Skip to content

Instantly share code, notes, and snippets.

@nodje
Created December 12, 2019 13:49
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save nodje/7f854d00284ced9ce031e2db8084709f to your computer and use it in GitHub Desktop.
Save nodje/7f854d00284ced9ce031e2db8084709f to your computer and use it in GitHub Desktop.
kops first run "Getting Started with kops on AWS"
I1212 13:18:34.390182 402535 factory.go:68] state store s3://kops-domain-com-state-store
I1212 13:18:34.390273 402535 s3context.go:325] unable to read /sys/devices/virtual/dmi/id/product_uuid, assuming not running on EC2: open /sys/devices/virtual/dmi/id/product_uuid: permission denied
I1212 13:18:34.390294 402535 s3context.go:170] defaulting region to "us-east-1"
I1212 13:18:34.888588 402535 s3context.go:210] found bucket in region "us-east-1"
I1212 13:18:34.888634 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/config"
I1212 13:18:35.239817 402535 channel.go:99] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/"
I1212 13:18:35.239876 402535 channel.go:104] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable"
I1212 13:18:35.239891 402535 context.go:177] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable
I1212 13:18:35.478611 402535 channel.go:113] Channel contents: spec:
images:
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 )
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.4.0 <1.5.0"
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.5.0 <1.6.0"
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.6.0 <1.7.0"
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.7.0 <1.8.0"
- name: kope.io/k8s-1.8-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.8.0 <1.9.0"
- name: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.9.0 <1.10.0"
- name: kope.io/k8s-1.10-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.10.0 <1.11.0"
# Stretch is the default for 1.11 (for nvme)
- name: kope.io/k8s-1.11-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.11.0 <1.12.0"
- name: kope.io/k8s-1.12-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.12.0 <1.13.0"
- name: kope.io/k8s-1.13-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.13.0 <1.14.0"
- name: kope.io/k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.14.0 <1.15.0"
- name: kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.15.0"
- providerID: gce
name: "cos-cloud/cos-stable-65-10323-99-0"
cluster:
kubernetesVersion: v1.5.8
networking:
kubenet: {}
kubernetesVersions:
- range: ">=1.17.0"
recommendedVersion: 1.17.0
requiredVersion: 1.17.0
- range: ">=1.16.0"
recommendedVersion: 1.16.2
requiredVersion: 1.16.0
- range: ">=1.15.0"
recommendedVersion: 1.15.5
requiredVersion: 1.15.0
- range: ">=1.14.0"
recommendedVersion: 1.14.8
requiredVersion: 1.14.0
- range: ">=1.13.0"
recommendedVersion: 1.13.12
requiredVersion: 1.13.0
- range: ">=1.12.0"
recommendedVersion: 1.12.10
requiredVersion: 1.12.0
- range: ">=1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.0
- range: "<1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.10
kopsVersions:
- range: ">=1.17.0-alpha.1"
#recommendedVersion: "1.17.0"
#requiredVersion: 1.17.0
kubernetesVersion: 1.17.0
- range: ">=1.16.0-alpha.1"
#recommendedVersion: "1.16.0"
#requiredVersion: 1.16.0
kubernetesVersion: 1.16.2
- range: ">=1.15.0-alpha.1"
#recommendedVersion: "1.15.0"
#requiredVersion: 1.15.0
kubernetesVersion: 1.15.5
- range: ">=1.14.0-alpha.1"
#recommendedVersion: "1.14.0"
#requiredVersion: 1.14.0
kubernetesVersion: 1.14.8
- range: ">=1.13.0-alpha.1"
#recommendedVersion: "1.13.0"
#requiredVersion: 1.13.0
kubernetesVersion: 1.13.12
- range: ">=1.12.0-alpha.1"
recommendedVersion: "1.12.1"
#requiredVersion: 1.12.0
kubernetesVersion: 1.12.10
- range: ">=1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.11.0
kubernetesVersion: 1.11.10
- range: "<1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.10.0
kubernetesVersion: 1.11.10
I1212 13:18:35.478692 402535 channel.go:241] version range ">=1.17.0-alpha.1" does not apply to version "1.15.0"; skipping
I1212 13:18:35.478720 402535 channel.go:241] version range ">=1.16.0-alpha.1" does not apply to version "1.15.0"; skipping
I1212 13:18:35.478857 402535 create_cluster.go:517] Inferred --cloud=aws from zone "us-west-1a"
I1212 13:18:35.478932 402535 create_cluster.go:1018] networking mode=kubenet => {"kubenet":{}}
I1212 13:18:35.480109 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:35.480271 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:36.154327 402535 subnets.go:184] Assigned CIDR 172.20.32.0/19 to subnet us-west-1a
I1212 13:18:36.154400 402535 defaults.go:224] Not setting up Proxy Excludes
I1212 13:18:36.155486 402535 populate_cluster_spec.go:371] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11
I1212 13:18:36.155542 402535 populate_cluster_spec.go:378] Defaulted ServiceClusterIPRange to 100.64.0.0/13
I1212 13:18:36.155586 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:36.155840 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:36.336661 402535 subnets.go:49] All subnets have CIDRs; skipping assignment logic
I1212 13:18:36.336724 402535 defaults.go:224] Not setting up Proxy Excludes
I1212 13:18:36.336854 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:36.337050 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:36.516458 402535 utils.go:167] Querying for all DNS zones to find match for "kops.domain.com"
I1212 13:18:36.516685 402535 route53.go:53] AWS request: route53 ListHostedZones
I1212 13:18:36.861249 402535 populate_cluster_spec.go:253] Defaulting DNS zone to: Z237FHI0B4E3ZX
I1212 13:18:36.861324 402535 tagbuilder.go:95] tags: [_aws _k8s_1_6]
I1212 13:18:36.861783 402535 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder
I1212 13:18:36.861807 402535 options_loader.go:130] executing builder *components.EtcdOptionsBuilder
I1212 13:18:36.861836 402535 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I1212 13:18:36.861880 402535 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder
I1212 13:18:36.861894 402535 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder
I1212 13:18:36.861985 402535 options_loader.go:130] executing builder *components.DockerOptionsBuilder
I1212 13:18:36.862008 402535 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder
I1212 13:18:36.862048 402535 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder
I1212 13:18:36.862071 402535 options_loader.go:130] executing builder *components.KubeletOptionsBuilder
I1212 13:18:36.862126 402535 kubelet.go:171] Cloud Provider: aws
I1212 13:18:36.862152 402535 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder
I1212 13:18:36.862171 402535 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure
I1212 13:18:36.862220 402535 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s
I1212 13:18:36.862252 402535 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder
I1212 13:18:36.862294 402535 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder
I1212 13:18:36.863257 402535 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder
I1212 13:18:36.863313 402535 options_loader.go:130] executing builder *components.EtcdOptionsBuilder
I1212 13:18:36.863335 402535 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I1212 13:18:36.863349 402535 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder
I1212 13:18:36.863382 402535 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder
I1212 13:18:36.863435 402535 options_loader.go:130] executing builder *components.DockerOptionsBuilder
I1212 13:18:36.863474 402535 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder
I1212 13:18:36.863490 402535 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder
I1212 13:18:36.863529 402535 options_loader.go:130] executing builder *components.KubeletOptionsBuilder
I1212 13:18:36.863549 402535 kubelet.go:171] Cloud Provider: aws
I1212 13:18:36.863567 402535 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder
I1212 13:18:36.863584 402535 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure
I1212 13:18:36.863632 402535 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder
I1212 13:18:36.863648 402535 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder
I1212 13:18:36.865142 402535 spec_builder.go:49] options: {
"channel": "stable",
"configBase": "s3://kops-domain-com-state-store/kops.domain.com",
"cloudProvider": "aws",
"kubernetesVersion": "1.15.5",
"subnets": [
{
"name": "us-west-1a",
"cidr": "172.20.32.0/19",
"zone": "us-west-1a",
"type": "Public"
}
],
"masterPublicName": "api.kops.domain.com",
"masterInternalName": "api.internal.kops.domain.com",
"networkCIDR": "172.20.0.0/16",
"topology": {
"masters": "public",
"nodes": "public",
"dns": {
"type": "Public"
}
},
"secretStore": "s3://kops-domain-com-state-store/kops.domain.com/secrets",
"keyStore": "s3://kops-domain-com-state-store/kops.domain.com/pki",
"configStore": "s3://kops-domain-com-state-store/kops.domain.com",
"dnsZone": "Z237FHI0B4E3ZX",
"clusterDNSDomain": "cluster.local",
"serviceClusterIPRange": "100.64.0.0/13",
"nonMasqueradeCIDR": "100.64.0.0/10",
"sshAccess": [
"0.0.0.0/0"
],
"kubernetesApiAccess": [
"0.0.0.0/0"
],
"etcdClusters": [
{
"name": "main",
"provider": "Manager",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "master-us-west-1a"
}
],
"enableEtcdTLS": true,
"enableTLSAuth": true,
"version": "3.3.10",
"backups": {
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"
},
"manager": {},
"memoryRequest": "100Mi",
"cpuRequest": "200m"
},
{
"name": "events",
"provider": "Manager",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "master-us-west-1a"
}
],
"enableEtcdTLS": true,
"enableTLSAuth": true,
"version": "3.3.10",
"backups": {
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"
},
"manager": {},
"memoryRequest": "100Mi",
"cpuRequest": "100m"
}
],
"docker": {
"ipMasq": false,
