z237FHI0B4E3ZX: [] | |
I1212 13:18:57.757189 402540 topological_sort.go:66] Secret/kubelet: [] | |
I1212 13:18:57.757194 402540 topological_sort.go:66] Keypair/master: [Keypair/ca] | |
I1212 13:18:57.757199 402540 topological_sort.go:66] InternetGateway/kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:57.757215 402540 topological_sort.go:66] MirrorKeystore/mirror-keystore: [Secret/system:scheduler Secret/system:monitoring Secret/system:controller_manager Secret/kubelet Secret/kube Secret/system:dns Secret/system:logging Secret/admin Secret/kube-proxy] | |
I1212 13:18:57.757223 402540 topological_sort.go:66] Secret/system:scheduler: [] | |
I1212 13:18:57.757229 402540 topological_sort.go:66] SecurityGroupRule/node-to-master-udp-1-65535: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:57.757235 402540 topological_sort.go:66] Secret/system:dns: [] | |
I1212 13:18:57.757239 402540 topological_sort.go:66] IAMInstanceProfileRole/nodes.kops.domain.com: [IAMInstanceProfile/nodes.kops.domain.com IAMRole/nodes.kops.domain.com] | |
I1212 13:18:57.757258 402540 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6: [] | |
I1212 13:18:57.757264 402540 topological_sort.go:66] Secret/system:logging: [] | |
I1212 13:18:57.757269 402540 topological_sort.go:66] IAMRolePolicy/additional.masters.kops.domain.com: [IAMRole/masters.kops.domain.com] | |
I1212 13:18:57.757274 402540 topological_sort.go:66] Keypair/etcd-manager-ca-events: [] | |
I1212 13:18:57.757278 402540 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-2382-4000: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:57.757283 402540 topological_sort.go:66] DHCPOptions/kops.domain.com: [] | |
I1212 13:18:57.757288 402540 topological_sort.go:66] VPCDHCPOptionsAssociation/kops.domain.com: [VPC/kops.domain.com DHCPOptions/kops.domain.com] | |
I1212 13:18:57.757293 402540 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-4003-65535: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:57.757298 402540 topological_sort.go:66] ManagedFile/etcd-cluster-spec-events: [] | |
I1212 13:18:57.757302 402540 topological_sort.go:66] ManagedFile/manifests-etcdmanager-events: [] | |
I1212 13:18:57.757307 402540 topological_sort.go:66] SecurityGroupRule/ssh-external-to-node-0.0.0.0/0: [SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:57.757312 402540 topological_sort.go:66] RouteTableAssociation/us-west-1a.kops.domain.com: [RouteTable/kops.domain.com Subnet/us-west-1a.kops.domain.com] | |
I1212 13:18:57.757317 402540 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12: [] | |
I1212 13:18:57.757321 402540 topological_sort.go:66] IAMInstanceProfile/masters.kops.domain.com: [] | |
I1212 13:18:57.757339 402540 topological_sort.go:66] Keypair/kops: [Keypair/ca] | |
I1212 13:18:57.757345 402540 topological_sort.go:66] Secret/system:controller_manager: [] | |
I1212 13:18:57.757349 402540 topological_sort.go:66] kops.domain.com-addons-core.addons.k8s.io: [] | |
I1212 13:18:57.757354 402540 topological_sort.go:66] IAMRole/nodes.kops.domain.com: [] | |
I1212 13:18:57.757358 402540 topological_sort.go:66] SecurityGroup/masters.kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:57.757363 402540 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-1-2379: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:57.757368 402540 topological_sort.go:66] SecurityGroupRule/all-master-to-node: [SecurityGroup/nodes.kops.domain.com SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:57.757372 402540 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0: [] | |
I1212 13:18:57.757377 402540 topological_sort.go:66] Subnet/us-west-1a.kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:57.757382 402540 topological_sort.go:66] IAMRolePolicy/additional.nodes.kops.domain.com: [IAMRole/nodes.kops.domain.com] | |
I1212 13:18:57.757387 402540 topological_sort.go:66] RouteTable/kops.domain.com: [VPC/kops.domain.com] | |
I1212 13:18:57.757396 402540 topological_sort.go:66] AutoscalingGroup/master-us-west-1a.masters.kops.domain.com: [LaunchConfiguration/master-us-west-1a.masters.kops.domain.com Subnet/us-west-1a.kops.domain.com] | |
I1212 13:18:57.757401 402540 topological_sort.go:66] Keypair/kube-controller-manager: [Keypair/ca] | |
I1212 13:18:57.757422 402540 topological_sort.go:66] Route/0.0.0.0/0: [RouteTable/kops.domain.com InternetGateway/kops.domain.com] | |
I1212 13:18:57.757428 402540 topological_sort.go:66] SecurityGroupRule/node-egress: [SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:57.757433 402540 topological_sort.go:66] Keypair/kubelet: [Keypair/ca] | |
I1212 13:18:57.757438 402540 topological_sort.go:66] Keypair/kube-proxy: [Keypair/ca] | |
I1212 13:18:57.757446 402540 topological_sort.go:66] MirrorSecrets/mirror-secrets: [Secret/system:scheduler Secret/system:monitoring Secret/system:controller_manager Secret/kubelet Secret/system:dns Secret/kube Secret/system:logging Secret/admin Secret/kube-proxy] | |
I1212 13:18:57.757453 402540 topological_sort.go:66] SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2: [] | |
I1212 13:18:57.757459 402540 topological_sort.go:66] IAMInstanceProfileRole/masters.kops.domain.com: [IAMInstanceProfile/masters.kops.domain.com IAMRole/masters.kops.domain.com] | |
I1212 13:18:57.757464 402540 topological_sort.go:66] EBSVolume/a.etcd-events.kops.domain.com: [] | |
I1212 13:18:57.757468 402540 topological_sort.go:66] SecurityGroupRule/all-master-to-master: [SecurityGroup/masters.kops.domain.com SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:57.757473 402540 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6: [] | |
I1212 13:18:57.757478 402540 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6: [] | |
I1212 13:18:57.757482 402540 topological_sort.go:66] Keypair/apiserver-aggregator-ca: [] | |
I1212 13:18:57.757510 402540 topological_sort.go:66] LaunchConfiguration/master-us-west-1a.masters.kops.domain.com: [IAMInstanceProfile/masters.kops.domain.com SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 SecurityGroup/masters.kops.domain.com] | |
I1212 13:18:57.757520 402540 topological_sort.go:66] Keypair/etcd-clients-ca: [] | |
I1212 13:18:57.757526 402540 topological_sort.go:66] IAMRolePolicy/nodes.kops.domain.com: [IAMRole/nodes.kops.domain.com DNSZone/Z237FHI0B4E3ZX] | |
I1212 13:18:57.757531 402540 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0: [] | |
I1212 13:18:57.757536 402540 topological_sort.go:66] Secret/kube: [] | |
I1212 13:18:57.757540 402540 topological_sort.go:66] IAMInstanceProfile/nodes.kops.domain.com: [] | |
I1212 13:18:57.757545 402540 topological_sort.go:66] Secret/admin: [] | |
I1212 13:18:57.757549 402540 topological_sort.go:66] Keypair/ca: [] | |
I1212 13:18:57.757553 402540 topological_sort.go:66] Secret/system:monitoring: [] | |
I1212 13:18:57.757558 402540 topological_sort.go:66] ManagedFile/etcd-cluster-spec-main: [] | |
I1212 13:18:57.757562 402540 topological_sort.go:66] SecurityGroupRule/all-node-to-node: [SecurityGroup/nodes.kops.domain.com SecurityGroup/nodes.kops.domain.com] | |
I1212 13:18:57.757567 402540 topological_sort.go:66] Secret/kube-proxy: [] | |
I1212 13:18:57.757572 402540 topological_sort.go:66] IAMRolePolicy/masters.kops.domain.com: [IAMRole/masters.kops.domain.com DNSZone/Z237FHI0B4E3ZX] | |
I1212 13:18:57.757590 402540 topological_sort.go:66] Keypair/kube-scheduler: [Keypair/ca] | |
I1212 13:18:57.757687 402540 executor.go:103] Tasks: 0 done / 86 total; 44 can run | |
I1212 13:18:57.757778 402540 executor.go:178] Executing task "Keypair/ca": *fitasks.Keypair {"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"} | |
I1212 13:18:57.758018 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:18:57.758369 402540 executor.go:178] Executing task "Secret/kubelet": *fitasks.Secret {"Name":"kubelet","Lifecycle":"Sync"} | |
I1212 13:18:57.758534 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet" | |
I1212 13:18:57.758985 402540 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\": \"dedicated\", \"value\":\n \"master\"}]'\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n kubernetes.io/role: master"}} | |
I1212 13:18:57.759222 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:57.759432 402540 executor.go:178] Executing task "kops.domain.com-addons-core.addons.k8s.io": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-core.addons.k8s.io","Lifecycle":"Sync","Location":"addons/core.addons.k8s.io/v1.4.0.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Namespace\nmetadata:\n name: kube-system"}} | |
I1212 13:18:57.759608 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:57.759816 402540 executor.go:178] Executing task "EBSVolume/a.etcd-main.kops.domain.com": *awstasks.EBSVolume {"Name":"a.etcd-main.kops.domain.com","Lifecycle":"Sync","AvailabilityZone":"us-west-1a","Encrypted":false,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/main":"a/a","k8s.io/role/master":"1","kubernetes.io/cluster/kops.domain.com":"owned"},"VolumeIops":null,"VolumeType":"gp2"} | |
I1212 13:18:57.760093 402540 request_logger.go:45] AWS request: ec2/DescribeVolumes | |
I1212 13:18:57.760254 402540 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.6.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1beta1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1beta1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs"}} | |
I1212 13:18:57.760373 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:57.760662 402540 executor.go:178] Executing task "Keypair/apiserver-aggregator-ca": *fitasks.Keypair {"Name":"apiserver-aggregator-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","type":"ca","format":"v1alpha2"} | |
I1212 13:18:57.760722 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:18:57.760918 402540 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\": \"dedicated\", \"value\":\n \"master\"}]'\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n node-role.kubernetes.io/master: \"\"\n serviceAccount: dns-controller\n tolerations:\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - extensions\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller"}} | |
I1212 13:18:57.761036 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:57.761211 402540 executor.go:178] Executing task "Secret/system:scheduler": *fitasks.Secret {"Name":"system:scheduler","Lifecycle":"Sync"} | |
I1212 13:18:57.761253 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler" | |
I1212 13:18:57.761390 402540 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.15.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - patch\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - update\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:aws-cloud-provider\nsubjects:\n- kind: ServiceAccount\n name: aws-cloud-provider\n namespace: kube-system"}} | |
I1212 13:18:57.761466 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:57.761636 402540 executor.go:178] Executing task "DNSZone/Z237FHI0B4E3ZX": *awstasks.DNSZone {"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null} | |
I1212 13:18:57.761935 402540 request_logger.go:45] AWS request: route53/GetHostedZone | |
I1212 13:18:57.762038 402540 executor.go:178] Executing task "Secret/kube": *fitasks.Secret {"Name":"kube","Lifecycle":"Sync"} | |
I1212 13:18:57.762108 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube" | |
I1212 13:18:57.762259 402540 executor.go:178] Executing task "Keypair/etcd-clients-ca": *fitasks.Keypair {"Name":"etcd-clients-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-clients-ca","type":"ca","format":"v1alpha2"} | |
I1212 13:18:57.762300 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml" | |
I1212 13:18:57.762461 402540 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.12.yaml","Contents":{"Name":"","Resource":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n node-role.kubernetes.io/master: \"\"\n serviceAccount: dns-controller\n tolerations:\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - extensions\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller"}} | |
I1212 13:18:57.762606 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:57.762819 402540 executor.go:178] Executing task "IAMRole/nodes.kops.domain.com": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"} | |
I1212 13:18:57.763034 402540 request_logger.go:45] AWS request: iam/GetRole | |
I1212 13:18:57.763260 402540 executor.go:178] Executing task "IAMRole/masters.kops.domain.com": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"} | |
I1212 13:18:57.763393 402540 request_logger.go:45] AWS request: iam/GetRole | |
I1212 13:18:57.763454 402540 executor.go:178] Executing task "SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2": *awstasks.SSHKey {"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":null} | |
I1212 13:18:57.763599 402540 sshkey.go:109] Computed SSH key fingerprint as "7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45" | |
I1212 13:18:57.763703 402540 request_logger.go:45] AWS request: ec2/DescribeKeyPairs | |
I1212 13:18:57.763950 402540 executor.go:178] Executing task "Secret/admin": *fitasks.Secret {"Name":"admin","Lifecycle":"Sync"} | |
I1212 13:18:57.764018 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin" | |
I1212 13:18:57.764176 402540 executor.go:178] Executing task "Secret/system:controller_manager": *fitasks.Secret {"Name":"system:controller_manager","Lifecycle":"Sync"} | |
I1212 13:18:57.764212 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager" | |
I1212 13:18:57.764345 402540 executor.go:178] Executing task "Keypair/etcd-manager-ca-main": *fitasks.Keypair {"Name":"etcd-manager-ca-main","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-manager-ca-main","type":"ca","format":"v1alpha2"} | |
I1212 13:18:57.764388 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml" | |
I1212 13:18:57.764564 402540 executor.go:178] Executing task "kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8","Lifecycle":"Sync","Location":"addons/rbac.addons.k8s.io/k8s-1.8.yaml","Contents":{"Name":"","Resource":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n addonmanager.kubernetes.io/mode: Reconcile\n k8s-addon: rbac.addons.k8s.io\n kubernetes.io/cluster-service: \"true\"\n name: kubelet-cluster-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:node\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet"}} | |
I1212 13:18:57.764639 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:57.764771 402540 executor.go:178] Executing task "DHCPOptions/kops.domain.com": *awstasks.DHCPOptions {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"DomainName":"us-west-1.compute.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:18:57.765011 402540 request_logger.go:45] AWS request: ec2/DescribeDhcpOptions | |
I1212 13:18:57.765081 402540 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.7.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs"}} | |
I1212 13:18:57.765138 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:57.765287 402540 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --mode=linear\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"min\":2}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns\n spec:\n containers:\n - args:\n - --domain=cluster.local.\n - --dns-port=10053\n - --config-map=kube-dns\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/kubedns-amd64:1.9\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz-kubedns\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n - args:\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-resolv\n - --server=127.0.0.1#10053\n - --log-facility=-\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz-dnsmasq\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 10Mi\n - args:\n - --v=2\n - --logtostderr\n image: k8s.gcr.io/dnsmasq-metrics-amd64:1.0\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq-metrics\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n memory: 10Mi\n - args:\n - --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 \u003e/dev/null\n - --url=/healthz-dnsmasq\n - --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1:10053 \u003e/dev/null\n - --url=/healthz-kubedns\n - --port=8080\n - --quiet\n image: k8s.gcr.io/exechealthz-amd64:1.2\n name: healthz\n ports:\n - containerPort: 8080\n protocol: TCP\n resources:\n limits:\n memory: 50Mi\n requests:\n cpu: 10m\n memory: 50Mi\n dnsPolicy: Default\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns"}} | |
I1212 13:18:57.765451 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:57.765636 402540 executor.go:178] Executing task "IAMInstanceProfile/masters.kops.domain.com": *awstasks.IAMInstanceProfile {"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false} | |
I1212 13:18:57.765784 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1212 13:18:57.765834 402540 executor.go:178] Executing task "kops.domain.com-addons-limit-range.addons.k8s.io": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-limit-range.addons.k8s.io","Lifecycle":"Sync","Location":"addons/limit-range.addons.k8s.io/v1.5.0.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: LimitRange\nmetadata:\n name: limits\n namespace: default\nspec:\n limits:\n - defaultRequest:\n cpu: 100m\n type: Container"}} | |
I1212 13:18:57.765886 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:57.766102 402540 executor.go:178] Executing task "Secret/system:dns": *fitasks.Secret {"Name":"system:dns","Lifecycle":"Sync"} | |
I1212 13:18:57.766144 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns" | |
I1212 13:18:57.766277 402540 executor.go:178] Executing task "Keypair/etcd-manager-ca-events": *fitasks.Keypair {"Name":"etcd-manager-ca-events","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-manager-ca-events","type":"ca","format":"v1alpha2"} | |