"ipTables": false,
"logDriver": "json-file",
"logLevel": "warn",
"logOpt": [
"max-size=10m",
"max-file=5"
],
"storage": "overlay2,overlay,aufs",
"version": "18.06.3"
},
"kubeDNS": {
"cacheMaxSize": 1000,
"cacheMaxConcurrent": 150,
"domain": "cluster.local",
"replicas": 2,
"serverIP": "100.64.0.10",
"memoryRequest": "70Mi",
"cpuRequest": "100m",
"memoryLimit": "170Mi"
},
"kubeAPIServer": {
"image": "k8s.gcr.io/kube-apiserver:v1.15.5",
"logLevel": 2,
"cloudProvider": "aws",
"securePort": 443,
"insecurePort": 8080,
"bindAddress": "0.0.0.0",
"insecureBindAddress": "127.0.0.1",
"enableAdmissionPlugins": [
"NamespaceLifecycle",
"LimitRanger",
"ServiceAccount",
"PersistentVolumeLabel",
"DefaultStorageClass",
"DefaultTolerationSeconds",
"MutatingAdmissionWebhook",
"ValidatingAdmissionWebhook",
"NodeRestriction",
"ResourceQuota"
],
"serviceClusterIPRange": "100.64.0.0/13",
"etcdServers": [
"http://127.0.0.1:4001"
],
"etcdServersOverrides": [
"/events#http://127.0.0.1:4002"
],
"allowPrivileged": true,
"apiServerCount": 1,
"anonymousAuth": false,
"kubeletPreferredAddressTypes": [
"InternalIP",
"Hostname",
"ExternalIP"
],
"storageBackend": "etcd3",
"authorizationMode": "RBAC",
"requestheaderUsernameHeaders": [
"X-Remote-User"
],
"requestheaderGroupHeaders": [
"X-Remote-Group"
],
"requestheaderExtraHeaderPrefixes": [
"X-Remote-Extra-"
],
"requestheaderAllowedNames": [
"aggregator"
]
},
"kubeControllerManager": {
"logLevel": 2,
"image": "k8s.gcr.io/kube-controller-manager:v1.15.5",
"cloudProvider": "aws",
"clusterName": "kops.domain.com",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": true,
"leaderElection": {
"leaderElect": true
},
"attachDetachReconcileSyncPeriod": "1m0s",
"useServiceAccountCredentials": true
},
"kubeScheduler": {
"logLevel": 2,
"image": "k8s.gcr.io/kube-scheduler:v1.15.5",
"leaderElection": {
"leaderElect": true
}
},
"kubeProxy": {
"image": "k8s.gcr.io/kube-proxy:v1.15.5",
"cpuRequest": "100m",
"logLevel": 2,
"clusterCIDR": "100.96.0.0/11",
"hostnameOverride": "@aws"
},
"kubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "kubenet",
"cloudProvider": "aws",
"cgroupRoot": "/",
"nonMasqueradeCIDR": "100.64.0.0/10",
"networkPluginMTU": 9001,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"ExperimentalCriticalPodAnnotation": "true"
}
},
"masterKubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "kubenet",
"cloudProvider": "aws",
"cgroupRoot": "/",
"registerSchedulable": false,
"nonMasqueradeCIDR": "100.64.0.0/10",
"networkPluginMTU": 9001,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"ExperimentalCriticalPodAnnotation": "true"
}
},
"networking": {
"kubenet": {}
},
"api": {
"dns": {}
},
"authorization": {
"rbac": {}
},
"iam": {
"legacy": false,
"allowContainerRegistry": true
}
}
I1212 13:18:36.865902 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:36.866092 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:37.045267 402535 aws_cloud.go:1407] checking if instance type "m3.medium" is supported in region "us-west-1"
I1212 13:18:37.045475 402535 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings
I1212 13:18:37.522110 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.4.0 <1.5.0
I1212 13:18:37.522187 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.5.0 <1.6.0
I1212 13:18:37.522227 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.6.0 <1.7.0
I1212 13:18:37.522247 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.7.0 <1.8.0
I1212 13:18:37.522262 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.8.0 <1.9.0
I1212 13:18:37.522276 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.9.0 <1.10.0
I1212 13:18:37.522290 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.10.0 <1.11.0
I1212 13:18:37.522334 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.11.0 <1.12.0
I1212 13:18:37.522349 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.12.0 <1.13.0
I1212 13:18:37.522363 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.13.0 <1.14.0
I1212 13:18:37.522377 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.14.0 <1.15.0
I1212 13:18:37.522617 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:37.522864 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:37.708336 402535 aws_cloud.go:1407] checking if instance type "t2.medium" is supported in region "us-west-1"
I1212 13:18:37.708619 402535 request_logger.go:45] AWS request: ec2/DescribeReservedInstancesOfferings
I1212 13:18:38.065134 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.4.0 <1.5.0
I1212 13:18:38.065213 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.5.0 <1.6.0
I1212 13:18:38.065234 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.6.0 <1.7.0
I1212 13:18:38.065249 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.7.0 <1.8.0
I1212 13:18:38.065263 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.8.0 <1.9.0
I1212 13:18:38.065296 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.9.0 <1.10.0
I1212 13:18:38.065315 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.10.0 <1.11.0
I1212 13:18:38.065336 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.11.0 <1.12.0
I1212 13:18:38.065351 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.12.0 <1.13.0
I1212 13:18:38.065386 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.13.0 <1.14.0
I1212 13:18:38.065403 402535 channel.go:279] Kubernetes version "1.15.5" does not match range: >=1.14.0 <1.15.0
I1212 13:18:38.079275 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/config"
I1212 13:18:38.164338 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/config"
I1212 13:18:38.164388 402535 s3context.go:238] Checking default bucket encryption for "kops-domain-com-state-store"
I1212 13:18:38.164395 402535 s3context.go:243] Calling S3 GetBucketEncryption Bucket="kops-domain-com-state-store"
I1212 13:18:38.246177 402535 s3context.go:263] bucket "kops-domain-com-state-store" has default encryption set to true
I1212 13:18:38.246235 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:38.246242 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/config" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:38.414915 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a"
I1212 13:18:38.541185 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a"
I1212 13:18:38.541256 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:38.541265 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/master-us-west-1a" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:38.671391 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes"
I1212 13:18:38.756277 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes"
I1212 13:18:38.756356 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:38.756373 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/nodes" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:38.870038 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/cluster.spec"
I1212 13:18:38.870105 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:38.870122 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/cluster.spec" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:38.976629 402535 create_cluster.go:1496] Using SSH public key: /home/user/.ssh/id_rsa.pub
I1212 13:18:38.976759 402535 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2"
I1212 13:18:38.976781 402535 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:38.976787 402535 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
Previewing changes that will be made:
I1212 13:18:39.117271 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/config"
I1212 13:18:39.229866 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/instancegroup/"
I1212 13:18:39.330955 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/instancegroup: [s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes]
I1212 13:18:39.331668 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a"
I1212 13:18:39.424805 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes"
I1212 13:18:39.514982 402535 channel.go:99] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/"
I1212 13:18:39.515080 402535 channel.go:104] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable"
I1212 13:18:39.515157 402535 context.go:177] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable
I1212 13:18:39.522085 402535 channel.go:113] Channel contents: spec:
images:
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 )
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.4.0 <1.5.0"
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.5.0 <1.6.0"
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.6.0 <1.7.0"
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.7.0 <1.8.0"
- name: kope.io/k8s-1.8-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.8.0 <1.9.0"
- name: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.9.0 <1.10.0"
- name: kope.io/k8s-1.10-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.10.0 <1.11.0"
# Stretch is the default for 1.11 (for nvme)
- name: kope.io/k8s-1.11-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.11.0 <1.12.0"
- name: kope.io/k8s-1.12-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.12.0 <1.13.0"
- name: kope.io/k8s-1.13-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.13.0 <1.14.0"
- name: kope.io/k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.14.0 <1.15.0"
- name: kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.15.0"
- providerID: gce
name: "cos-cloud/cos-stable-65-10323-99-0"
cluster:
kubernetesVersion: v1.5.8
networking:
kubenet: {}
kubernetesVersions:
- range: ">=1.17.0"
recommendedVersion: 1.17.0
requiredVersion: 1.17.0
- range: ">=1.16.0"
recommendedVersion: 1.16.2
requiredVersion: 1.16.0
- range: ">=1.15.0"
recommendedVersion: 1.15.5
requiredVersion: 1.15.0
- range: ">=1.14.0"
recommendedVersion: 1.14.8
requiredVersion: 1.14.0
- range: ">=1.13.0"
recommendedVersion: 1.13.12
requiredVersion: 1.13.0
- range: ">=1.12.0"
recommendedVersion: 1.12.10
requiredVersion: 1.12.0
- range: ">=1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.0
- range: "<1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.10
kopsVersions:
- range: ">=1.17.0-alpha.1"
#recommendedVersion: "1.17.0"
#requiredVersion: 1.17.0
kubernetesVersion: 1.17.0
- range: ">=1.16.0-alpha.1"
#recommendedVersion: "1.16.0"
#requiredVersion: 1.16.0
kubernetesVersion: 1.16.2
- range: ">=1.15.0-alpha.1"
#recommendedVersion: "1.15.0"
#requiredVersion: 1.15.0
kubernetesVersion: 1.15.5
- range: ">=1.14.0-alpha.1"
#recommendedVersion: "1.14.0"
#requiredVersion: 1.14.0
kubernetesVersion: 1.14.8
- range: ">=1.13.0-alpha.1"
#recommendedVersion: "1.13.0"
#requiredVersion: 1.13.0
kubernetesVersion: 1.13.12
- range: ">=1.12.0-alpha.1"
recommendedVersion: "1.12.1"
#requiredVersion: 1.12.0
kubernetesVersion: 1.12.10
- range: ">=1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.11.0
kubernetesVersion: 1.11.10
- range: "<1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.10.0
kubernetesVersion: 1.11.10
I1212 13:18:39.522610 402535 populate_cluster_spec.go:371] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11
I1212 13:18:39.522684 402535 populate_cluster_spec.go:378] Defaulted ServiceClusterIPRange to 100.64.0.0/13
I1212 13:18:39.522782 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:39.522948 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:39.704986 402535 subnets.go:49] All subnets have CIDRs; skipping assignment logic
I1212 13:18:39.705032 402535 defaults.go:224] Not setting up Proxy Excludes
I1212 13:18:39.705092 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:39.705257 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:39.941969 402535 utils.go:167] Querying for all DNS zones to find match for "kops.domain.com"
I1212 13:18:39.942163 402535 route53.go:53] AWS request: route53 ListHostedZones
I1212 13:18:40.029798 402535 populate_cluster_spec.go:253] Defaulting DNS zone to: Z237FHI0B4E3ZX
I1212 13:18:40.029868 402535 tagbuilder.go:95] tags: [_aws _k8s_1_6]
I1212 13:18:40.030128 402535 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder
I1212 13:18:40.030162 402535 options_loader.go:130] executing builder *components.EtcdOptionsBuilder
I1212 13:18:40.030180 402535 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I1212 13:18:40.030193 402535 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder
I1212 13:18:40.030200 402535 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder
I1212 13:18:40.030253 402535 options_loader.go:130] executing builder *components.DockerOptionsBuilder
I1212 13:18:40.030266 402535 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder
I1212 13:18:40.030275 402535 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder
I1212 13:18:40.030289 402535 options_loader.go:130] executing builder *components.KubeletOptionsBuilder
I1212 13:18:40.030338 402535 kubelet.go:171] Cloud Provider: aws
I1212 13:18:40.030363 402535 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder
I1212 13:18:40.030375 402535 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure
I1212 13:18:40.030409 402535 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s
I1212 13:18:40.030428 402535 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder
I1212 13:18:40.030462 402535 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder
I1212 13:18:40.031032 402535 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder
I1212 13:18:40.031066 402535 options_loader.go:130] executing builder *components.EtcdOptionsBuilder
I1212 13:18:40.031078 402535 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I1212 13:18:40.031087 402535 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder
I1212 13:18:40.031094 402535 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder
I1212 13:18:40.031143 402535 options_loader.go:130] executing builder *components.DockerOptionsBuilder
I1212 13:18:40.031155 402535 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder
I1212 13:18:40.031163 402535 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder
I1212 13:18:40.031171 402535 options_loader.go:130] executing builder *components.KubeletOptionsBuilder
I1212 13:18:40.031181 402535 kubelet.go:171] Cloud Provider: aws
I1212 13:18:40.031191 402535 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder
I1212 13:18:40.031201 402535 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure
I1212 13:18:40.031231 402535 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder
I1212 13:18:40.031241 402535 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder
I1212 13:18:40.031972 402535 spec_builder.go:49] options: {
"channel": "stable",
"configBase": "s3://kops-domain-com-state-store/kops.domain.com",
"cloudProvider": "aws",
"kubernetesVersion": "1.15.5",
"subnets": [
{
"name": "us-west-1a",
"cidr": "172.20.32.0/19",
"zone": "us-west-1a",
"type": "Public"
}
],
"masterPublicName": "api.kops.domain.com",
"masterInternalName": "api.internal.kops.domain.com",
"networkCIDR": "172.20.0.0/16",
"topology": {
"masters": "public",
"nodes": "public",
"dns": {
"type": "Public"
}
},
"secretStore": "s3://kops-domain-com-state-store/kops.domain.com/secrets",
"keyStore": "s3://kops-domain-com-state-store/kops.domain.com/pki",
"configStore": "s3://kops-domain-com-state-store/kops.domain.com",
"dnsZone": "Z237FHI0B4E3ZX",
"clusterDNSDomain": "cluster.local",
"serviceClusterIPRange": "100.64.0.0/13",
"nonMasqueradeCIDR": "100.64.0.0/10",
"sshAccess": [
"0.0.0.0/0"
],
"kubernetesApiAccess": [
"0.0.0.0/0"
],
"etcdClusters": [
{
"name": "main",
"provider": "Manager",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "master-us-west-1a"
}
],
"enableEtcdTLS": true,
"enableTLSAuth": true,
"version": "3.3.10",
"backups": {
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"
},
"manager": {},
"memoryRequest": "100Mi",
"cpuRequest": "200m"
},
{
"name": "events",
"provider": "Manager",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "master-us-west-1a"
}
],
"enableEtcdTLS": true,
"enableTLSAuth": true,
"version": "3.3.10",
"backups": {
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"
},
"manager": {},
"memoryRequest": "100Mi",
"cpuRequest": "100m"
}
],
"docker": {
"ipMasq": false,
"ipTables": false,
"logDriver": "json-file",
"logLevel": "warn",
"logOpt": [
"max-size=10m",
"max-file=5"
],
"storage": "overlay2,overlay,aufs",
"version": "18.06.3"
},
"kubeDNS": {
"cacheMaxSize": 1000,
"cacheMaxConcurrent": 150,
"domain": "cluster.local",
"replicas": 2,
"serverIP": "100.64.0.10",
"memoryRequest": "70Mi",
"cpuRequest": "100m",
"memoryLimit": "170Mi"
},
"kubeAPIServer": {
"image": "k8s.gcr.io/kube-apiserver:v1.15.5",
"logLevel": 2,
"cloudProvider": "aws",
"securePort": 443,
"insecurePort": 8080,
"bindAddress": "0.0.0.0",
"insecureBindAddress": "127.0.0.1",
"enableAdmissionPlugins": [
"NamespaceLifecycle",
"LimitRanger",
"ServiceAccount",
"PersistentVolumeLabel",
"DefaultStorageClass",
"DefaultTolerationSeconds",
"MutatingAdmissionWebhook",
"ValidatingAdmissionWebhook",
"NodeRestriction",
"ResourceQuota"
],
"serviceClusterIPRange": "100.64.0.0/13",
"etcdServers": [
"http://127.0.0.1:4001"
],
"etcdServersOverrides": [
"/events#http://127.0.0.1:4002"
],
"allowPrivileged": true,
"apiServerCount": 1,
"anonymousAuth": false,
"kubeletPreferredAddressTypes": [
"InternalIP",
"Hostname",
"ExternalIP"
],
"storageBackend": "etcd3",
"authorizationMode": "RBAC",
"requestheaderUsernameHeaders": [
"X-Remote-User"
],
"requestheaderGroupHeaders": [
"X-Remote-Group"
],
"requestheaderExtraHeaderPrefixes": [
"X-Remote-Extra-"
],
"requestheaderAllowedNames": [
"aggregator"
]
},
"kubeControllerManager": {
"logLevel": 2,
"image": "k8s.gcr.io/kube-controller-manager:v1.15.5",
"cloudProvider": "aws",
"clusterName": "kops.domain.com",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": true,
"leaderElection": {
"leaderElect": true
},
"attachDetachReconcileSyncPeriod": "1m0s",
"useServiceAccountCredentials": true
},
"kubeScheduler": {
"logLevel": 2,
"image": "k8s.gcr.io/kube-scheduler:v1.15.5",
"leaderElection": {
"leaderElect": true
}
},
"kubeProxy": {
"image": "k8s.gcr.io/kube-proxy:v1.15.5",
"cpuRequest": "100m",
"logLevel": 2,
"clusterCIDR": "100.96.0.0/11",
"hostnameOverride": "@aws"
},
"kubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "kubenet",
"cloudProvider": "aws",
"cgroupRoot": "/",
"nonMasqueradeCIDR": "100.64.0.0/10",
"networkPluginMTU": 9001,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"ExperimentalCriticalPodAnnotation": "true"
}
},
"masterKubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "kubenet",
"cloudProvider": "aws",
"cgroupRoot": "/",
"registerSchedulable": false,
"nonMasqueradeCIDR": "100.64.0.0/10",
"networkPluginMTU": 9001,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"ExperimentalCriticalPodAnnotation": "true"
}
},
"networking": {
"kubenet": {}
},
"api": {
"dns": {}
},
"authorization": {
"rbac": {}
},
"iam": {
"legacy": false,
"allowContainerRegistry": true
}
}
I1212 13:18:40.032211 402535 channel.go:241] version range ">=1.17.0-alpha.1" does not apply to version "1.15.0"; skipping
I1212 13:18:40.032230 402535 channel.go:241] version range ">=1.16.0-alpha.1" does not apply to version "1.15.0"; skipping
I1212 13:18:40.032248 402535 channel.go:152] VersionRecommendationSpec does not specify RecommendedVersion
I1212 13:18:40.032272 402535 channel.go:192] VersionRecommendationSpec does not specify RequiredVersion
I1212 13:18:40.032281 402535 channel.go:220] version range ">=1.17.0" does not apply to version "1.15.5"; skipping
I1212 13:18:40.032288 402535 channel.go:220] version range ">=1.16.0" does not apply to version "1.15.5"; skipping
I1212 13:18:40.032298 402535 channel.go:144] RecommendedVersion="1.15.5", Have="1.15.5". No upgrade needed.