I1212 13:18:57.766321 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml" | |
I1212 13:18:57.766479 402540 executor.go:178] Executing task "kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9","Lifecycle":"Sync","Location":"addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml","Contents":{"Name":"","Resource":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: kops:system:kubelet-api-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:kubelet-api-admin\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet-api"}} | |
I1212 13:18:57.766554 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:57.766686 402540 executor.go:178] Executing task "ManagedFile/manifests-etcdmanager-events": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-events","Lifecycle":"Sync","Location":"manifests/etcd/events.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Pod\nmetadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-events\n name: etcd-manager-events\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events\n --client-urls=https://__name__:4002 --cluster-name=etcd-events --containerized=true\n --dns-suffix=.internal.kops.domain.com --etcd-insecure=false --grpc-port=3997\n --insecure=false --peer-urls=https://__name__:2381 --quarantine-client-urls=https://__name__:3995\n --v=6 --volume-name-tag=k8s.io/etcd/events --volume-provider=aws --volume-tag=k8s.io/etcd/events\n --volume-tag=k8s.io/role/master=1 --volume-tag=kubernetes.io/cluster/kops.domain.com=owned\n \u003e /tmp/pipe 2\u003e\u00261\n image: kopeio/etcd-manager:3.0.20190930\n name: etcd-manager\n resources:\n requests:\n cpu: 100m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /etc/hosts\n name: hosts\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /etc/hosts\n type: File\n name: hosts\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-events\n type: DirectoryOrCreate\n name: pki\n - hostPath:\n path: /var/log/etcd-events.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n"}} | |
I1212 13:18:57.766777 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/events.yaml" | |
I1212 13:18:57.766916 402540 executor.go:178] Executing task "ManagedFile/manifests-etcdmanager-main": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-main","Lifecycle":"Sync","Location":"manifests/etcd/main.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Pod\nmetadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-main\n name: etcd-manager-main\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main\n --client-urls=https://__name__:4001 --cluster-name=etcd --containerized=true\n --dns-suffix=.internal.kops.domain.com --etcd-insecure=false --grpc-port=3996\n --insecure=false --peer-urls=https://__name__:2380 --quarantine-client-urls=https://__name__:3994\n --v=6 --volume-name-tag=k8s.io/etcd/main --volume-provider=aws --volume-tag=k8s.io/etcd/main\n --volume-tag=k8s.io/role/master=1 --volume-tag=kubernetes.io/cluster/kops.domain.com=owned\n \u003e /tmp/pipe 2\u003e\u00261\n image: kopeio/etcd-manager:3.0.20190930\n name: etcd-manager\n resources:\n requests:\n cpu: 200m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /etc/hosts\n name: hosts\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /etc/hosts\n type: File\n name: hosts\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-main\n type: DirectoryOrCreate\n name: pki\n - hostPath:\n path: /var/log/etcd.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n"}} | |
I1212 13:18:57.766992 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/main.yaml" | |
I1212 13:18:57.767189 402540 executor.go:178] Executing task "IAMInstanceProfile/nodes.kops.domain.com": *awstasks.IAMInstanceProfile {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false} | |
I1212 13:18:57.767286 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1212 13:18:57.767334 402540 executor.go:178] Executing task "kops.domain.com-addons-bootstrap": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-bootstrap","Lifecycle":"Sync","Location":"addons/bootstrap-channel.yaml","Contents":{"Name":"","Resource":"kind: Addons\nmetadata:\n creationTimestamp: null\n name: bootstrap\nspec:\n addons:\n - manifest: core.addons.k8s.io/v1.4.0.yaml\n manifestHash: 3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90\n name: core.addons.k8s.io\n selector:\n k8s-addon: core.addons.k8s.io\n version: 1.4.0\n - id: pre-k8s-1.6\n kubernetesVersion: \u003c1.6.0\n manifest: kube-dns.addons.k8s.io/pre-k8s-1.6.yaml\n manifestHash: 895c961cb9365cbedb22edd20a7648182ae7ed3f\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.6\n kubernetesVersion: '\u003e=1.6.0 \u003c1.12.0'\n manifest: kube-dns.addons.k8s.io/k8s-1.6.yaml\n manifestHash: 191685ca6fe009302e55512b0eefc5a676433f10\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.12\n kubernetesVersion: '\u003e=1.12.0'\n manifest: kube-dns.addons.k8s.io/k8s-1.12.yaml\n manifestHash: b4dff071aa340fd71650c96f213fdf4b4f799c71\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.8\n kubernetesVersion: '\u003e=1.8.0'\n manifest: rbac.addons.k8s.io/k8s-1.8.yaml\n manifestHash: 5d53ce7b920cd1e8d65d2306d80a041420711914\n name: rbac.addons.k8s.io\n selector:\n k8s-addon: rbac.addons.k8s.io\n version: 1.8.0\n - id: k8s-1.9\n kubernetesVersion: '\u003e=1.9.0'\n manifest: kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml\n manifestHash: e1508d77cb4e527d7a2939babe36dc350dd83745\n name: kubelet-api.rbac.addons.k8s.io\n selector:\n k8s-addon: kubelet-api.rbac.addons.k8s.io\n version: v0.0.1\n - manifest: limit-range.addons.k8s.io/v1.5.0.yaml\n manifestHash: 2ea50e23f1a5aa41df3724630ac25173738cc90c\n name: limit-range.addons.k8s.io\n selector:\n k8s-addon: limit-range.addons.k8s.io\n version: 1.5.0\n - id: pre-k8s-1.6\n kubernetesVersion: \u003c1.6.0\n manifest: dns-controller.addons.k8s.io/pre-k8s-1.6.yaml\n manifestHash: 41097765274e5bd95292ae88bd6e26268c5e8c59\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: k8s-1.6\n kubernetesVersion: '\u003e=1.6.0 \u003c1.12.0'\n manifest: dns-controller.addons.k8s.io/k8s-1.6.yaml\n manifestHash: 079663bb21f764bd016174115a00ad1e4d92e07d\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: k8s-1.12\n kubernetesVersion: '\u003e=1.12.0'\n manifest: dns-controller.addons.k8s.io/k8s-1.12.yaml\n manifestHash: 767f8242c35ba32b19b13234cedf26ac5f554dab\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: v1.15.0\n kubernetesVersion: '\u003e=1.15.0'\n manifest: storage-aws.addons.k8s.io/v1.15.0.yaml\n manifestHash: 23459f7be52d7c818dc060a8bcf5e3565bd87a7b\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n - id: v1.7.0\n kubernetesVersion: '\u003e=1.7.0 \u003c1.15.0'\n manifest: storage-aws.addons.k8s.io/v1.7.0.yaml\n manifestHash: 62705a596142e6cc283280e8aa973e51536994c5\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n - id: v1.6.0\n kubernetesVersion: \u003c1.7.0\n manifest: storage-aws.addons.k8s.io/v1.6.0.yaml\n manifestHash: 7de4b2eb0521d669172038759c521418711d8266\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n"}} | |
I1212 13:18:57.767472 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/bootstrap-channel.yaml" | |
I1212 13:18:57.767627 402540 executor.go:178] Executing task "EBSVolume/a.etcd-events.kops.domain.com": *awstasks.EBSVolume {"Name":"a.etcd-events.kops.domain.com","Lifecycle":"Sync","AvailabilityZone":"us-west-1a","Encrypted":false,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/events":"a/a","k8s.io/role/master":"1","kubernetes.io/cluster/kops.domain.com":"owned"},"VolumeIops":null,"VolumeType":"gp2"} | |
I1212 13:18:57.767752 402540 request_logger.go:45] AWS request: ec2/DescribeVolumes | |
I1212 13:18:57.767808 402540 executor.go:178] Executing task "Keypair/etcd-peers-ca-main": *fitasks.Keypair {"Name":"etcd-peers-ca-main","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-peers-ca-main","type":"ca","format":"v1alpha2"} | |
I1212 13:18:57.767854 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml" | |
I1212 13:18:57.768005 402540 executor.go:178] Executing task "Secret/system:monitoring": *fitasks.Secret {"Name":"system:monitoring","Lifecycle":"Sync"} | |
I1212 13:18:57.768040 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring" | |
I1212 13:18:57.768229 402540 executor.go:178] Executing task "ManagedFile/etcd-cluster-spec-events": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-events","Lifecycle":"Sync","Location":"backups/etcd/events/control/etcd-cluster-spec","Contents":{"Name":"","Resource":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.3.10\"\n}"}} | |
I1212 13:18:57.768282 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events/control/etcd-cluster-spec" | |
I1212 13:18:57.768424 402540 executor.go:178] Executing task "Secret/system:logging": *fitasks.Secret {"Name":"system:logging","Lifecycle":"Sync"} | |
I1212 13:18:57.768458 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging" | |
I1212 13:18:57.768610 402540 executor.go:178] Executing task "Secret/kube-proxy": *fitasks.Secret {"Name":"kube-proxy","Lifecycle":"Sync"} | |
I1212 13:18:57.768644 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy" | |
I1212 13:18:57.768767 402540 executor.go:178] Executing task "Keypair/etcd-peers-ca-events": *fitasks.Keypair {"Name":"etcd-peers-ca-events","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-peers-ca-events","type":"ca","format":"v1alpha2"} | |
I1212 13:18:57.768805 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml" | |
I1212 13:18:57.768941 402540 executor.go:178] Executing task "ManagedFile/etcd-cluster-spec-main": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-main","Lifecycle":"Sync","Location":"backups/etcd/main/control/etcd-cluster-spec","Contents":{"Name":"","Resource":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.3.10\"\n}"}} | |
I1212 13:18:57.768985 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main/control/etcd-cluster-spec" | |
I1212 13:18:57.769109 402540 executor.go:178] Executing task "VPC/kops.domain.com": *awstasks.VPC {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:18:57.769398 402540 request_logger.go:45] AWS request: ec2/DescribeVpcs | |
I1212 13:18:57.769465 402540 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.12.yaml","Contents":{"Name":"","Resource":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns-autoscaler\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n prometheus.io/port: \"10055\"\n prometheus.io/scrape: \"true\"\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-app: kube-dns\n spec:\n affinity:\n podAntiAffinity:\n preferredDuringSchedulingIgnoredDuringExecution:\n - podAffinityTerm:\n labelSelector:\n matchExpressions:\n - key: k8s-app\n operator: In\n values:\n - kube-dns\n topologyKey: kubernetes.io/hostname\n weight: 1\n containers:\n - args:\n - --config-dir=/kube-dns-config\n - --dns-port=10053\n - --domain=cluster.local.\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/kubedns\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n volumeMounts:\n - mountPath: /kube-dns-config\n name: kube-dns-config\n - args:\n - -v=2\n - -logtostderr\n - -configDir=/etc/k8s/dns/dnsmasq-nanny\n - -restartDnsmasq=true\n - --\n - -k\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-negcache\n - --log-facility=-\n - --server=/cluster.local/127.0.0.1#10053\n - --server=/in-addr.arpa/127.0.0.1#10053\n - --server=/in6.arpa/127.0.0.1#10053\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/dnsmasq\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 20Mi\n volumeMounts:\n - mountPath: /etc/k8s/dns/dnsmasq-nanny\n name: kube-dns-config\n - args:\n - --v=2\n - --logtostderr\n - --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A\n - --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A\n image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: sidecar\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 10m\n memory: 20Mi\n dnsPolicy: Default\n serviceAccountName: kube-dns\n volumes:\n - configMap:\n name: kube-dns\n optional: true\n name: kube-dns-config\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n - apps\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kube-dns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: policy/v1beta1\nkind: PodDisruptionBudget\nmetadata:\n name: kube-dns\n namespace: kube-system\nspec:\n minAvailable: 1\n selector:\n matchLabels:\n k8s-app: kube-dns"}} | |
I1212 13:18:57.769675 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:57.769816 402540 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":"{}\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n prometheus.io/port: \"10055\"\n prometheus.io/scrape: \"true\"\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns\n spec:\n containers:\n - args:\n - --config-dir=/kube-dns-config\n - --dns-port=10053\n - --domain=cluster.local.\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/kubedns\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n volumeMounts:\n - mountPath: /kube-dns-config\n name: kube-dns-config\n - args:\n - -v=2\n - -logtostderr\n - -configDir=/etc/k8s/dns/dnsmasq-nanny\n - -restartDnsmasq=true\n - --\n - -k\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-negcache\n - --log-facility=-\n - --server=/cluster.local/127.0.0.1#10053\n - --server=/in-addr.arpa/127.0.0.1#10053\n - --server=/in6.arpa/127.0.0.1#10053\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/dnsmasq\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 20Mi\n volumeMounts:\n - mountPath: /etc/k8s/dns/dnsmasq-nanny\n name: kube-dns-config\n - args:\n - --v=2\n - --logtostderr\n - --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A\n - --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A\n image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: sidecar\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 10m\n memory: 20Mi\n dnsPolicy: Default\n serviceAccountName: kube-dns\n volumes:\n - configMap:\n name: kube-dns\n optional: true\n name: kube-dns-config\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kube-dns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system"}} | |
I1212 13:18:57.769988 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:57.841411 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:57.841469 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/" | |
I1212 13:18:57.928318 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet" | |
I1212 13:18:57.943663 402540 ebsvolume.go:140] Creating PersistentVolume with Name:"a.etcd-main.kops.domain.com" | |
I1212 13:18:57.944141 402540 request_logger.go:45] AWS request: ec2/CreateVolume | |
I1212 13:18:58.084373 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:58.084438 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.084456 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.126028 402540 sshkey.go:135] Creating SSHKey with Name:"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2" | |
I1212 13:18:58.126764 402540 request_logger.go:45] AWS request: ec2/ImportKeyPair | |
I1212 13:18:58.172720 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/core.addons.k8s.io/v1.4.0.yaml" | |
I1212 13:18:58.172827 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.172890 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/core.addons.k8s.io/v1.4.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.184645 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.184773 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator-ca/" | |
I1212 13:18:58.186741 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" | |
I1212 13:18:58.186873 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.186899 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.189016 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin" | |
I1212 13:18:58.190650 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/rbac.addons.k8s.io/k8s-1.8.yaml" | |
I1212 13:18:58.190705 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.190771 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/rbac.addons.k8s.io/k8s-1.8.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.192165 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/main.yaml" | |
I1212 13:18:58.192216 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.192238 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/manifests/etcd/main.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.193630 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging" | |
I1212 13:18:58.198414 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.198480 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-events/" | |
I1212 13:18:58.200445 402540 iamrole.go:144] Creating IAMRole with Name:"nodes.kops.domain.com" | |
I1212 13:18:58.200940 402540 request_logger.go:45] AWS request: iam/CreateRole | |
I1212 13:18:58.207568 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:58.207635 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.207657 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.215685 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy" | |
I1212 13:18:58.224538 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager" | |
I1212 13:18:58.225656 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.225756 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-clients-ca/" | |
I1212 13:18:58.227068 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main/control/etcd-cluster-spec" | |
I1212 13:18:58.227124 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.227145 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/backups/etcd/main/control/etcd-cluster-spec" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.228929 402540 iaminstanceprofile.go:114] Creating IAMInstanceProfile with Name:"masters.kops.domain.com" | |
I1212 13:18:58.229259 402540 request_logger.go:45] AWS request: iam/CreateInstanceProfile | |