I1212 13:18:40.032307 402535 channel.go:184] RequiredVersion="1.15.0", Have="1.15.5". No upgrade needed.
I1212 13:18:40.032405 402535 context.go:177] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet.sha256
I1212 13:18:40.058376 402535 builder.go:318] Found hash "de590308448a62982aa6209b52da6de69ee4855e449e5508c288c8d12d074ec5" for "https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet"
I1212 13:18:40.058520 402535 builder.go:235] adding file: &{DownloadURL:https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet CanonicalURL:<nil> SHAValue:de590308448a62982aa6209b52da6de69ee4855e449e5508c288c8d12d074ec5}
I1212 13:18:40.058601 402535 context.go:177] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl.sha256
I1212 13:18:40.062598 402535 builder.go:318] Found hash "be84cf088241f29eca6221430f8fdb3788bc80eccb79b839d721c0daa6b46244" for "https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl"
I1212 13:18:40.062738 402535 builder.go:235] adding file: &{DownloadURL:https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl CanonicalURL:<nil> SHAValue:be84cf088241f29eca6221430f8fdb3788bc80eccb79b839d721c0daa6b46244}
I1212 13:18:40.062860 402535 networking.go:175] Adding default CNI asset for k8s >= 1.11: https://storage.googleapis.com/kubernetes-release/network-plugins/cni-plugins-amd64-v0.6.0.tgz
I1212 13:18:40.062945 402535 urls.go:81] Using default base url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/"
I1212 13:18:40.063187 402535 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz.sha256
I1212 13:18:40.466055 402535 builder.go:318] Found hash "71b7bc444ba0a5f7cd7a36e91b594c1c3d13890e160d85e0dfde38c46a24e416" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz"
I1212 13:18:40.466108 402535 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz CanonicalURL:<nil> SHAValue:71b7bc444ba0a5f7cd7a36e91b594c1c3d13890e160d85e0dfde38c46a24e416}
I1212 13:18:40.466174 402535 urls.go:73] Using cached kopsBaseUrl url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/"
I1212 13:18:40.466196 402535 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup.sha256
I1212 13:18:40.566422 402535 builder.go:318] Found hash "9604ef18267ad7b5cf4cebbf7ab64423cf5bb0342d169c608ac6376e6af26d81" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup"
I1212 13:18:40.566598 402535 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup CanonicalURL:<nil> SHAValue:9604ef18267ad7b5cf4cebbf7ab64423cf5bb0342d169c608ac6376e6af26d81}
I1212 13:18:40.566650 402535 urls.go:137] Using default nodeup location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup"
I1212 13:18:40.566720 402535 urls.go:73] Using cached kopsBaseUrl url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/"
I1212 13:18:40.566792 402535 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz.sha256
I1212 13:18:40.666620 402535 builder.go:318] Found hash "42a9c4324fe26d63ce11f3dd7836371bc93fa06ca8f479807728f3746e27061b" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz"
I1212 13:18:40.666718 402535 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz CanonicalURL:<nil> SHAValue:42a9c4324fe26d63ce11f3dd7836371bc93fa06ca8f479807728f3746e27061b}
I1212 13:18:40.666791 402535 urls.go:178] Using default protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz"
I1212 13:18:40.666885 402535 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:40.667109 402535 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:40.846829 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/ssh/public/admin/"
I1212 13:18:40.946640 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin: [s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2]
I1212 13:18:40.946724 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2"
I1212 13:18:41.037083 402535 route53.go:53] AWS request: route53 ListHostedZones
I1212 13:18:41.124191 402535 dns.go:104] Doing DNS lookup to verify NS records for "kops.domain.com"
I1212 13:18:41.133158 402535 dns.go:121] Found NS records for "kops.domain.com": [ns-1946.awsdns-51.co.uk. ns-287.awsdns-35.com. ns-947.awsdns-54.net. ns-1265.awsdns-30.org.]
I1212 13:18:41.133229 402535 tagbuilder.go:95] tags: [_aws _k8s_1_6]
I1212 13:18:41.133630 402535 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml"
I1212 13:18:41.133726 402535 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml"
I1212 13:18:41.133895 402535 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml"
I1212 13:18:41.134026 402535 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml"
I1212 13:18:41.134139 402535 templates.go:80] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml"
I1212 13:18:41.134284 402535 templates.go:80] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.134341 402535 templates.go:88] loading resource "addons/limit-range.addons.k8s.io/addon.yaml"
I1212 13:18:41.134375 402535 templates.go:88] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:41.134961 402535 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.135847 402535 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.136360 402535 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:41.138340 402535 templates.go:80] loading (templated) resource "addons/networking.cilium.io/k8s-1.12.yaml"
I1212 13:18:41.139933 402535 templates.go:80] loading (templated) resource "addons/networking.cilium.io/k8s-1.7.yaml"
I1212 13:18:41.140682 402535 templates.go:88] loading resource "addons/networking.kope.io/k8s-1.12.yaml"
I1212 13:18:41.141073 402535 templates.go:88] loading resource "addons/networking.kope.io/k8s-1.6.yaml"
I1212 13:18:41.141376 402535 templates.go:88] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml"
I1212 13:18:41.141920 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml"
I1212 13:18:41.142531 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.8.yaml"
I1212 13:18:41.143159 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.9.yaml"
I1212 13:18:41.143675 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml"
I1212 13:18:41.144629 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.12.yaml"
I1212 13:18:41.147035 402535 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.12.yaml"
I1212 13:18:41.147151 402535 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml"
I1212 13:18:41.147308 402535 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.7.yaml"
I1212 13:18:41.147408 402535 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.8.yaml"
I1212 13:18:41.147509 402535 templates.go:80] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml"
I1212 13:18:41.147583 402535 templates.go:88] loading resource "addons/external-dns.addons.k8s.io/README.md"
I1212 13:18:41.147676 402535 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.147779 402535 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.147841 402535 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:41.147979 402535 templates.go:80] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.148084 402535 templates.go:80] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.148167 402535 templates.go:80] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml"
I1212 13:18:41.148252 402535 templates.go:80] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml"
I1212 13:18:41.148361 402535 templates.go:88] loading resource "addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:41.148406 402535 templates.go:88] loading resource "addons/core.addons.k8s.io/addon.yaml"
I1212 13:18:41.148473 402535 templates.go:80] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.148556 402535 templates.go:80] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.7.yaml"
I1212 13:18:41.148594 402535 templates.go:88] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:41.148652 402535 templates.go:88] loading resource "addons/storage-gce.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:41.148695 402535 templates.go:88] loading resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.148770 402535 templates.go:88] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.148862 402535 templates.go:80] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml"
I1212 13:18:41.148935 402535 templates.go:80] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml"
I1212 13:18:41.148985 402535 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:41.149019 402535 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.149057 402535 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:41.149138 402535 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.149206 402535 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.149254 402535 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:41.149542 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7-v3.yaml"
I1212 13:18:41.149755 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7.yaml"
I1212 13:18:41.149934 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml"
I1212 13:18:41.150293 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.12.yaml"
I1212 13:18:41.150614 402535 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml"
I1212 13:18:41.150763 402535 templates.go:80] loading (templated) resource "addons/networking.romana/k8s-1.12.yaml"
I1212 13:18:41.150895 402535 templates.go:80] loading (templated) resource "addons/networking.romana/k8s-1.7.yaml"
I1212 13:18:41.150969 402535 templates.go:80] loading (templated) resource "addons/authentication.aws/k8s-1.10.yaml"
I1212 13:18:41.151041 402535 templates.go:80] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml"
I1212 13:18:41.151081 402535 templates.go:88] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:41.151159 402535 templates.go:80] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.11.yaml"
I1212 13:18:41.151222 402535 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml"
I1212 13:18:41.151273 402535 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.151335 402535 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:41.151418 402535 templates.go:80] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:41.151559 402535 templates.go:80] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml"
I1212 13:18:41.151655 402535 templates.go:80] loading (templated) resource "addons/networking.flannel/k8s-1.6.yaml"
I1212 13:18:41.151738 402535 templates.go:80] loading (templated) resource "addons/networking.flannel/pre-k8s-1.6.yaml"
I1212 13:18:41.151822 402535 templates.go:88] loading resource "addons/authentication.kope.io/k8s-1.12.yaml"
I1212 13:18:41.152537 402535 templates.go:88] loading resource "addons/authentication.kope.io/k8s-1.8.yaml"
I1212 13:18:41.152661 402535 tree_walker.go:98] visit "cloudup/resources"
I1212 13:18:41.152690 402535 tree_walker.go:98] visit "cloudup/resources/addons"
I1212 13:18:41.152734 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io"
I1212 13:18:41.152760 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:41.152803 402535 loader.go:362] loading resource "addons/storage-gce.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:41.152812 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.152852 402535 loader.go:362] loading resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.152863 402535 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io"
I1212 13:18:41.152878 402535 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1212 13:18:41.152930 402535 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:41.152939 402535 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:41.153032 402535 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.153046 402535 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml.template"
I1212 13:18:41.153109 402535 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.153118 402535 tree_walker.go:98] visit "cloudup/resources/addons/scheduler.addons.k8s.io"
I1212 13:18:41.153130 402535 tree_walker.go:98] visit "cloudup/resources/addons/scheduler.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.153181 402535 loader.go:362] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.153191 402535 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io"
I1212 13:18:41.153205 402535 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml.template"
I1212 13:18:41.153300 402535 loader.go:354] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml"
I1212 13:18:41.153316 402535 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml.template"
I1212 13:18:41.153464 402535 loader.go:354] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml"
I1212 13:18:41.153484 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io"
I1212 13:18:41.153525 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.153591 402535 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.153604 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:41.153707 402535 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:41.153723 402535 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:41.153760 402535 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:41.153769 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws"
I1212 13:18:41.153783 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws/k8s-1.10.yaml.template"
I1212 13:18:41.153853 402535 loader.go:354] loading (templated) resource "addons/authentication.aws/k8s-1.10.yaml"
I1212 13:18:41.153864 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws/k8s-1.12.yaml.template"
I1212 13:18:41.153921 402535 loader.go:354] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml"
I1212 13:18:41.153930 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org"
I1212 13:18:41.153947 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.12.yaml.template"
I1212 13:18:41.154259 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.12.yaml"
I1212 13:18:41.154303 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.6.yaml.template"
I1212 13:18:41.154717 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml"
I1212 13:18:41.154810 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.7-v3.yaml.template"
I1212 13:18:41.155051 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7-v3.yaml"
I1212 13:18:41.155078 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.7.yaml.template"
I1212 13:18:41.155684 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7.yaml"
I1212 13:18:41.155992 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/pre-k8s-1.6.yaml.template"
I1212 13:18:41.156387 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml"
I1212 13:18:41.156409 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana"
I1212 13:18:41.156428 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana/k8s-1.7.yaml.template"
I1212 13:18:41.156700 402535 loader.go:354] loading (templated) resource "addons/networking.romana/k8s-1.7.yaml"
I1212 13:18:41.156723 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana/k8s-1.12.yaml.template"
I1212 13:18:41.156986 402535 loader.go:354] loading (templated) resource "addons/networking.romana/k8s-1.12.yaml"
I1212 13:18:41.157012 402535 tree_walker.go:98] visit "cloudup/resources/addons/digitalocean-cloud-controller.addons.k8s.io"
I1212 13:18:41.157031 402535 tree_walker.go:98] visit "cloudup/resources/addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml.template"
I1212 13:18:41.157212 402535 loader.go:354] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:41.157226 402535 tree_walker.go:98] visit "cloudup/resources/addons/kubelet-api.rbac.addons.k8s.io"
I1212 13:18:41.157248 402535 tree_walker.go:98] visit "cloudup/resources/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:41.157309 402535 loader.go:362] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:41.157327 402535 tree_walker.go:98] visit "cloudup/resources/addons/openstack.addons.k8s.io"
I1212 13:18:41.157350 402535 tree_walker.go:98] visit "cloudup/resources/addons/openstack.addons.k8s.io/k8s-1.11.yaml.template"
I1212 13:18:41.157559 402535 loader.go:354] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.11.yaml"
I1212 13:18:41.157578 402535 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io"
I1212 13:18:41.157604 402535 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml.template"
I1212 13:18:41.157797 402535 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml"
I1212 13:18:41.157813 402535 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:41.158039 402535 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.158059 402535 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml.template"
I1212 13:18:41.158220 402535 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:41.158234 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io"
I1212 13:18:41.158252 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.8.yaml"
I1212 13:18:41.158343 402535 loader.go:362] loading resource "addons/authentication.kope.io/k8s-1.8.yaml"
I1212 13:18:41.158852 402535 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.12.yaml"
I1212 13:18:41.158956 402535 loader.go:362] loading resource "addons/authentication.kope.io/k8s-1.12.yaml"
I1212 13:18:41.158978 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel"
I1212 13:18:41.158997 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/k8s-1.12.yaml.template"
I1212 13:18:41.159337 402535 loader.go:354] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml"
I1212 13:18:41.159359 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/k8s-1.6.yaml.template"
I1212 13:18:41.159658 402535 loader.go:354] loading (templated) resource "addons/networking.flannel/k8s-1.6.yaml"
I1212 13:18:41.159683 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/pre-k8s-1.6.yaml.template"
I1212 13:18:41.159924 402535 loader.go:354] loading (templated) resource "addons/networking.flannel/pre-k8s-1.6.yaml"
I1212 13:18:41.159941 402535 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io"
I1212 13:18:41.159960 402535 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io/addon.yaml"
I1212 13:18:41.160012 402535 loader.go:362] loading resource "addons/limit-range.addons.k8s.io/addon.yaml"
I1212 13:18:41.160023 402535 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:41.162426 402535 loader.go:362] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:41.162464 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni"
I1212 13:18:41.162510 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml.template"
I1212 13:18:41.162609 402535 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml"
I1212 13:18:41.162629 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml.template"
I1212 13:18:41.162730 402535 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml"
I1212 13:18:41.162748 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml.template"
I1212 13:18:41.162867 402535 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml"
I1212 13:18:41.162919 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml.template"
I1212 13:18:41.163025 402535 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml"
I1212 13:18:41.163039 402535 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io"
I1212 13:18:41.163056 402535 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml.template"
I1212 13:18:41.163198 402535 loader.go:354] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml"
I1212 13:18:41.163215 402535 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:41.163367 402535 loader.go:354] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.163384 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io"
I1212 13:18:41.163414 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.6.yaml.template"
I1212 13:18:41.163482 402535 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.163493 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1212 13:18:41.163577 402535 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:41.163588 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/README.md"
I1212 13:18:41.163730 402535 loader.go:362] loading resource "addons/external-dns.addons.k8s.io/README.md"
I1212 13:18:41.163743 402535 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:41.163802 402535 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.163813 402535 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io"
I1212 13:18:41.163835 402535 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:41.164015 402535 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.164029 402535 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml.template"
I1212 13:18:41.164223 402535 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.164240 402535 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1212 13:18:41.164363 402535 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:41.164381 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io"
I1212 13:18:41.164450 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io/k8s-1.12.yaml.template"
I1212 13:18:41.164757 402535 loader.go:354] loading (templated) resource "addons/networking.cilium.io/k8s-1.12.yaml"
I1212 13:18:41.164788 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io/k8s-1.7.yaml.template"
I1212 13:18:41.165054 402535 loader.go:354] loading (templated) resource "addons/networking.cilium.io/k8s-1.7.yaml"
I1212 13:18:41.165078 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io"
I1212 13:18:41.165097 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/k8s-1.12.yaml"
I1212 13:18:41.165174 402535 loader.go:362] loading resource "addons/networking.kope.io/k8s-1.12.yaml"
I1212 13:18:41.165185 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/k8s-1.6.yaml"
I1212 13:18:41.165287 402535 loader.go:362] loading resource "addons/networking.kope.io/k8s-1.6.yaml"
I1212 13:18:41.165307 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/pre-k8s-1.6.yaml"
I1212 13:18:41.165363 402535 loader.go:362] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml"
I1212 13:18:41.165374 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal"
I1212 13:18:41.165400 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.8.yaml.template"
I1212 13:18:41.165664 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.8.yaml"
I1212 13:18:41.165692 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.9.yaml.template"
I1212 13:18:41.166249 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.9.yaml"
I1212 13:18:41.166363 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml.template"
I1212 13:18:41.166668 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml"
I1212 13:18:41.166701 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.12.yaml.template"
I1212 13:18:41.167142 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.12.yaml"
I1212 13:18:41.167176 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.6.yaml.template"
I1212 13:18:41.167697 402535 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml"
I1212 13:18:41.167732 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave"
I1212 13:18:41.167757 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.12.yaml.template"
I1212 13:18:41.167875 402535 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.12.yaml"
I1212 13:18:41.167889 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.6.yaml.template"
I1212 13:18:41.168157 402535 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml"
I1212 13:18:41.168986 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.7.yaml.template"
I1212 13:18:41.169214 402535 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.7.yaml"
I1212 13:18:41.169229 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.8.yaml.template"