I1212 13:18:58.229950 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.229999 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-main/" | |
I1212 13:18:58.231461 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" | |
I1212 13:18:58.231543 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.231569 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.233104 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.7.0.yaml" | |
I1212 13:18:58.233159 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.233182 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/storage-aws.addons.k8s.io/v1.7.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.234470 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" | |
I1212 13:18:58.234632 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.234655 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.235181 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring" | |
I1212 13:18:58.235705 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler" | |
I1212 13:18:58.236104 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.236126 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-events/" | |
I1212 13:18:58.236588 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube" | |
I1212 13:18:58.237034 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/bootstrap-channel.yaml" | |
I1212 13:18:58.237059 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.237065 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/bootstrap-channel.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.237569 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" | |
I1212 13:18:58.237623 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.237630 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.238123 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns" | |
I1212 13:18:58.238571 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/events.yaml" | |
I1212 13:18:58.238613 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.238623 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/manifests/etcd/events.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.239148 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: [] | |
I1212 13:18:58.239171 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:18:58.239599 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:58.239621 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.239627 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.240178 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" | |
I1212 13:18:58.240200 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.240206 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.244022 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet" | |
I1212 13:18:58.248513 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml" | |
I1212 13:18:58.248541 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.248548 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.255532 402540 iamrole.go:144] Creating IAMRole with Name:"masters.kops.domain.com" | |
I1212 13:18:58.255743 402540 request_logger.go:45] AWS request: iam/CreateRole | |
I1212 13:18:58.257071 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.257098 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-main/" | |
I1212 13:18:58.268719 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events/control/etcd-cluster-spec" | |
I1212 13:18:58.268782 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.268791 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/backups/etcd/events/control/etcd-cluster-spec" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.273350 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca: [] | |
I1212 13:18:58.273390 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:18:58.275095 402540 iaminstanceprofile.go:114] Creating IAMInstanceProfile with Name:"nodes.kops.domain.com" | |
I1212 13:18:58.275206 402540 request_logger.go:45] AWS request: iam/CreateInstanceProfile | |
I1212 13:18:58.286720 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml" | |
I1212 13:18:58.286780 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.286804 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.290236 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events: [] | |
I1212 13:18:58.290270 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml" | |
I1212 13:18:58.320677 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.320773 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/" | |
I1212 13:18:58.325888 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet" | |
I1212 13:18:58.325952 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.325965 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/kubelet" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.338621 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1212 13:18:58.339690 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main: [] | |
I1212 13:18:58.339730 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml" | |
I1212 13:18:58.340683 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events: [] | |
I1212 13:18:58.340757 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml" | |
I1212 13:18:58.350629 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca: [] | |
I1212 13:18:58.350664 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml" | |
I1212 13:18:58.354558 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.354615 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator-ca/" | |
I1212 13:18:58.372939 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main: [] | |
I1212 13:18:58.373000 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml" | |
I1212 13:18:58.375645 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.375688 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-events/" | |
I1212 13:18:58.385968 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1212 13:18:58.424197 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.424254 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-events/" | |
I1212 13:18:58.427666 402540 dhcp_options.go:142] Creating DHCPOptions with Name:"kops.domain.com" | |
I1212 13:18:58.428025 402540 request_logger.go:45] AWS request: ec2/CreateDhcpOptions | |
I1212 13:18:58.429439 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.429475 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-main/" | |
I1212 13:18:58.432877 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.432927 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-clients-ca/" | |
I1212 13:18:58.433658 402540 iaminstanceprofile.go:144] Found IAM instance profile "masters.kops.domain.com" | |
I1212 13:18:58.442554 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: [] | |
I1212 13:18:58.443024 402540 keypair.go:181] creating brand new certificate | |
I1212 13:18:58.443045 402540 keypair.go:201] Creating PKI keypair "ca" | |
I1212 13:18:58.443091 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:18:58.445154 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca: [] | |
I1212 13:18:58.445273 402540 keypair.go:181] creating brand new certificate | |
I1212 13:18:58.445311 402540 keypair.go:201] Creating PKI keypair "apiserver-aggregator-ca" | |
I1212 13:18:58.445330 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:18:58.446732 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet" | |
I1212 13:18:58.447109 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin" | |
I1212 13:18:58.467125 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events: [] | |
I1212 13:18:58.467325 402540 keypair.go:181] creating brand new certificate | |
I1212 13:18:58.467365 402540 keypair.go:201] Creating PKI keypair "etcd-peers-ca-events" | |
I1212 13:18:58.467390 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml" | |
I1212 13:18:58.479615 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.479659 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-main/" | |
I1212 13:18:58.502123 402540 iaminstanceprofile.go:144] Found IAM instance profile "nodes.kops.domain.com" | |
I1212 13:18:58.515119 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events: [] | |
I1212 13:18:58.515262 402540 keypair.go:181] creating brand new certificate | |
I1212 13:18:58.515272 402540 keypair.go:201] Creating PKI keypair "etcd-manager-ca-events" | |
I1212 13:18:58.515290 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml" | |
I1212 13:18:58.521640 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main: [] | |
I1212 13:18:58.521814 402540 keypair.go:181] creating brand new certificate | |
I1212 13:18:58.521858 402540 keypair.go:201] Creating PKI keypair "etcd-manager-ca-main" | |
I1212 13:18:58.521879 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml" | |
I1212 13:18:58.522530 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca: [] | |
I1212 13:18:58.522621 402540 keypair.go:181] creating brand new certificate | |
I1212 13:18:58.522632 402540 keypair.go:201] Creating PKI keypair "etcd-clients-ca" | |
I1212 13:18:58.522643 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml" | |
I1212 13:18:58.526816 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.526865 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator-ca/" | |
I1212 13:18:58.528779 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.528802 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/" | |
I1212 13:18:58.544120 402540 vpc.go:155] Creating VPC with CIDR: "172.20.0.0/16" | |
I1212 13:18:58.544281 402540 request_logger.go:45] AWS request: ec2/CreateVpc | |
I1212 13:18:58.548361 402540 ebsvolume.go:140] Creating PersistentVolume with Name:"a.etcd-events.kops.domain.com" | |
I1212 13:18:58.548658 402540 request_logger.go:45] AWS request: ec2/CreateVolume | |
I1212 13:18:58.552021 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.552060 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-events/" | |
I1212 13:18:58.571362 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin" | |
I1212 13:18:58.571404 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.571411 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/admin" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.583943 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main: [] | |
I1212 13:18:58.584079 402540 keypair.go:181] creating brand new certificate | |
I1212 13:18:58.584090 402540 keypair.go:201] Creating PKI keypair "etcd-peers-ca-main" | |
I1212 13:18:58.584107 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml" | |
I1212 13:18:58.600125 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.600166 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-events/" | |
I1212 13:18:58.602646 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.602687 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-main/" | |
I1212 13:18:58.605622 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.605659 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-clients-ca/" | |
I1212 13:18:58.615839 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca: [] | |
I1212 13:18:58.615898 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:18:58.619197 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: [] | |
I1212 13:18:58.619236 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:18:58.641646 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events: [] | |
I1212 13:18:58.641710 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml" | |
I1212 13:18:58.691334 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main: [] | |
I1212 13:18:58.691435 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml" | |
I1212 13:18:58.695534 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events: [] | |
I1212 13:18:58.695575 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml" | |
I1212 13:18:58.696274 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.696296 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator-ca/" | |
I1212 13:18:58.696659 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca: [] | |
I1212 13:18:58.696698 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml" | |
I1212 13:18:58.703537 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.703580 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/" | |
I1212 13:18:58.718264 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.718303 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-main/" | |
I1212 13:18:58.719901 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin" | |
I1212 13:18:58.720211 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging" | |
I1212 13:18:58.723875 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.723923 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-events/" | |
I1212 13:18:58.750253 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:18:58.764958 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:18:58.780949 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.781026 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-clients-ca/" | |
I1212 13:18:58.781620 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.781641 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-events/" | |
I1212 13:18:58.786783 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca: [] | |
I1212 13:18:58.786847 402540 keypair.go:212] Creating privateKey "apiserver-aggregator-ca" | |
I1212 13:18:58.796907 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: [] | |
I1212 13:18:58.796963 402540 keypair.go:212] Creating privateKey "ca" | |
I1212 13:18:58.882355 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging" | |
I1212 13:18:58.882402 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:58.882409 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:logging" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:58.882917 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:58.882941 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-main/" | |
I1212 13:18:58.883175 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main: [] | |
I1212 13:18:58.883196 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml" | |
I1212 13:18:58.883638 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events: [] | |
I1212 13:18:58.883657 402540 keypair.go:212] Creating privateKey "etcd-peers-ca-events" | |
I1212 13:18:58.903230 402540 request_logger.go:45] AWS request: ec2/ModifyVpcAttribute | |
I1212 13:18:58.922814 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events: [] | |
I1212 13:18:58.922854 402540 keypair.go:212] Creating privateKey "etcd-manager-ca-events" | |
I1212 13:18:58.943003 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca: [] | |
I1212 13:18:58.943042 402540 keypair.go:212] Creating privateKey "etcd-clients-ca" | |
I1212 13:18:59.084843 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging" | |
I1212 13:18:59.105234 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:18:59.105565 402540 aws_cloud.go:885] adding tags to "dopt-01319dcd27f03a4e7": map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned] | |
I1212 13:18:59.105698 402540 request_logger.go:45] AWS request: ec2/CreateTags | |
I1212 13:18:59.106235 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy" | |
I1212 13:18:59.185717 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method | |
I1212 13:18:59.185759 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-main/" | |
I1212 13:18:59.266291 402540 request_logger.go:45] AWS request: ec2/ModifyVpcAttribute | |
I1212 13:18:59.286370 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy" | |
I1212 13:18:59.286411 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:59.286418 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/kube-proxy" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:18:59.286935 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main: [] | |
I1212 13:18:59.286989 402540 keypair.go:212] Creating privateKey "etcd-manager-ca-main" | |
I1212 13:18:59.468053 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main: [] | |
I1212 13:18:59.468143 402540 keypair.go:212] Creating privateKey "etcd-peers-ca-main" | |
I1212 13:18:59.629194 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy" | |
I1212 13:18:59.629773 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager" | |
I1212 13:18:59.770219 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:18:59.851011 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager" | |
I1212 13:18:59.851051 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:18:59.851058 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:controller_manager" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:00.092462 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager" | |
I1212 13:19:00.092972 402540 aws_cloud.go:885] adding tags to "vpc-00d891ddc03f86a0d": map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned] | |
I1212 13:19:00.093563 402540 request_logger.go:45] AWS request: ec2/CreateTags | |
I1212 13:19:00.223209 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring" | |
I1212 13:19:00.337152 402540 vfs_castore.go:729] Issuing new certificate: "ca" | |
I1212 13:19:00.340089 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/ca/" | |
I1212 13:19:00.435021 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring" | |
I1212 13:19:00.435063 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:00.435070 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:monitoring" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:00.535684 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca: [] | |
I1212 13:19:00.537368 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca/keyset.yaml" | |
I1212 13:19:00.537397 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:00.537403 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:00.558531 402540 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events" | |