I1212 13:18:41.169925 402535 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.8.yaml"
I1212 13:18:41.169948 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/pre-k8s-1.6.yaml.template"
I1212 13:18:41.170157 402535 loader.go:354] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml"
I1212 13:18:41.170175 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io"
I1212 13:18:41.170198 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/addon.yaml"
I1212 13:18:41.170518 402535 loader.go:362] loading resource "addons/core.addons.k8s.io/addon.yaml"
I1212 13:18:41.170535 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:41.170709 402535 loader.go:354] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.170737 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/k8s-1.7.yaml.template"
I1212 13:18:41.170991 402535 loader.go:354] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.7.yaml"
I1212 13:18:41.171011 402535 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:41.171154 402535 loader.go:362] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:41.171167 402535 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io"
I1212 13:18:41.171185 402535 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io/k8s-1.6.yaml.template"
I1212 13:18:41.171441 402535 loader.go:354] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.171455 402535 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:41.171935 402535 loader.go:354] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.171962 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter"
I1212 13:18:41.171989 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.12.yaml.template"
I1212 13:18:41.172346 402535 loader.go:354] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml"
I1212 13:18:41.172362 402535 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.6.yaml.template"
I1212 13:18:41.172765 402535 loader.go:354] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml"
I1212 13:18:41.172784 402535 tree_walker.go:98] visit "cloudup/resources/addons/rbac.addons.k8s.io"
I1212 13:18:41.172817 402535 tree_walker.go:98] visit "cloudup/resources/addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:41.173062 402535 loader.go:362] loading resource "addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:41.173363 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: v1
kind: Namespace
metadata:
name: kube-system
I1212 13:18:41.173379 402535 bootstrapchannelbuilder.go:79] hash 3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90
I1212 13:18:41.175254 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0"
I1212 13:18:41.176332 402535 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000
I1212 13:18:41.176359 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000
I1212 13:18:41.176370 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000
I1212 13:18:41.176376 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000
I1212 13:18:41.176382 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000
I1212 13:18:41.176387 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.176392 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000
I1212 13:18:41.176404 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/kubedns-amd64:1.9"
I1212 13:18:41.176416 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 8080.000000
I1212 13:18:41.176422 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.176427 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.176432 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.176437 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.176443 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10"
I1212 13:18:41.176450 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.176455 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.176460 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.176464 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.176469 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 8080.000000
I1212 13:18:41.176475 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000
I1212 13:18:41.176481 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000
I1212 13:18:41.176493 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/dnsmasq-metrics-amd64:1.0"
I1212 13:18:41.176518 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.176527 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.176532 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.176537 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:41.176542 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.176548 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000
I1212 13:18:41.176557 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/exechealthz-amd64:1.2"
I1212 13:18:41.176565 402535 visitor.go:40] float64 value at spec.template.spec.containers.[3].ports.[0].containerPort: 8080.000000
I1212 13:18:41.177967 402535 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000
I1212 13:18:41.177999 402535 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000
I1212 13:18:41.178320 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns-autoscaler
kubernetes.io/cluster-service: "true"
name: kube-dns-autoscaler
namespace: kube-system
spec:
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly",
"operator":"Exists"}]'
labels:
k8s-app: kube-dns-autoscaler
spec:
containers:
- command:
- /cluster-proportional-autoscaler
- --namespace=kube-system
- --configmap=kube-dns-autoscaler
- --mode=linear
- --target=Deployment/kube-dns
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"min":2}}
- --logtostderr=true
- --v=2
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0
name: autoscaler
resources:
requests:
cpu: 20m
memory: 10Mi
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
name: kube-dns
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns
strategy:
rollingUpdate:
maxSurge: 10%
maxUnavailable: 0
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly",
"operator":"Exists"}]'
labels:
k8s-app: kube-dns
spec:
containers:
- args:
- --domain=cluster.local.
- --dns-port=10053
- --config-map=kube-dns
- --v=2
env:
- name: PROMETHEUS_PORT
value: "10055"
image: k8s.gcr.io/kubedns-amd64:1.9
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthz-kubedns
port: 8080
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: kubedns
ports:
- containerPort: 10053
name: dns-local
protocol: UDP
- containerPort: 10053
name: dns-tcp-local
protocol: TCP
- containerPort: 10055
name: metrics
protocol: TCP
readinessProbe:
httpGet:
path: /readiness
port: 8081
scheme: HTTP
initialDelaySeconds: 3
timeoutSeconds: 5
resources:
limits:
memory: 170Mi
requests:
cpu: 100m
memory: 70Mi
- args:
- --cache-size=1000
- --dns-forward-max=150
- --no-resolv
- --server=127.0.0.1#10053
- --log-facility=-
- --min-port=1024
image: k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthz-dnsmasq
port: 8080
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: dnsmasq
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
resources:
requests:
cpu: 150m
memory: 10Mi
- args:
- --v=2
- --logtostderr
image: k8s.gcr.io/dnsmasq-metrics-amd64:1.0
livenessProbe:
failureThreshold: 5
httpGet:
path: /metrics
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: dnsmasq-metrics
ports:
- containerPort: 10054
name: metrics
protocol: TCP
resources:
requests:
memory: 10Mi
- args:
- --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 >/dev/null
- --url=/healthz-dnsmasq
- --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1:10053 >/dev/null
- --url=/healthz-kubedns
- --port=8080
- --quiet
image: k8s.gcr.io/exechealthz-amd64:1.2
name: healthz
ports:
- containerPort: 8080
protocol: TCP
resources:
limits:
memory: 50Mi
requests:
cpu: 10m
memory: 50Mi
dnsPolicy: Default
---
apiVersion: v1
kind: Service
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: KubeDNS
name: kube-dns
namespace: kube-system
spec:
clusterIP: 100.64.0.10
ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
selector:
k8s-app: kube-dns
I1212 13:18:41.178426 402535 bootstrapchannelbuilder.go:79] hash 895c961cb9365cbedb22edd20a7648182ae7ed3f
I1212 13:18:41.180770 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2"
I1212 13:18:41.181266 402535 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000
I1212 13:18:41.181288 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10"
I1212 13:18:41.181299 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000
I1212 13:18:41.181306 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000
I1212 13:18:41.181311 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.181321 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.181327 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:41.181332 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.181337 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.181342 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.181348 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000
I1212 13:18:41.181354 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000
I1212 13:18:41.181360 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000
I1212 13:18:41.181368 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000
I1212 13:18:41.181373 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000
I1212 13:18:41.181387 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10"
I1212 13:18:41.181395 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.181400 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.181405 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.181410 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:41.181415 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.181432 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10"
I1212 13:18:41.181439 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.181445 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:41.181450 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.181455 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.181460 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.181466 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000
I1212 13:18:41.181475 402535 visitor.go:35] string value at spec.template.spec.volumes.[0].configMap.optional: true
I1212 13:18:41.183429 402535 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000
I1212 13:18:41.183451 402535 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000
I1212 13:18:41.185314 402535 bootstrapchannelbuilder.go:76] Manifest {}
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns-autoscaler
kubernetes.io/cluster-service: "true"
name: kube-dns-autoscaler
namespace: kube-system
spec:
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly",
"operator":"Exists"}]'
labels:
k8s-app: kube-dns-autoscaler
spec:
containers:
- command:
- /cluster-proportional-autoscaler
- --namespace=kube-system
- --configmap=kube-dns-autoscaler
- --target=Deployment/kube-dns
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}
- --logtostderr=true
- --v=2
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2
name: autoscaler
resources:
requests:
cpu: 20m
memory: 10Mi
serviceAccountName: kube-dns-autoscaler
tolerations:
- key: CriticalAddonsOnly
operator: Exists
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
name: kube-dns
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns
strategy:
rollingUpdate:
maxSurge: 10%
maxUnavailable: 0
template:
metadata:
annotations:
prometheus.io/port: "10055"
prometheus.io/scrape: "true"
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly",
"operator":"Exists"}]'
labels:
k8s-app: kube-dns
spec:
containers:
- args:
- --config-dir=/kube-dns-config
- --dns-port=10053
- --domain=cluster.local.
- --v=2
env:
- name: PROMETHEUS_PORT
value: "10055"
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthcheck/kubedns
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: kubedns
ports:
- containerPort: 10053
name: dns-local
protocol: UDP
- containerPort: 10053
name: dns-tcp-local
protocol: TCP
- containerPort: 10055
name: metrics
protocol: TCP
readinessProbe:
httpGet:
path: /readiness
port: 8081
scheme: HTTP
initialDelaySeconds: 3
timeoutSeconds: 5
resources:
limits:
memory: 170Mi
requests:
cpu: 100m
memory: 70Mi
volumeMounts:
- mountPath: /kube-dns-config
name: kube-dns-config
- args:
- -v=2
- -logtostderr
- -configDir=/etc/k8s/dns/dnsmasq-nanny
- -restartDnsmasq=true
- --
- -k
- --cache-size=1000
- --dns-forward-max=150
- --no-negcache
- --log-facility=-
- --server=/cluster.local/127.0.0.1#10053
- --server=/in-addr.arpa/127.0.0.1#10053
- --server=/in6.arpa/127.0.0.1#10053
- --min-port=1024
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthcheck/dnsmasq
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: dnsmasq
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
resources:
requests:
cpu: 150m
memory: 20Mi
volumeMounts:
- mountPath: /etc/k8s/dns/dnsmasq-nanny
name: kube-dns-config
- args:
- --v=2
- --logtostderr
- --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A
- --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10
livenessProbe:
failureThreshold: 5
httpGet:
path: /metrics
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: sidecar
ports:
- containerPort: 10054
name: metrics
protocol: TCP
resources:
requests:
cpu: 10m
memory: 20Mi
dnsPolicy: Default
serviceAccountName: kube-dns
volumes:
- configMap:
name: kube-dns
optional: true
name: kube-dns-config
---
apiVersion: v1
kind: Service
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: KubeDNS
name: kube-dns
namespace: kube-system
spec:
clusterIP: 100.64.0.10
ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
selector:
k8s-app: kube-dns
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
- apiGroups:
- ""
resources:
- replicationcontrollers/scale
verbs:
- get
- update
- apiGroups:
- extensions
resources:
- deployments/scale
- replicasets/scale
verbs:
- get
- update
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- create
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kube-dns-autoscaler
subjects:
- kind: ServiceAccount
name: kube-dns-autoscaler
namespace: kube-system
I1212 13:18:41.185371 402535 bootstrapchannelbuilder.go:79] hash 191685ca6fe009302e55512b0eefc5a676433f10
I1212 13:18:41.190310 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0"
I1212 13:18:41.191299 402535 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000
I1212 13:18:41.191360 402535 visitor.go:40] float64 value at spec.template.spec.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution.[0].weight: 1.000000
I1212 13:18:41.191383 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13"
I1212 13:18:41.191397 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.191405 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:41.191412 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.191423 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.191428 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.191435 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000
I1212 13:18:41.191442 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000
I1212 13:18:41.191454 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000
I1212 13:18:41.191461 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.191467 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000
I1212 13:18:41.191473 402535 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000
I1212 13:18:41.191489 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000
I1212 13:18:41.191516 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000
I1212 13:18:41.191546 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13"
I1212 13:18:41.191555 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.191562 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:41.191599 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.191608 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.191613 402535 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.191620 402535 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13"
I1212 13:18:41.191635 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:41.191641 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:41.191647 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000
I1212 13:18:41.191653 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:41.191659 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000
I1212 13:18:41.191670 402535 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000
I1212 13:18:41.191686 402535 visitor.go:35] string value at spec.template.spec.volumes.[0].configMap.optional: true
I1212 13:18:41.194307 402535 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000
I1212 13:18:41.194348 402535 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000
I1212 13:18:41.197313 402535 visitor.go:40] float64 value at spec.minAvailable: 1.000000
I1212 13:18:41.197689 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: apps/v1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns-autoscaler
kubernetes.io/cluster-service: "true"
name: kube-dns-autoscaler
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns-autoscaler
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
labels:
k8s-app: kube-dns-autoscaler
spec:
containers:
- command:
- /cluster-proportional-autoscaler
- --namespace=kube-system
- --configmap=kube-dns-autoscaler
- --target=Deployment/kube-dns
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}
- --logtostderr=true
- --v=2
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0
name: autoscaler
resources:
requests:
cpu: 20m
memory: 10Mi
serviceAccountName: kube-dns-autoscaler
tolerations:
- key: CriticalAddonsOnly
operator: Exists
---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
name: kube-dns
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns
strategy:
rollingUpdate:
maxSurge: 10%
maxUnavailable: 0
template:
metadata:
annotations:
prometheus.io/port: "10055"
prometheus.io/scrape: "true"
scheduler.alpha.kubernetes.io/critical-pod: ""
labels:
k8s-app: kube-dns
spec:
affinity:
podAntiAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: k8s-app
operator: In
values:
- kube-dns
topologyKey: kubernetes.io/hostname
weight: 1
containers:
- args:
- --config-dir=/kube-dns-config
- --dns-port=10053
- --domain=cluster.local.
- --v=2
env:
- name: PROMETHEUS_PORT
value: "10055"
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthcheck/kubedns
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: kubedns
ports:
- containerPort: 10053
name: dns-local
protocol: UDP
- containerPort: 10053
name: dns-tcp-local
protocol: TCP
- containerPort: 10055
name: metrics
protocol: TCP
readinessProbe:
httpGet:
path: /readiness
port: 8081
scheme: HTTP
initialDelaySeconds: 3
timeoutSeconds: 5
resources:
limits:
memory: 170Mi
requests:
cpu: 100m
memory: 70Mi
volumeMounts:
- mountPath: /kube-dns-config
name: kube-dns-config
- args:
- -v=2
- -logtostderr
- -configDir=/etc/k8s/dns/dnsmasq-nanny
- -restartDnsmasq=true
- --
- -k
- --cache-size=1000
- --dns-forward-max=150
- --no-negcache
- --log-facility=-
- --server=/cluster.local/127.0.0.1#10053
- --server=/in-addr.arpa/127.0.0.1#10053
- --server=/in6.arpa/127.0.0.1#10053
- --min-port=1024
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthcheck/dnsmasq
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: dnsmasq
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
resources:
requests:
cpu: 150m
memory: 20Mi
volumeMounts:
- mountPath: /etc/k8s/dns/dnsmasq-nanny
name: kube-dns-config
- args:
- --v=2
- --logtostderr
- --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A
- --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13
livenessProbe:
failureThreshold: 5
httpGet:
path: /metrics
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: sidecar
ports:
- containerPort: 10054
name: metrics
protocol: TCP
resources:
requests:
cpu: 10m
memory: 20Mi
dnsPolicy: Default
serviceAccountName: kube-dns
volumes:
- configMap:
name: kube-dns
optional: true
name: kube-dns-config
---
apiVersion: v1
kind: Service
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: KubeDNS
name: kube-dns
namespace: kube-system
spec:
clusterIP: 100.64.0.10
ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
selector:
k8s-app: kube-dns
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- replicationcontrollers/scale
verbs:
- get
- update
- apiGroups:
- extensions
- apps
resources:
- deployments/scale
- replicasets/scale
verbs:
- get
- update
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kube-dns-autoscaler
subjects:
- kind: ServiceAccount
name: kube-dns-autoscaler
namespace: kube-system
---
apiVersion: policy/v1beta1
kind: PodDisruptionBudget
metadata:
name: kube-dns
namespace: kube-system
spec:
minAvailable: 1
selector:
matchLabels:
k8s-app: kube-dns
I1212 13:18:41.197834 402535 bootstrapchannelbuilder.go:79] hash b4dff071aa340fd71650c96f213fdf4b4f799c71
I1212 13:18:41.199211 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
addonmanager.kubernetes.io/mode: Reconcile
k8s-addon: rbac.addons.k8s.io
kubernetes.io/cluster-service: "true"
name: kubelet-cluster-admin
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:node
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: kubelet
I1212 13:18:41.199249 402535 bootstrapchannelbuilder.go:79] hash 5d53ce7b920cd1e8d65d2306d80a041420711914
I1212 13:18:41.200081 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: kops:system:kubelet-api-admin
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:kubelet-api-admin
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: kubelet-api
I1212 13:18:41.200123 402535 bootstrapchannelbuilder.go:79] hash e1508d77cb4e527d7a2939babe36dc350dd83745
I1212 13:18:41.206934 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: v1
kind: LimitRange
metadata:
name: limits
namespace: default
spec:
limits:
- defaultRequest:
cpu: 100m
type: Container
I1212 13:18:41.206987 402535 bootstrapchannelbuilder.go:79] hash 2ea50e23f1a5aa41df3724630ac25173738cc90c
I1212 13:18:41.207233 402535 template_functions.go:190] watch-ingress=false set on dns-controller
I1212 13:18:41.208194 402535 visitor.go:40] float64 value at spec.replicas: 1.000000
I1212 13:18:41.208252 402535 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0"
I1212 13:18:41.208293 402535 visitor.go:35] string value at spec.template.spec.hostNetwork: true
I1212 13:18:41.210328 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
name: dns-controller
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
k8s-app: dns-controller
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key": "dedicated", "value":
"master"}]'
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
spec:
containers:
- command:
- /usr/bin/dns-controller
- --watch-ingress=false
- --dns=aws-route53
- --zone=*/Z237FHI0B4E3ZX