I1212 13:19:00.561623 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-events/" | |
I1212 13:19:00.565913 402540 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main" | |
I1212 13:19:00.569302 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-main/" | |
I1212 13:19:00.695190 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring" | |
I1212 13:19:00.727099 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca/6769541653117930842419943971.key" | |
I1212 13:19:00.727156 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:00.727163 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/ca/6769541653117930842419943971.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:00.747351 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube" | |
I1212 13:19:00.908608 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main: [] | |
I1212 13:19:00.909439 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml" | |
I1212 13:19:00.909467 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:00.909474 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:00.910135 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events: [] | |
I1212 13:19:00.910755 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml" | |
I1212 13:19:00.910779 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:00.910785 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:00.947628 402540 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca" | |
I1212 13:19:01.012047 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator-ca/" | |
I1212 13:19:01.041532 402540 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main" | |
I1212 13:19:01.044531 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-main/" | |
I1212 13:19:01.160139 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/" | |
I1212 13:19:01.220654 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube" | |
I1212 13:19:01.220696 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.220704 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/kube" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.240829 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/6769541654068767872896778382.key" | |
I1212 13:19:01.240925 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.240933 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-peers-ca-events/6769541654068767872896778382.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.271165 402540 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events" | |
I1212 13:19:01.274194 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-events/" | |
I1212 13:19:01.291030 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/6769541654100469646585949542.key" | |
I1212 13:19:01.291121 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.291134 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-peers-ca-main/6769541654100469646585949542.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.311274 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca: [] | |
I1212 13:19:01.312619 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:19:01.312665 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.312678 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.351472 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: [] | |
I1212 13:19:01.351984 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:19:01.352014 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.352020 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.352634 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main: [] | |
I1212 13:19:01.353300 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml" | |
I1212 13:19:01.353324 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.353330 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.391687 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events: [] | |
I1212 13:19:01.392399 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml" | |
I1212 13:19:01.392426 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.392433 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.405372 402540 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca" | |
I1212 13:19:01.408483 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-clients-ca/" | |
I1212 13:19:01.408967 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube" | |
I1212 13:19:01.409373 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-events/" | |
I1212 13:19:01.409796 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-main/" | |
I1212 13:19:01.410025 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler" | |
I1212 13:19:01.433578 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/6769541655739911076839554713.key" | |
I1212 13:19:01.433667 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.433706 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-aggregator-ca/6769541655739911076839554713.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.454511 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/6769541653117930842419943971.crt" | |
I1212 13:19:01.454593 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.454605 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/ca/6769541653117930842419943971.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.501119 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main: [] | |
I1212 13:19:01.501777 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml" | |
I1212 13:19:01.501808 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.501815 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.502259 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca: [] | |
I1212 13:19:01.503217 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml" | |
I1212 13:19:01.503243 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.503250 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.503848 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events: [] | |
I1212 13:19:01.504248 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml" | |
I1212 13:19:01.504269 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.504275 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.516695 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler" | |
I1212 13:19:01.516736 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.516743 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:scheduler" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.555625 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/6769541657129516105216232352.key" | |
I1212 13:19:01.555708 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.555723 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-manager-ca-events/6769541657129516105216232352.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.558994 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator-ca/" | |
I1212 13:19:01.576643 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/6769541656143224891204151388.key" | |
I1212 13:19:01.576730 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.576747 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-manager-ca-main/6769541656143224891204151388.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.593736 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/6769541653117930842419943971.crt" | |
I1212 13:19:01.604696 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/6769541657705913373071748751.key" | |
I1212 13:19:01.604738 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.604745 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-clients-ca/6769541657705913373071748751.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.656877 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca: [] | |
I1212 13:19:01.657892 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:19:01.657932 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.657967 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.678664 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler" | |
I1212 13:19:01.679088 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns" | |
I1212 13:19:01.681167 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:01.681274 402540 keypair.go:230] created certificate with cn=kubernetes | |
I1212 13:19:01.691634 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-main/" | |
I1212 13:19:01.692192 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-events/" | |
I1212 13:19:01.698660 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/6769541654068767872896778382.crt" | |
I1212 13:19:01.698774 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.698816 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-peers-ca-events/6769541654068767872896778382.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.699756 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/6769541654100469646585949542.crt" | |
I1212 13:19:01.699828 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.699844 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-peers-ca-main/6769541654100469646585949542.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.729572 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-clients-ca/" | |
I1212 13:19:01.764603 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns" | |
I1212 13:19:01.764691 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.764710 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:dns" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.784339 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events: [] | |
I1212 13:19:01.785320 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml" | |
I1212 13:19:01.785360 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.785372 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.786340 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main: [] | |
I1212 13:19:01.787146 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml" | |
I1212 13:19:01.787181 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.787214 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.804514 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/6769541654100469646585949542.crt" | |
I1212 13:19:01.825082 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca: [] | |
I1212 13:19:01.826032 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml" | |
I1212 13:19:01.826071 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.826082 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.891245 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:01.891430 402540 keypair.go:230] created certificate with cn=etcd-peers-ca-main | |
I1212 13:19:01.894593 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/6769541655739911076839554713.crt" | |
I1212 13:19:01.894672 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.894701 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-aggregator-ca/6769541655739911076839554713.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.895253 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/6769541654068767872896778382.crt" | |
I1212 13:19:01.895627 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/6769541657129516105216232352.crt" | |
I1212 13:19:01.895648 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.895672 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-manager-ca-events/6769541657129516105216232352.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.897319 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns" | |
I1212 13:19:01.935530 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/6769541656143224891204151388.crt" | |
I1212 13:19:01.935616 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.935630 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-manager-ca-main/6769541656143224891204151388.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.938966 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/6769541657705913373071748751.crt" | |
I1212 13:19:01.939003 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:01.939014 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-clients-ca/6769541657705913373071748751.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:01.983260 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:01.983514 402540 keypair.go:230] created certificate with cn=etcd-peers-ca-events | |
I1212 13:19:02.012805 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/6769541657129516105216232352.crt" | |
I1212 13:19:02.036724 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/6769541656143224891204151388.crt" | |
I1212 13:19:02.041866 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/6769541657705913373071748751.crt" | |
I1212 13:19:02.044222 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/6769541655739911076839554713.crt" | |
I1212 13:19:02.100371 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:02.100836 402540 keypair.go:230] created certificate with cn=etcd-manager-ca-events | |
I1212 13:19:02.126421 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:02.126729 402540 keypair.go:230] created certificate with cn=etcd-manager-ca-main | |
I1212 13:19:02.129050 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:02.129184 402540 keypair.go:230] created certificate with cn=apiserver-aggregator-ca | |
I1212 13:19:02.130014 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:02.130135 402540 keypair.go:230] created certificate with cn=etcd-clients-ca | |
I1212 13:19:02.130187 402540 executor.go:103] Tasks: 44 done / 86 total; 24 can run | |
I1212 13:19:02.130263 402540 executor.go:178] Executing task "Keypair/kubelet": *fitasks.Keypair {"Name":"kubelet","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:nodes,cn=kubelet","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.130456 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml" | |
I1212 13:19:02.131009 402540 executor.go:178] Executing task "SecurityGroup/nodes.kops.domain.com": *awstasks.SecurityGroup {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:19:02.131546 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:02.131855 402540 executor.go:178] Executing task "Keypair/kube-scheduler": *fitasks.Keypair {"Name":"kube-scheduler","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-scheduler","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.131957 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml" | |
I1212 13:19:02.132368 402540 executor.go:178] Executing task "MirrorKeystore/mirror-keystore": *fitasks.MirrorKeystore {"Name":"mirror-keystore","Lifecycle":null,"MirrorPath":{}} | |
I1212 13:19:02.132589 402540 executor.go:178] Executing task "Keypair/kube-controller-manager": *fitasks.Keypair {"Name":"kube-controller-manager","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-controller-manager","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.132708 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml" | |
I1212 13:19:02.133524 402540 executor.go:178] Executing task "IAMRolePolicy/masters.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","Role":{"ID":"AROASIGZOYE6FSORTVHV4","Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"kops.domain.com","creationTimestamp":"2019-12-12T13:18:38Z"},"spec":{"channel":"stable","configBase":"s3://kops-domain-com-state-store/kops.domain.com","cloudProvider":"aws","kubernetesVersion":"1.15.5","subnets":[{"name":"us-west-1a","cidr":"172.20.32.0/19","zone":"us-west-1a","type":"Public"}],"masterPublicName":"api.kops.domain.com","masterInternalName":"api.internal.kops.domain.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://kops-domain-com-state-store/kops.domain.com/secrets","keyStore":"s3://kops-domain-com-state-store/kops.domain.com/pki","configStore":"s3://kops-domain-com-state-store/kops.domain.com","dnsZone":"Z237FHI0B4E3ZX","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"100m"}],"docker":{"ipMasq":false,"ipTables":false,"logDriver":"json-file","logLevel":"warn","logOpt":["max-size=10m","max-file=5"],"storage":"overlay2,overlay,aufs","version":"18.06.3"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.15.5","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"bindAddress":"0.0.0.0","insecureBindAddress":"127.0.0.1","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.15.5","cloudProvider":"aws","clusterName":"kops.domain.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.15.5","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.15.5","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-west-1","ResourceARN":null,"Role":"Master"},"DNSZone":{"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":"kops.domain.com","ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}}} | |
I1212 13:19:02.134553 402540 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1212 13:19:02.134814 402540 executor.go:178] Executing task "Subnet/us-west-1a.kops.domain.com": *awstasks.Subnet {"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}} | |
I1212 13:19:02.135854 402540 request_logger.go:45] AWS request: ec2/DescribeSubnets | |
I1212 13:19:02.136088 402540 executor.go:178] Executing task "Keypair/kubecfg": *fitasks.Keypair {"Name":"kubecfg","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:masters,cn=kubecfg","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.136197 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml" | |
I1212 13:19:02.136615 402540 executor.go:178] Executing task "Keypair/kubelet-api": *fitasks.Keypair {"Name":"kubelet-api","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=kubelet-api","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.136687 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml" | |
I1212 13:19:02.136955 402540 executor.go:178] Executing task "IAMInstanceProfileRole/masters.kops.domain.com": *awstasks.IAMInstanceProfileRole {"Name":"masters.kops.domain.com","Lifecycle":"Sync","InstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6MELARRFSZ","Shared":false},"Role":{"ID":"AROASIGZOYE6FSORTVHV4","Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}} | |
I1212 13:19:02.137813 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1212 13:19:02.137981 402540 executor.go:178] Executing task "SecurityGroup/masters.kops.domain.com": *awstasks.SecurityGroup {"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:19:02.138250 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:02.138829 402540 executor.go:178] Executing task "IAMRolePolicy/additional.nodes.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.nodes.kops.domain.com","Role":{"ID":"AROASIGZOYE6EQAA42QHP","Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Name":"","Resource":""}} | |
I1212 13:19:02.139181 402540 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1212 13:19:02.139633 402540 executor.go:178] Executing task "VPCDHCPOptionsAssociation/kops.domain.com": *awstasks.VPCDHCPOptionsAssociation {"Name":"kops.domain.com","Lifecycle":"Sync","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"DHCPOptions":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"dopt-01319dcd27f03a4e7","DomainName":"us-west-1.compute.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}} | |
I1212 13:19:02.139871 402540 aws_cloud.go:1141] Calling DescribeVPC for VPC "vpc-00d891ddc03f86a0d" | |
I1212 13:19:02.140010 402540 request_logger.go:45] AWS request: ec2/DescribeVpcs | |
I1212 13:19:02.140131 402540 executor.go:178] Executing task "Keypair/kube-proxy": *fitasks.Keypair {"Name":"kube-proxy","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-proxy","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.140217 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml" | |
I1212 13:19:02.140749 402540 executor.go:178] Executing task "IAMInstanceProfileRole/nodes.kops.domain.com": *awstasks.IAMInstanceProfileRole {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","InstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6M4L7A7DKZ","Shared":false},"Role":{"ID":"AROASIGZOYE6EQAA42QHP","Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}} | |
I1212 13:19:02.141020 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile | |
I1212 13:19:02.141142 402540 executor.go:178] Executing task "Keypair/master": *fitasks.Keypair {"Name":"master","alternateNames":["kubernetes","kubernetes.default","kubernetes.default.svc","kubernetes.default.svc.cluster.local","api.kops.domain.com","api.internal.kops.domain.com","100.64.0.1","127.0.0.1"],"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=kubernetes-master","type":"server","format":"v1alpha2"} | |
I1212 13:19:02.141233 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml" | |
I1212 13:19:02.141689 402540 executor.go:178] Executing task "MirrorSecrets/mirror-secrets": *fitasks.MirrorSecrets {"Name":"mirror-secrets","Lifecycle":null,"MirrorPath":{}} | |
I1212 13:19:02.141894 402540 executor.go:178] Executing task "InternetGateway/kops.domain.com": *awstasks.InternetGateway {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}} | |
I1212 13:19:02.142273 402540 request_logger.go:45] AWS request: ec2/DescribeInternetGateways | |
I1212 13:19:02.142394 402540 executor.go:178] Executing task "IAMRolePolicy/nodes.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","Role":{"ID":"AROASIGZOYE6EQAA42QHP","Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"kops.domain.com","creationTimestamp":"2019-12-12T13:18:38Z"},"spec":{"channel":"stable","configBase":"s3://kops-domain-com-state-store/kops.domain.com","cloudProvider":"aws","kubernetesVersion":"1.15.5","subnets":[{"name":"us-west-1a","cidr":"172.20.32.0/19","zone":"us-west-1a","type":"Public"}],"masterPublicName":"api.kops.domain.com","masterInternalName":"api.internal.kops.domain.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://kops-domain-com-state-store/kops.domain.com/secrets","keyStore":"s3://kops-domain-com-state-store/kops.domain.com/pki","configStore":"s3://kops-domain-com-state-store/kops.domain.com","dnsZone":"Z237FHI0B4E3ZX","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"100m"}],"docker":{"ipMasq":false,"ipTables":false,"logDriver":"json-file","logLevel":"warn","logOpt":["max-size=10m","max-file=5"],"storage":"overlay2,overlay,aufs","version":"18.06.3"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.15.5","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"bindAddress":"0.0.0.0","insecureBindAddress":"127.0.0.1","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.15.5","cloudProvider":"aws","clusterName":"kops.domain.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.15.5","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.15.5","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-west-1","ResourceARN":null,"Role":"Node"},"DNSZone":{"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":"kops.domain.com","ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}}} | |
I1212 13:19:02.143049 402540 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1212 13:19:02.143170 402540 executor.go:178] Executing task "RouteTable/kops.domain.com": *awstasks.RouteTable {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}} | |
I1212 13:19:02.143490 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1212 13:19:02.143627 402540 executor.go:178] Executing task "Keypair/apiserver-aggregator": *fitasks.Keypair {"Name":"apiserver-aggregator","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"apiserver-aggregator-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","type":"ca","format":"v1alpha2"},"subject":"cn=aggregator","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.143749 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml" | |
I1212 13:19:02.144238 402540 executor.go:178] Executing task "IAMRolePolicy/additional.masters.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.masters.kops.domain.com","Role":{"ID":"AROASIGZOYE6FSORTVHV4","Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Name":"","Resource":""}} | |
I1212 13:19:02.144432 402540 request_logger.go:45] AWS request: iam/GetRolePolicy | |
I1212 13:19:02.144591 402540 executor.go:178] Executing task "Keypair/kops": *fitasks.Keypair {"Name":"kops","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:masters,cn=kops","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.144672 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml" | |
I1212 13:19:02.145204 402540 executor.go:178] Executing task "Keypair/apiserver-proxy-client": *fitasks.Keypair {"Name":"apiserver-proxy-client","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=apiserver-proxy-client","type":"client","format":"v1alpha2"} | |
I1212 13:19:02.145298 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml" | |
I1212 13:19:02.215124 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.215181 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-scheduler/" | |
I1212 13:19:02.217176 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.217215 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet/" | |
I1212 13:19:02.242115 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.242164 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.242205 402540 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.242806 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.242826 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.242881 402540 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.243206 402540 iamrolepolicy.go:147] Creating IAMRolePolicy | |
I1212 13:19:02.243220 402540 iamrolepolicy.go:175] PutRolePolicy RoleName=masters.kops.domain.com PolicyName=masters.kops.domain.com: { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ec2:DescribeAccountAttributes", | |
"ec2:DescribeInstances", | |
"ec2:DescribeInternetGateways", | |
"ec2:DescribeRegions", | |
"ec2:DescribeRouteTables", | |
"ec2:DescribeSecurityGroups", | |
"ec2:DescribeSubnets", | |
"ec2:DescribeVolumes" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ec2:CreateSecurityGroup", | |
"ec2:CreateTags", | |
"ec2:CreateVolume", | |
"ec2:DescribeVolumesModifications", | |
"ec2:ModifyInstanceAttribute", | |
"ec2:ModifyVolume" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ec2:AttachVolume", | |
"ec2:AuthorizeSecurityGroupIngress", | |
"ec2:CreateRoute", | |
"ec2:DeleteRoute", | |
"ec2:DeleteSecurityGroup", | |
"ec2:DeleteVolume", | |
"ec2:DetachVolume", | |
"ec2:RevokeSecurityGroupIngress" | |
], | |
"Resource": [ | |
"*" | |
], | |
"Condition": { | |
"StringEquals": { | |
"ec2:ResourceTag/KubernetesCluster": "kops.domain.com" | |
} | |
} | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"autoscaling:DescribeAutoScalingGroups", | |
"autoscaling:DescribeLaunchConfigurations", | |
"autoscaling:DescribeTags", | |
"ec2:DescribeLaunchTemplateVersions" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"autoscaling:SetDesiredCapacity", | |
"autoscaling:TerminateInstanceInAutoScalingGroup", | |
"autoscaling:UpdateAutoScalingGroup" | |
], | |
"Resource": [ | |
"*" | |
], | |
"Condition": { | |
"StringEquals": { | |
"autoscaling:ResourceTag/KubernetesCluster": "kops.domain.com" | |
} | |
} | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"elasticloadbalancing:AddTags", | |
"elasticloadbalancing:AttachLoadBalancerToSubnets", | |
"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer", | |
"elasticloadbalancing:CreateLoadBalancer", | |
"elasticloadbalancing:CreateLoadBalancerPolicy", | |
"elasticloadbalancing:CreateLoadBalancerListeners", | |
"elasticloadbalancing:ConfigureHealthCheck", | |
"elasticloadbalancing:DeleteLoadBalancer", | |
"elasticloadbalancing:DeleteLoadBalancerListeners", | |
"elasticloadbalancing:DescribeLoadBalancers", | |
"elasticloadbalancing:DescribeLoadBalancerAttributes", | |
"elasticloadbalancing:DetachLoadBalancerFromSubnets", | |
"elasticloadbalancing:DeregisterInstancesFromLoadBalancer", | |
"elasticloadbalancing:ModifyLoadBalancerAttributes", | |
"elasticloadbalancing:RegisterInstancesWithLoadBalancer", | |
"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ec2:DescribeVpcs", | |
"elasticloadbalancing:AddTags", | |
"elasticloadbalancing:CreateListener", | |
"elasticloadbalancing:CreateTargetGroup", | |
"elasticloadbalancing:DeleteListener", | |
"elasticloadbalancing:DeleteTargetGroup", | |
"elasticloadbalancing:DeregisterTargets", | |
"elasticloadbalancing:DescribeListeners", | |
"elasticloadbalancing:DescribeLoadBalancerPolicies", | |
"elasticloadbalancing:DescribeTargetGroups", | |
"elasticloadbalancing:DescribeTargetHealth", | |
"elasticloadbalancing:ModifyListener", | |
"elasticloadbalancing:ModifyTargetGroup", | |
"elasticloadbalancing:RegisterTargets", | |
"elasticloadbalancing:SetLoadBalancerPoliciesOfListener" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"iam:ListServerCertificates", | |
"iam:GetServerCertificate" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:GetBucketLocation", | |
"s3:GetEncryptionConfiguration", | |
"s3:ListBucket" | |
], | |
"Resource": [ | |
"arn:aws:s3:::kops-domain-com-state-store" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:Get*" | |
], | |
"Resource": "arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/*" | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:GetObject", | |
"s3:DeleteObject", | |
"s3:PutObject" | |
], | |
"Resource": "arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/backups/etcd/main/*" | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:GetObject", | |
"s3:DeleteObject", | |
"s3:PutObject" | |
], | |
"Resource": "arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/backups/etcd/events/*" | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:ChangeResourceRecordSets", | |
"route53:ListResourceRecordSets", | |
"route53:GetHostedZone" | |
], | |
"Resource": [ | |
"arn:aws:route53:::hostedzone/Z237FHI0B4E3ZX" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:GetChange" | |
], | |
"Resource": [ | |
"arn:aws:route53:::change/*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"route53:ListHostedZones" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ecr:GetAuthorizationToken", | |
"ecr:BatchCheckLayerAvailability", | |
"ecr:GetDownloadUrlForLayer", | |
"ecr:GetRepositoryPolicy", | |
"ecr:DescribeRepositories", | |
"ecr:ListImages", | |
"ecr:BatchGetImage" | |
], | |
"Resource": [ | |
"*" | |
] | |
} | |
] | |
} | |
I1212 13:19:02.243623 402540 request_logger.go:45] AWS request: iam/PutRolePolicy | |
I1212 13:19:02.262235 402540 request_logger.go:45] AWS request: iam/AddRoleToInstanceProfile | |
I1212 13:19:02.301161 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.301281 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-controller-manager/" | |
I1212 13:19:02.302999 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.303033 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubecfg/" | |
I1212 13:19:02.373226 402540 request_logger.go:45] AWS request: iam/AddRoleToInstanceProfile | |
I1212 13:19:02.384229 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.384319 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet-api/" | |
I1212 13:19:02.387830 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.387858 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-proxy/" | |
I1212 13:19:02.404448 402540 securitygroup.go:166] Creating SecurityGroup with Name:"nodes.kops.domain.com" VPC:"vpc-00d891ddc03f86a0d" | |
I1212 13:19:02.404656 402540 request_logger.go:45] AWS request: ec2/CreateSecurityGroup | |
I1212 13:19:02.429182 402540 subnet.go:181] Creating Subnet with CIDR: "172.20.32.0/19" | |
I1212 13:19:02.429367 402540 request_logger.go:45] AWS request: ec2/CreateSubnet | |
I1212 13:19:02.462828 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.462872 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.462948 402540 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.463296 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.463344 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.463402 402540 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/" | |
I1212 13:19:02.463706 402540 iamrolepolicy.go:147] Creating IAMRolePolicy | |
I1212 13:19:02.463730 402540 iamrolepolicy.go:175] PutRolePolicy RoleName=nodes.kops.domain.com PolicyName=nodes.kops.domain.com: { | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ec2:DescribeInstances", | |
"ec2:DescribeRegions" | |
], | |
"Resource": [ | |
"*" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:GetBucketLocation", | |
"s3:GetEncryptionConfiguration", | |
"s3:ListBucket" | |
], | |
"Resource": [ | |
"arn:aws:s3:::kops-domain-com-state-store" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"s3:Get*" | |
], | |
"Resource": [ | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/addons/*", | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/cluster.spec", | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/config", | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/instancegroup/*", | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/pki/issued/*", | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/*", | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/*", | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/pki/ssh/*", | |
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/secrets/dockerconfig" | |
] | |
}, | |
{ | |
"Effect": "Allow", | |
"Action": [ | |
"ecr:GetAuthorizationToken", | |
"ecr:BatchCheckLayerAvailability", | |
"ecr:GetDownloadUrlForLayer", | |
"ecr:GetRepositoryPolicy", | |
"ecr:DescribeRepositories", | |
"ecr:ListImages", | |
"ecr:BatchGetImage" | |
], | |
"Resource": [ | |
"*" | |
] | |
} | |
] | |
} | |
I1212 13:19:02.464190 402540 request_logger.go:45] AWS request: iam/PutRolePolicy | |
I1212 13:19:02.466969 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.467033 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-proxy-client/" | |
I1212 13:19:02.467830 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.467877 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/master/" | |
I1212 13:19:02.472363 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.472420 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kops/" | |
I1212 13:19:02.473168 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.473223 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator/" | |
I1212 13:19:02.480657 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler: [] | |
I1212 13:19:02.480735 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml" | |
I1212 13:19:02.487440 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet: [] | |
I1212 13:19:02.487550 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml" | |
I1212 13:19:02.490887 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager: [] | |
I1212 13:19:02.490933 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml" | |
I1212 13:19:02.509203 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg: [] | |
I1212 13:19:02.509349 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml" | |
I1212 13:19:02.531649 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api: [] | |
I1212 13:19:02.531710 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml" | |
I1212 13:19:02.543940 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy: [] | |
I1212 13:19:02.544079 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml" | |
I1212 13:19:02.558721 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master: [] | |
I1212 13:19:02.558821 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml" | |
I1212 13:19:02.564586 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.564666 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-scheduler/" | |
I1212 13:19:02.565634 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops: [] | |
I1212 13:19:02.565678 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml" | |