- --zone=*/*
- -v=2
image: kope/dns-controller:1.15.0
name: dns-controller
resources:
requests:
cpu: 50m
memory: 50Mi
dnsPolicy: Default
hostNetwork: true
nodeSelector:
kubernetes.io/role: master
I1212 13:18:41.210367 402535 bootstrapchannelbuilder.go:79] hash 41097765274e5bd95292ae88bd6e26268c5e8c59
I1212 13:18:41.210823 402535 template_functions.go:190] watch-ingress=false set on dns-controller
I1212 13:18:41.212662 402535 visitor.go:40] float64 value at spec.replicas: 1.000000
I1212 13:18:41.212718 402535 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0"
I1212 13:18:41.212752 402535 visitor.go:35] string value at spec.template.spec.hostNetwork: true
I1212 13:18:41.214782 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
name: dns-controller
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
k8s-app: dns-controller
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key": "dedicated", "value":
"master"}]'
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
spec:
containers:
- command:
- /usr/bin/dns-controller
- --watch-ingress=false
- --dns=aws-route53
- --zone=*/Z237FHI0B4E3ZX
- --zone=*/*
- -v=2
image: kope/dns-controller:1.15.0
name: dns-controller
resources:
requests:
cpu: 50m
memory: 50Mi
dnsPolicy: Default
hostNetwork: true
nodeSelector:
node-role.kubernetes.io/master: ""
serviceAccount: dns-controller
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: dns-controller
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
rules:
- apiGroups:
- ""
resources:
- endpoints
- services
- pods
- ingress
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kops:dns-controller
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: system:serviceaccount:kube-system:dns-controller
I1212 13:18:41.214827 402535 bootstrapchannelbuilder.go:79] hash 079663bb21f764bd016174115a00ad1e4d92e07d
I1212 13:18:41.216696 402535 template_functions.go:190] watch-ingress=false set on dns-controller
I1212 13:18:41.217944 402535 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0"
I1212 13:18:41.217974 402535 visitor.go:35] string value at spec.template.spec.hostNetwork: true
I1212 13:18:41.217984 402535 visitor.go:40] float64 value at spec.replicas: 1.000000
I1212 13:18:41.219310 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: apps/v1
kind: Deployment
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
name: dns-controller
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
k8s-app: dns-controller
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
spec:
containers:
- command:
- /usr/bin/dns-controller
- --watch-ingress=false
- --dns=aws-route53
- --zone=*/Z237FHI0B4E3ZX
- --zone=*/*
- -v=2
image: kope/dns-controller:1.15.0
name: dns-controller
resources:
requests:
cpu: 50m
memory: 50Mi
dnsPolicy: Default
hostNetwork: true
nodeSelector:
node-role.kubernetes.io/master: ""
serviceAccount: dns-controller
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: dns-controller
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
rules:
- apiGroups:
- ""
resources:
- endpoints
- services
- pods
- ingress
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kops:dns-controller
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: system:serviceaccount:kube-system:dns-controller
I1212 13:18:41.219341 402535 bootstrapchannelbuilder.go:79] hash 767f8242c35ba32b19b13234cedf26ac5f554dab
I1212 13:18:41.220625 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: default
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.beta.kubernetes.io/is-default-class: "true"
labels:
k8s-addon: storage-aws.addons.k8s.io
name: gp2
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: system:aws-cloud-provider
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
- list
- patch
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- update
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: system:aws-cloud-provider
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:aws-cloud-provider
subjects:
- kind: ServiceAccount
name: aws-cloud-provider
namespace: kube-system
I1212 13:18:41.220664 402535 bootstrapchannelbuilder.go:79] hash 23459f7be52d7c818dc060a8bcf5e3565bd87a7b
I1212 13:18:41.221143 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: default
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.beta.kubernetes.io/is-default-class: "true"
labels:
k8s-addon: storage-aws.addons.k8s.io
name: gp2
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
I1212 13:18:41.221163 402535 bootstrapchannelbuilder.go:79] hash 62705a596142e6cc283280e8aa973e51536994c5
I1212 13:18:41.221610 402535 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1beta1
kind: StorageClass
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: default
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: storage.k8s.io/v1beta1
kind: StorageClass
metadata:
annotations:
storageclass.beta.kubernetes.io/is-default-class: "true"
labels:
k8s-addon: storage-aws.addons.k8s.io
name: gp2
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
I1212 13:18:41.221630 402535 bootstrapchannelbuilder.go:79] hash 7de4b2eb0521d669172038759c521418711d8266
I1212 13:18:41.222812 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222832 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222838 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222844 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222850 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222858 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222867 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222872 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222878 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222884 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222890 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222902 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.222911 402535 task.go:103] testing task "Secret"
I1212 13:18:41.222920 402535 task.go:103] testing task "Secret"
I1212 13:18:41.222927 402535 task.go:103] testing task "Secret"
I1212 13:18:41.222934 402535 task.go:103] testing task "Secret"
I1212 13:18:41.222939 402535 task.go:103] testing task "Secret"
I1212 13:18:41.222944 402535 task.go:103] testing task "Secret"
I1212 13:18:41.222950 402535 task.go:103] testing task "Secret"
I1212 13:18:41.222955 402535 task.go:103] testing task "Secret"
I1212 13:18:41.222961 402535 task.go:103] testing task "Secret"
I1212 13:18:41.223007 402535 task.go:103] testing task "MirrorSecrets"
I1212 13:18:41.223019 402535 task.go:103] testing task "MirrorKeystore"
I1212 13:18:41.230493 402535 build_flags.go:50] ignoring non-field:
I1212 13:18:41.230546 402535 build_flags.go:50] ignoring non-field:
I1212 13:18:41.230604 402535 proxy.go:30] proxies is == nil, returning empty list
I1212 13:18:41.236130 402535 task.go:103] testing task "ManagedFile"
I1212 13:18:41.236198 402535 task.go:103] testing task "ManagedFile"
I1212 13:18:41.236209 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.236216 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.236222 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.236631 402535 build_flags.go:50] ignoring non-field:
I1212 13:18:41.236657 402535 build_flags.go:50] ignoring non-field:
I1212 13:18:41.236707 402535 proxy.go:30] proxies is == nil, returning empty list
I1212 13:18:41.237633 402535 task.go:103] testing task "ManagedFile"
I1212 13:18:41.237681 402535 task.go:103] testing task "ManagedFile"
I1212 13:18:41.237690 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.237697 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.237703 402535 task.go:103] testing task "Keypair"
I1212 13:18:41.237718 402535 task.go:75] EnsureTask ignoring identical
I1212 13:18:41.237741 402535 task.go:103] testing task "EBSVolume"
I1212 13:18:41.237766 402535 task.go:103] testing task "EBSVolume"
I1212 13:18:41.237780 402535 task.go:103] testing task "DNSZone"
I1212 13:18:41.237812 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.237826 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.237840 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.237858 402535 task.go:103] testing task "SecurityGroup"
I1212 13:18:41.237875 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.237892 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.237904 402535 task.go:103] testing task "SecurityGroup"
I1212 13:18:41.237918 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.237959 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.237972 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.239084 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.239100 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.239107 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.239119 402535 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:41.239157 402535 task.go:103] testing task "SSHKey"
I1212 13:18:41.239180 402535 task.go:103] testing task "VPC"
I1212 13:18:41.239190 402535 task.go:103] testing task "DHCPOptions"
I1212 13:18:41.239199 402535 task.go:103] testing task "VPCDHCPOptionsAssociation"
I1212 13:18:41.239212 402535 task.go:103] testing task "InternetGateway"
I1212 13:18:41.239234 402535 task.go:103] testing task "RouteTable"
I1212 13:18:41.239243 402535 task.go:103] testing task "Route"
I1212 13:18:41.239273 402535 network.go:202] applying subnet tags
I1212 13:18:41.239289 402535 task.go:103] testing task "Subnet"
I1212 13:18:41.239298 402535 task.go:103] testing task "RouteTableAssociation"
I1212 13:18:41.240210 402535 task.go:103] testing task "IAMRole"
I1212 13:18:41.240254 402535 task.go:103] testing task "IAMRolePolicy"
I1212 13:18:41.240264 402535 task.go:103] testing task "IAMInstanceProfile"
I1212 13:18:41.240274 402535 task.go:103] testing task "IAMInstanceProfileRole"
I1212 13:18:41.240282 402535 task.go:103] testing task "IAMRolePolicy"
I1212 13:18:41.240320 402535 task.go:103] testing task "IAMRole"
I1212 13:18:41.240328 402535 task.go:103] testing task "IAMRolePolicy"
I1212 13:18:41.240339 402535 task.go:103] testing task "IAMInstanceProfile"
I1212 13:18:41.240345 402535 task.go:103] testing task "IAMInstanceProfileRole"
I1212 13:18:41.240352 402535 task.go:103] testing task "IAMRolePolicy"
I1212 13:18:41.240487 402535 task.go:103] testing task "LaunchConfiguration"
I1212 13:18:41.240529 402535 task.go:103] testing task "AutoscalingGroup"
I1212 13:18:41.240696 402535 task.go:103] testing task "LaunchConfiguration"
I1212 13:18:41.240711 402535 task.go:103] testing task "AutoscalingGroup"
I1212 13:18:41.244105 402535 topological_sort.go:64] Dependencies:
I1212 13:18:41.244128 402535 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12: []
I1212 13:18:41.244135 402535 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6: []
I1212 13:18:41.244141 402535 topological_sort.go:66] Keypair/etcd-clients-ca: []
I1212 13:18:41.244145 402535 topological_sort.go:66] Keypair/etcd-manager-ca-events: []
I1212 13:18:41.244151 402535 topological_sort.go:66] Keypair/apiserver-proxy-client: [Keypair/ca]
I1212 13:18:41.244157 402535 topological_sort.go:66] VPC/kops.domain.com: []