I1212 13:19:02.567453 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator: [] | |
I1212 13:19:02.567519 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml" | |
I1212 13:19:02.569680 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client: [] | |
I1212 13:19:02.569755 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml" | |
I1212 13:19:02.572658 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.572710 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet/" | |
I1212 13:19:02.575143 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.575223 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-controller-manager/" | |
I1212 13:19:02.594713 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.594812 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubecfg/" | |
I1212 13:19:02.597841 402540 securitygroup.go:166] Creating SecurityGroup with Name:"masters.kops.domain.com" VPC:"vpc-00d891ddc03f86a0d" | |
I1212 13:19:02.598161 402540 request_logger.go:45] AWS request: ec2/CreateSecurityGroup | |
I1212 13:19:02.616546 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.616682 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet-api/" | |
I1212 13:19:02.641251 402540 changes.go:81] Field changed "DHCPOptions" actual="{<nil> <nil> 0xc0007edd08 <nil> <nil> <nil> map[]}" expected="{0xc000f3a3e0 0xc00070f1b0 0xc000e70688 0xc000f3a400 0xc000f3a3f0 0xc0000140ad map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned]}" | |
I1212 13:19:02.641853 402540 vpc_dhcpoptions_association.go:89] calling EC2 AssociateDhcpOptions | |
I1212 13:19:02.642547 402540 request_logger.go:45] AWS request: ec2/AssociateDhcpOptions | |
I1212 13:19:02.645042 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.645098 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/master/" | |
I1212 13:19:02.648713 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.648838 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kops/" | |
I1212 13:19:02.652734 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.652814 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator/" | |
I1212 13:19:02.655345 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler: [] | |
I1212 13:19:02.655667 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.655727 402540 keypair.go:201] Creating PKI keypair "kube-scheduler" | |
I1212 13:19:02.655759 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml" | |
I1212 13:19:02.660939 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.660985 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-proxy-client/" | |
I1212 13:19:02.666634 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet: [] | |
I1212 13:19:02.666861 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.666876 402540 keypair.go:201] Creating PKI keypair "kubelet" | |
I1212 13:19:02.666923 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml" | |
I1212 13:19:02.667745 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager: [] | |
I1212 13:19:02.667873 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.667888 402540 keypair.go:201] Creating PKI keypair "kube-controller-manager" | |
I1212 13:19:02.667904 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml" | |
I1212 13:19:02.708563 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api: [] | |
I1212 13:19:02.709050 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.709074 402540 keypair.go:201] Creating PKI keypair "kubelet-api" | |
I1212 13:19:02.709130 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml" | |
I1212 13:19:02.736302 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops: [] | |
I1212 13:19:02.736645 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.736668 402540 keypair.go:201] Creating PKI keypair "kops" | |
I1212 13:19:02.736730 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml" | |
I1212 13:19:02.738097 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.738149 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-scheduler/" | |
I1212 13:19:02.745001 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator: [] | |
I1212 13:19:02.745428 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.745459 402540 keypair.go:201] Creating PKI keypair "apiserver-aggregator" | |
I1212 13:19:02.745546 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml" | |
I1212 13:19:02.747846 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.747885 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-proxy/" | |
I1212 13:19:02.755243 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.755314 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-controller-manager/" | |
I1212 13:19:02.756379 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.756431 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet/" | |
I1212 13:19:02.757267 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/master: [] | |
I1212 13:19:02.757551 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.757584 402540 keypair.go:201] Creating PKI keypair "master" | |
I1212 13:19:02.757618 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml" | |
I1212 13:19:02.758603 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg: [] | |
I1212 13:19:02.758763 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.758789 402540 keypair.go:201] Creating PKI keypair "kubecfg" | |
I1212 13:19:02.758820 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml" | |
I1212 13:19:02.759775 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client: [] | |
I1212 13:19:02.759924 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.759971 402540 keypair.go:201] Creating PKI keypair "apiserver-proxy-client" | |
I1212 13:19:02.760004 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml" | |
I1212 13:19:02.781057 402540 internetgateway.go:150] Creating InternetGateway | |
I1212 13:19:02.781338 402540 request_logger.go:45] AWS request: ec2/CreateInternetGateway | |
I1212 13:19:02.799638 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1212 13:19:02.809005 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.809094 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet-api/" | |
I1212 13:19:02.819537 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.819578 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kops/" | |
I1212 13:19:02.828040 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler: [] | |
I1212 13:19:02.828087 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml" | |
I1212 13:19:02.830931 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.831001 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator/" | |
I1212 13:19:02.832513 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:19:02.844707 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.844819 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-proxy-client/" | |
I1212 13:19:02.846434 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.846601 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubecfg/" | |
I1212 13:19:02.848106 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager: [] | |
I1212 13:19:02.848174 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml" | |
I1212 13:19:02.849191 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet: [] | |
I1212 13:19:02.849225 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml" | |
I1212 13:19:02.855070 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy: [] | |
I1212 13:19:02.855213 402540 keypair.go:181] creating brand new certificate | |
I1212 13:19:02.855224 402540 keypair.go:201] Creating PKI keypair "kube-proxy" | |
I1212 13:19:02.855242 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml" | |
I1212 13:19:02.859252 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.859344 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/master/" | |
I1212 13:19:02.908937 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.908991 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-scheduler/" | |
I1212 13:19:02.910270 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops: [] | |
I1212 13:19:02.910297 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml" | |
I1212 13:19:02.917480 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api: [] | |
I1212 13:19:02.917704 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml" | |
I1212 13:19:02.932069 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:19:02.934421 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.934591 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet/" | |
I1212 13:19:02.940164 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg: [] | |
I1212 13:19:02.940244 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml" | |
I1212 13:19:02.943542 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client: [] | |
I1212 13:19:02.943587 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml" | |
I1212 13:19:02.949654 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.949720 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-controller-manager/" | |
I1212 13:19:02.955070 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml", falling back to directory-list method | |
I1212 13:19:02.955132 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-proxy/" | |
I1212 13:19:02.958794 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:19:02.959896 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator: [] | |
I1212 13:19:02.959998 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml" | |
I1212 13:19:02.969242 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master: [] | |
I1212 13:19:02.969344 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml" | |
I1212 13:19:02.975871 402540 internetgateway.go:163] Creating InternetGatewayAttachment | |
I1212 13:19:02.976156 402540 request_logger.go:45] AWS request: ec2/AttachInternetGateway | |
I1212 13:19:02.997448 402540 routetable.go:174] Creating RouteTable with VPC: "vpc-00d891ddc03f86a0d" | |
I1212 13:19:02.997771 402540 request_logger.go:45] AWS request: ec2/CreateRouteTable | |
I1212 13:19:03.000833 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml", falling back to directory-list method | |
I1212 13:19:03.000865 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kops/" | |
I1212 13:19:03.010294 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler: [] | |
I1212 13:19:03.010332 402540 keypair.go:212] Creating privateKey "kube-scheduler" | |
I1212 13:19:03.025533 402540 aws_cloud.go:885] adding tags to "sg-09a4e42acee69cf69": map[KubernetesCluster:kops.domain.com Name:nodes.kops.domain.com kubernetes.io/cluster/kops.domain.com:owned] | |
I1212 13:19:03.025695 402540 request_logger.go:45] AWS request: ec2/CreateTags | |
I1212 13:19:03.045601 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml", falling back to directory-list method | |
I1212 13:19:03.045647 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet-api/" | |
I1212 13:19:03.046232 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml", falling back to directory-list method | |
I1212 13:19:03.046262 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-proxy-client/" | |
I1212 13:19:03.046722 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet: [] | |
I1212 13:19:03.046753 402540 keypair.go:212] Creating privateKey "kubelet" | |
I1212 13:19:03.085872 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml", falling back to directory-list method | |
I1212 13:19:03.085923 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubecfg/" | |
I1212 13:19:03.086449 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager: [] | |
I1212 13:19:03.086474 402540 keypair.go:212] Creating privateKey "kube-controller-manager" | |
I1212 13:19:03.110339 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml", falling back to directory-list method | |
I1212 13:19:03.110383 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator/" | |
I1212 13:19:03.133392 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml", falling back to directory-list method | |
I1212 13:19:03.133435 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/master/" | |
I1212 13:19:03.134023 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy: [] | |
I1212 13:19:03.134051 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml" | |
I1212 13:19:03.134636 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops: [] | |
I1212 13:19:03.134670 402540 keypair.go:212] Creating privateKey "kops" | |
I1212 13:19:03.267542 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api: [] | |
I1212 13:19:03.267617 402540 keypair.go:212] Creating privateKey "kubelet-api" | |
I1212 13:19:03.287619 402540 aws_cloud.go:885] adding tags to "sg-0bcdeb6125f89caf9": map[KubernetesCluster:kops.domain.com Name:masters.kops.domain.com kubernetes.io/cluster/kops.domain.com:owned] | |
I1212 13:19:03.287814 402540 request_logger.go:45] AWS request: ec2/CreateTags | |
I1212 13:19:03.288131 402540 aws_cloud.go:885] adding tags to "subnet-0983b865b14b444b8": map[KubernetesCluster:kops.domain.com Name:us-west-1a.kops.domain.com SubnetType:Public kubernetes.io/cluster/kops.domain.com:owned kubernetes.io/role/elb:1] | |
I1212 13:19:03.288290 402540 request_logger.go:45] AWS request: ec2/CreateTags | |
I1212 13:19:03.288545 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client: [] | |
I1212 13:19:03.288573 402540 keypair.go:212] Creating privateKey "apiserver-proxy-client" | |
I1212 13:19:03.307785 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg: [] | |
I1212 13:19:03.307832 402540 keypair.go:212] Creating privateKey "kubecfg" | |
I1212 13:19:03.328153 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:19:03.368795 402540 request_logger.go:45] AWS request: ec2/DescribeTags | |
I1212 13:19:03.369155 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:03.469034 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator: [] | |
I1212 13:19:03.469100 402540 keypair.go:212] Creating privateKey "apiserver-aggregator" | |
I1212 13:19:03.489121 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml", falling back to directory-list method | |
I1212 13:19:03.489168 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-proxy/" | |
I1212 13:19:03.489538 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/master: [] | |
I1212 13:19:03.489560 402540 keypair.go:212] Creating privateKey "master" | |
I1212 13:19:03.690963 402540 aws_cloud.go:885] adding tags to "igw-07bae7926bd7529c8": map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned] | |
I1212 13:19:03.691228 402540 request_logger.go:45] AWS request: ec2/CreateTags | |
I1212 13:19:03.691733 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:03.751592 402540 aws_cloud.go:885] adding tags to "rtb-0e6dbc1103ce3e440": map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned kubernetes.io/kops/role:public] | |
I1212 13:19:03.751991 402540 request_logger.go:45] AWS request: ec2/CreateTags | |
I1212 13:19:03.771858 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy: [] | |
I1212 13:19:03.771965 402540 keypair.go:212] Creating privateKey "kube-proxy" | |
I1212 13:19:04.143669 402540 vfs_castore.go:729] Issuing new certificate: "kubelet" | |
I1212 13:19:04.143757 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:19:04.398338 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:04.398480 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca/keyset.yaml" | |
I1212 13:19:04.660302 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:04.660432 402540 privatekey.go:176] Parsing pem block: "RSA PRIVATE KEY" | |
I1212 13:19:04.664210 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet/" | |
I1212 13:19:04.717655 402540 vfs_castore.go:729] Issuing new certificate: "kops" | |
I1212 13:19:04.756752 402540 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager" | |
I1212 13:19:04.827626 402540 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator" | |
I1212 13:19:04.827716 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:19:04.861980 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kops/" | |
I1212 13:19:04.882488 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-controller-manager/" | |
I1212 13:19:04.883281 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet: [] | |
I1212 13:19:04.886377 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml" | |
I1212 13:19:04.886429 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:04.886460 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubelet/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.023518 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:05.023743 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml" | |
I1212 13:19:05.163519 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops: [] | |
I1212 13:19:05.164264 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml" | |
I1212 13:19:05.164292 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.164298 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kops/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.284298 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager: [] | |
I1212 13:19:05.285692 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml" | |
I1212 13:19:05.285727 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.285734 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-controller-manager/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.405841 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/6769541669466771258327439188.key" | |
I1212 13:19:05.405902 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.405913 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubelet/6769541669466771258327439188.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.465941 402540 vfs_castore.go:729] Issuing new certificate: "kube-scheduler" | |
I1212 13:19:05.527185 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:05.527315 402540 privatekey.go:176] Parsing pem block: "RSA PRIVATE KEY" | |
I1212 13:19:05.530278 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator/" | |
I1212 13:19:05.569953 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-scheduler/" | |
I1212 13:19:05.608127 402540 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client" | |
I1212 13:19:05.612271 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-proxy-client/" | |
I1212 13:19:05.655477 402540 vfs_castore.go:729] Issuing new certificate: "kube-proxy" | |
I1212 13:19:05.658541 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-proxy/" | |
I1212 13:19:05.677894 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/6769541671932010421461147177.key" | |
I1212 13:19:05.677957 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.677969 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kops/6769541671932010421461147177.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.691173 402540 vfs_castore.go:729] Issuing new certificate: "kubecfg" | |
I1212 13:19:05.696018 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubecfg/" | |
I1212 13:19:05.749826 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/6769541672099937720780501164.key" | |
I1212 13:19:05.749878 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.749890 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-controller-manager/6769541672099937720780501164.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.829136 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler: [] | |
I1212 13:19:05.830317 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml" | |
I1212 13:19:05.830352 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.830359 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-scheduler/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.850326 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator: [] | |
I1212 13:19:05.851075 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml" | |
I1212 13:19:05.851107 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.851113 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.869068 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet/" | |
I1212 13:19:05.889161 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client: [] | |
I1212 13:19:05.889910 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml" | |
I1212 13:19:05.889940 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.889946 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.890606 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy: [] | |
I1212 13:19:05.891237 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml" | |
I1212 13:19:05.891261 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.891267 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-proxy/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:05.909192 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kops/" | |
I1212 13:19:05.910886 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg: [] | |
I1212 13:19:05.911654 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml" | |
I1212 13:19:05.911680 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:05.911687 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubecfg/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.040868 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-controller-manager/" | |
I1212 13:19:06.041353 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet: [] | |
I1212 13:19:06.041804 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml" | |
I1212 13:19:06.041829 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.041836 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubelet/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.042234 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/6769541675145900126169095292.key" | |
I1212 13:19:06.042257 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.042264 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-scheduler/6769541675145900126169095292.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.042778 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/6769541672404374377566517953.key" | |
I1212 13:19:06.042802 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.042808 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-aggregator/6769541672404374377566517953.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.044546 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/6769541675756591883495708598.key" | |
I1212 13:19:06.044572 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.044606 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-proxy-client/6769541675756591883495708598.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.044927 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops: [] | |
I1212 13:19:06.045372 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml" | |
I1212 13:19:06.045405 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.045412 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kops/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.061576 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/6769541675959971151074991162.key" | |
I1212 13:19:06.061619 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.061654 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-proxy/6769541675959971151074991162.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.062256 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/6769541676113238367628490963.key" | |
I1212 13:19:06.062289 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.062299 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubecfg/6769541676113238367628490963.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.144231 402540 vfs_castore.go:729] Issuing new certificate: "master" | |
I1212 13:19:06.147484 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/master/" | |
I1212 13:19:06.148098 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager: [] | |
I1212 13:19:06.148549 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml" | |
I1212 13:19:06.148603 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.148612 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.161802 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/6769541669466771258327439188.crt" | |
I1212 13:19:06.161845 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.161852 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubelet/6769541669466771258327439188.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.202267 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-proxy-client/" | |
I1212 13:19:06.203454 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubecfg/" | |
I1212 13:19:06.203963 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator/" | |
I1212 13:19:06.222235 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-scheduler/" | |
I1212 13:19:06.242374 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-proxy/" | |
I1212 13:19:06.242806 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/6769541671932010421461147177.crt" | |
I1212 13:19:06.242832 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.242838 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kops/6769541671932010421461147177.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.243305 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/master: [] | |
I1212 13:19:06.244108 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml" | |
I1212 13:19:06.244133 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.244139 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/master/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.262641 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/6769541672099937720780501164.crt" | |
I1212 13:19:06.262688 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.262695 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-controller-manager/6769541672099937720780501164.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.277015 402540 vfs_castore.go:729] Issuing new certificate: "kubelet-api" | |
I1212 13:19:06.280307 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet-api/" | |
I1212 13:19:06.296570 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg: [] | |
I1212 13:19:06.297133 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml" | |
I1212 13:19:06.297159 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.297165 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubecfg/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.297842 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client: [] | |
I1212 13:19:06.298286 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml" | |
I1212 13:19:06.298324 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.298332 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.298824 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/6769541669466771258327439188.crt" | |
I1212 13:19:06.325278 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler: [] | |
I1212 13:19:06.327539 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml" | |
I1212 13:19:06.327642 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.327665 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-scheduler/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.334649 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy: [] | |
I1212 13:19:06.336652 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml" | |
I1212 13:19:06.336732 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.336750 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-proxy/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.340768 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator: [] | |
I1212 13:19:06.342752 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml" | |
I1212 13:19:06.342828 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.342866 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.374139 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api: [] | |
I1212 13:19:06.378198 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml" | |
I1212 13:19:06.378290 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.378308 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubelet-api/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.379188 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/6769541671932010421461147177.crt" | |
I1212 13:19:06.389714 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/6769541678059162718412253036.key" | |
I1212 13:19:06.389804 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.389822 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/master/6769541678059162718412253036.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.394629 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.395034 402540 keypair.go:230] created certificate with cn=kubelet | |
I1212 13:19:06.402910 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/6769541672099937720780501164.crt" | |
I1212 13:19:06.424554 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/6769541676113238367628490963.crt" | |
I1212 13:19:06.424733 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.424758 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubecfg/6769541676113238367628490963.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.435134 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/6769541675145900126169095292.crt" | |
I1212 13:19:06.435225 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.435242 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-scheduler/6769541675145900126169095292.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.444396 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/6769541675959971151074991162.crt" | |
I1212 13:19:06.444460 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.444467 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-proxy/6769541675959971151074991162.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.454869 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/6769541675756591883495708598.crt" | |
I1212 13:19:06.454961 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.454978 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-proxy-client/6769541675756591883495708598.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.466875 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/6769541672404374377566517953.crt" | |
I1212 13:19:06.466986 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.467034 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-aggregator/6769541672404374377566517953.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.469130 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.469368 402540 keypair.go:230] created certificate with cn=kops | |
I1212 13:19:06.488298 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/6769541678629452970774058756.key" | |
I1212 13:19:06.488362 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.488379 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubelet-api/6769541678629452970774058756.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.496535 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.496940 402540 keypair.go:230] created certificate with cn=system:kube-controller-manager | |
I1212 13:19:06.550272 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/6769541676113238367628490963.crt" | |
I1212 13:19:06.555170 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/6769541675145900126169095292.crt" | |
I1212 13:19:06.560798 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/master/" | |
I1212 13:19:06.561313 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/6769541675756591883495708598.crt" | |
I1212 13:19:06.602017 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/6769541672404374377566517953.crt" | |
I1212 13:19:06.639980 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/6769541675959971151074991162.crt" | |
I1212 13:19:06.642406 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.642650 402540 keypair.go:230] created certificate with cn=kubecfg | |
I1212 13:19:06.644000 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.644139 402540 keypair.go:230] created certificate with cn=system:kube-scheduler | |
I1212 13:19:06.644380 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet-api/" | |
I1212 13:19:06.650878 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.651040 402540 keypair.go:230] created certificate with cn=apiserver-proxy-client | |
I1212 13:19:06.653064 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master: [] | |
I1212 13:19:06.653773 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml" | |
I1212 13:19:06.653818 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.653839 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/master/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.694816 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.695270 402540 keypair.go:230] created certificate with cn=aggregator | |
I1212 13:19:06.732763 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.733115 402540 keypair.go:230] created certificate with cn=system:kube-proxy | |
I1212 13:19:06.749700 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api: [] | |
I1212 13:19:06.751918 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml" | |
I1212 13:19:06.752007 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.752025 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubelet-api/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.776922 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/6769541678059162718412253036.crt" | |
I1212 13:19:06.777030 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.777040 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/master/6769541678059162718412253036.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.885397 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/6769541678629452970774058756.crt" | |
I1212 13:19:06.885485 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control | |
I1212 13:19:06.885534 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubelet-api/6769541678629452970774058756.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control" | |
I1212 13:19:06.905840 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/6769541678059162718412253036.crt" | |
I1212 13:19:06.996059 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:06.996248 402540 keypair.go:230] created certificate with cn=kubernetes-master | |
I1212 13:19:07.029865 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/6769541678629452970774058756.crt" | |
I1212 13:19:07.117555 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:07.117743 402540 keypair.go:230] created certificate with cn=kubelet-api | |
I1212 13:19:07.117785 402540 executor.go:103] Tasks: 68 done / 86 total; 16 can run | |
I1212 13:19:07.117837 402540 executor.go:178] Executing task "Route/0.0.0.0/0": *awstasks.Route {"Name":"0.0.0.0/0","Lifecycle":"Sync","RouteTable":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"rtb-0e6dbc1103ce3e440","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}},"Instance":null,"CIDR":"0.0.0.0/0","InternetGateway":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"igw-07bae7926bd7529c8","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"NatGateway":null} | |
I1212 13:19:07.118287 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1212 13:19:07.118549 402540 executor.go:178] Executing task "SecurityGroupRule/all-node-to-node": *awstasks.SecurityGroupRule {"Name":"all-node-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:19:07.118799 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.118943 402540 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-1-2379": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-1-2379","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":1,"ToPort":2379,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:19:07.119142 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.119477 402540 executor.go:178] Executing task "LaunchConfiguration/master-us-west-1a.masters.kops.domain.com": *awstasks.LaunchConfiguration {"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6MELARRFSZ","Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"m3.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":64,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}} | |
I1212 13:19:07.119859 402540 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1212 13:19:07.120067 402540 executor.go:178] Executing task "SecurityGroupRule/node-egress": *awstasks.SecurityGroupRule {"Name":"node-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true} | |
I1212 13:19:07.120261 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.120321 402540 executor.go:178] Executing task "SecurityGroupRule/node-to-master-udp-1-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-udp-1-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"udp","FromPort":1,"ToPort":65535,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:19:07.120493 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.120930 402540 executor.go:178] Executing task "SecurityGroupRule/all-master-to-node": *awstasks.SecurityGroupRule {"Name":"all-master-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:19:07.121103 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.121173 402540 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-2382-4000": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-2382-4000","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":2382,"ToPort":4000,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:19:07.121315 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.121387 402540 executor.go:178] Executing task "RouteTableAssociation/us-west-1a.kops.domain.com": *awstasks.RouteTableAssociation {"Name":"us-west-1a.kops.domain.com","Lifecycle":"Sync","ID":null,"RouteTable":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"rtb-0e6dbc1103ce3e440","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}},"Subnet":{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":"subnet-0983b865b14b444b8","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}} | |
I1212 13:19:07.121617 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1212 13:19:07.121690 402540 executor.go:178] Executing task "SecurityGroupRule/ssh-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null} | |
I1212 13:19:07.121819 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.121898 402540 executor.go:178] Executing task "SecurityGroupRule/all-master-to-master": *awstasks.SecurityGroupRule {"Name":"all-master-to-master","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:19:07.122040 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.122091 402540 executor.go:178] Executing task "SecurityGroupRule/ssh-external-to-node-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-node-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null} | |
I1212 13:19:07.122193 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.122399 402540 executor.go:178] Executing task "SecurityGroupRule/master-egress": *awstasks.SecurityGroupRule {"Name":"master-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true} | |
I1212 13:19:07.122549 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.122614 402540 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-4003-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-4003-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":4003,"ToPort":65535,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null} | |
I1212 13:19:07.122772 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.122824 402540 executor.go:178] Executing task "SecurityGroupRule/https-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"https-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":443,"ToPort":443,"SourceGroup":null,"Egress":null} | |
I1212 13:19:07.122932 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups | |
I1212 13:19:07.122980 402540 executor.go:178] Executing task "LaunchConfiguration/nodes.kops.domain.com": *awstasks.LaunchConfiguration {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6M4L7A7DKZ","Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"t2.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":128,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}} | |
I1212 13:19:07.123114 402540 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1212 13:19:07.319175 402540 route.go:174] Creating Route with RouteTable:"rtb-0e6dbc1103ce3e440" CIDR:"0.0.0.0/0" | |
I1212 13:19:07.319373 402540 request_logger.go:45] AWS request: ec2/CreateRoute | |
I1212 13:19:07.346236 402540 securitygrouprule.go:278] all-node-to-node: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-09a4e42acee69cf69) | |
I1212 13:19:07.346434 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.508897 402540 securitygrouprule.go:278] node-to-master-tcp-1-2379: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=1 toPort=2379 sourceGroup=sg-09a4e42acee69cf69) | |
I1212 13:19:07.509113 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.703832 402540 securitygrouprule.go:278] node-to-master-udp-1-65535: Calling EC2 AuthorizeSecurityGroupIngress (protocol=udp fromPort=1 toPort=65535 sourceGroup=sg-09a4e42acee69cf69) | |
I1212 13:19:07.704077 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.741945 402540 securitygrouprule.go:278] all-master-to-node: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-0bcdeb6125f89caf9) | |
I1212 13:19:07.742294 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.756263 402540 securitygrouprule.go:278] node-to-master-tcp-2382-4000: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=2382 toPort=4000 sourceGroup=sg-09a4e42acee69cf69) | |
I1212 13:19:07.756686 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.758113 402540 launchconfiguration.go:269] Creating AutoscalingLaunchConfiguration with Name:"master-us-west-1a.masters.kops.domain.com-20191212131907" | |
I1212 13:19:07.758170 402540 aws_cloud.go:1172] Calling DescribeImages to resolve name "kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26" | |
I1212 13:19:07.758380 402540 request_logger.go:45] AWS request: ec2/DescribeImages | |
I1212 13:19:07.769206 402540 securitygrouprule.go:278] ssh-external-to-node-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=22 toPort=22 cidr=0.0.0.0/0) | |
I1212 13:19:07.769544 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.772700 402540 securitygrouprule.go:278] all-master-to-master: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-0bcdeb6125f89caf9) | |
I1212 13:19:07.773129 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.784247 402540 routetableassociation.go:149] Checking for existing RouteTableAssociation to subnet | |
I1212 13:19:07.784626 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables | |
I1212 13:19:07.794697 402540 launchconfiguration.go:269] Creating AutoscalingLaunchConfiguration with Name:"nodes.kops.domain.com-20191212131907" | |
I1212 13:19:07.794735 402540 aws_cloud.go:1172] Calling DescribeImages to resolve name "kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26" | |
I1212 13:19:07.794897 402540 request_logger.go:45] AWS request: ec2/DescribeImages | |
I1212 13:19:07.799553 402540 securitygrouprule.go:278] ssh-external-to-master-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=22 toPort=22 cidr=0.0.0.0/0) | |
I1212 13:19:07.799938 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.803357 402540 securitygrouprule.go:278] node-to-master-tcp-4003-65535: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=4003 toPort=65535 sourceGroup=sg-09a4e42acee69cf69) | |
I1212 13:19:07.803646 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.919259 402540 securitygrouprule.go:278] https-external-to-master-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=443 toPort=443 cidr=0.0.0.0/0) | |
I1212 13:19:07.919538 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress | |
I1212 13:19:07.957367 402540 aws_cloud.go:1224] Resolved image "ami-035e8621e8ff3b220" | |
I1212 13:19:07.957435 402540 aws_cloud.go:1172] Calling DescribeImages to resolve name "kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26" | |
I1212 13:19:07.957701 402540 request_logger.go:45] AWS request: ec2/DescribeImages | |
I1212 13:19:07.979926 402540 routetableassociation.go:172] Creating RouteTableAssociation | |
I1212 13:19:07.980147 402540 request_logger.go:45] AWS request: ec2/AssociateRouteTable | |
I1212 13:19:07.999273 402540 aws_cloud.go:1224] Resolved image "ami-035e8621e8ff3b220" | |
I1212 13:19:07.999308 402540 aws_cloud.go:1172] Calling DescribeImages to resolve name "kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26" | |
I1212 13:19:07.999463 402540 request_logger.go:45] AWS request: ec2/DescribeImages | |
I1212 13:19:08.165532 402540 aws_cloud.go:1224] Resolved image "ami-035e8621e8ff3b220" | |
I1212 13:19:08.172279 402540 tagbuilder.go:95] tags: [_aws _k8s_1_6] | |
I1212 13:19:08.172342 402540 urls.go:168] Using cached protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz" | |
I1212 13:19:08.173971 402540 launchconfiguration.go:351] AWS CreateLaunchConfiguration master-us-west-1a.masters.kops.domain.com-20191212131907 | |
I1212 13:19:08.176267 402540 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration | |
I1212 13:19:08.210844 402540 aws_cloud.go:1224] Resolved image "ami-035e8621e8ff3b220" | |
I1212 13:19:08.213634 402540 tagbuilder.go:95] tags: [_aws _k8s_1_6] | |
I1212 13:19:08.213719 402540 urls.go:168] Using cached protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz" | |
I1212 13:19:08.215166 402540 launchconfiguration.go:351] AWS CreateLaunchConfiguration nodes.kops.domain.com-20191212131907 | |
I1212 13:19:08.216391 402540 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration | |
I1212 13:19:08.632871 402540 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1212 13:19:08.693846 402540 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations | |
I1212 13:19:08.879941 402540 executor.go:103] Tasks: 84 done / 86 total; 2 can run | |
I1212 13:19:08.880018 402540 executor.go:178] Executing task "AutoscalingGroup/nodes.kops.domain.com": *awstasks.AutoscalingGroup {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","Granularity":"1Minute","InstanceProtection":null,"LaunchConfiguration":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6M4L7A7DKZ","Shared":false},"ID":"nodes.kops.domain.com-20191212131907","ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"t2.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":128,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}},"LaunchTemplate":null,"MaxSize":2,"Metrics":["GroupDesiredCapacity","GroupInServiceInstances","GroupMaxSize","GroupMinSize","GroupPendingInstances","GroupStandbyInstances","GroupTerminatingInstances","GroupTotalInstances"],"MinSize":2,"MixedInstanceOverrides":null,"MixedOnDemandAllocationStrategy":null,"MixedOnDemandBase":null,"MixedOnDemandAboveBase":null,"MixedSpotAllocationStrategy":null,"MixedSpotInstancePools":null,"MixedSpotMaxPrice":null,"Subnets":[{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":"subnet-0983b865b14b444b8","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}],"SuspendProcesses":[],"Tags":{"k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup":"nodes","k8s.io/role/node":"1","kops.k8s.io/instancegroup":"nodes"}} | |
I1212 13:19:08.880552 402540 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups | |
I1212 13:19:08.880768 402540 executor.go:178] Executing task "AutoscalingGroup/master-us-west-1a.masters.kops.domain.com": *awstasks.AutoscalingGroup {"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","Granularity":"1Minute","InstanceProtection":null,"LaunchConfiguration":{"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6MELARRFSZ","Shared":false},"ID":"master-us-west-1a.masters.kops.domain.com-20191212131907","ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"m3.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":64,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}},"LaunchTemplate":null,"MaxSize":1,"Metrics":["GroupDesiredCapacity","GroupInServiceInstances","GroupMaxSize","GroupMinSize","GroupPendingInstances","GroupStandbyInstances","GroupTerminatingInstances","GroupTotalInstances"],"MinSize":1,"MixedInstanceOverrides":null,"MixedOnDemandAllocationStrategy":null,"MixedOnDemandBase":null,"MixedOnDemandAboveBase":null,"MixedSpotAllocationStrategy":null,"MixedSpotInstancePools":null,"MixedSpotMaxPrice":null,"Subnets":[{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":"subnet-0983b865b14b444b8","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}],"SuspendProcesses":[],"Tags":{"k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup":"master-us-west-1a","k8s.io/role/master":"1","kops.k8s.io/instancegroup":"master-us-west-1a"}} | |
I1212 13:19:08.880986 402540 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups | |
I1212 13:19:09.086988 402540 autoscalinggroup.go:254] Creating autoscaling group with name: master-us-west-1a.masters.kops.domain.com | |
I1212 13:19:09.087606 402540 request_logger.go:45] AWS request: autoscaling/CreateAutoScalingGroup | |
I1212 13:19:09.100002 402540 autoscalinggroup.go:254] Creating autoscaling group with name: nodes.kops.domain.com | |
I1212 13:19:09.100589 402540 request_logger.go:45] AWS request: autoscaling/CreateAutoScalingGroup | |
I1212 13:19:09.548873 402540 request_logger.go:45] AWS request: autoscaling/EnableMetricsCollection | |
I1212 13:19:09.549238 402540 request_logger.go:45] AWS request: autoscaling/EnableMetricsCollection | |
I1212 13:19:09.841707 402540 executor.go:103] Tasks: 86 done / 86 total; 0 can run | |
I1212 13:19:09.841750 402540 dns.go:155] Pre-creating DNS records | |
I1212 13:19:09.841919 402540 route53.go:53] AWS request: route53 ListHostedZones | |
I1212 13:19:10.201553 402540 route53.go:53] AWS request: route53 ListResourceRecordSets | |
I1212 13:19:10.302300 402540 dns.go:231] Pre-creating DNS record api.kops.domain.com. => 203.0.113.123 | |
I1212 13:19:10.302372 402540 dns.go:231] Pre-creating DNS record api.internal.kops.domain.com. => 203.0.113.123 | |
I1212 13:19:10.302402 402540 rrchangeset.go:142] Route53 MaxBatchSize: 900 | |
I1212 13:19:10.302416 402540 rrchangeset.go:143] Route53 Changeset: | |
CREATE A api.kops.domain.com. | |
CREATE A api.internal.kops.domain.com. | |
I1212 13:19:10.302886 402540 route53.go:53] AWS request: route53 ChangeResourceRecordSets | |
I1212 13:19:10.432980 402540 dns.go:247] Pre-created DNS names: [api.kops.domain.com. api.internal.kops.domain.com.] | |
I1212 13:19:10.433024 402540 context.go:91] deleting temp dir: "/tmp/deploy658868570" | |
I1212 13:19:10.433148 402540 kubectl.go:131] Running command: kubectl config view --output json | |
I1212 13:19:10.683295 402540 kubectl.go:83] config = "{\n \"kind\": \"Config\",\n \"apiVersion\": \"v1\",\n \"preferences\": {},\n \"clusters\": null,\n \"users\": null,\n \"contexts\": null,\n \"current-context\": \"\"\n}" | |
I1212 13:19:10.683696 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml" | |
I1212 13:19:10.772362 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:10.772491 402540 update_cluster.go:294] Exporting kubecfg for cluster | |
I1212 13:19:10.772540 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:19:10.859437 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:10.859876 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml" | |
I1212 13:19:10.948323 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:10.948648 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca/keyset.yaml" | |
I1212 13:19:11.039487 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:11.039677 402540 privatekey.go:176] Parsing pem block: "RSA PRIVATE KEY" | |
I1212 13:19:11.039826 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml" | |
I1212 13:19:11.130210 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:11.130382 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml" | |
I1212 13:19:11.220976 402540 certificate.go:103] Parsing pem block: "CERTIFICATE" | |
I1212 13:19:11.221401 402540 privatekey.go:176] Parsing pem block: "RSA PRIVATE KEY" | |
I1212 13:19:11.221785 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube" | |
I1212 13:19:11.314830 402540 loader.go:359] Config loaded from file: /home/user/.kube/config | |
I1212 13:19:11.315241 402540 loader.go:359] Config loaded from file: /home/user/.kube/config | |
I1212 13:19:11.315434 402540 loader.go:359] Config loaded from file: /home/user/.kube/config | |
I1212 13:19:11.315614 402540 loader.go:359] Config loaded from file: /home/user/.kube/config | |
I1212 13:19:11.316811 402540 loader.go:359] Config loaded from file: /home/user/.kube/config | |
I1212 13:19:11.318116 402540 loader.go:359] Config loaded from file: /home/user/.kube/config | |
I1212 13:19:11.319869 402540 loader.go:359] Config loaded from file: /home/user/.kube/config | |
I1212 13:19:11.322043 402540 loader.go:359] Config loaded from file: /home/user/.kube/config | |
kops has set your kubectl context to kops.domain.com | |
Cluster is starting. It should be ready in a few minutes. | |
Suggestions: | |
* validate cluster: kops validate cluster | |
* list nodes: kubectl get nodes --show-labels | |
* ssh to the master: ssh -i ~/.ssh/id_rsa admin@api.kops.domain.com | |
* the admin user is specific to Debian. If not using Debian please use the appropriate user based on your OS. | |
* read about installing addons at: https://github.com/kubernetes/kops/blob/master/docs/addons.md. | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment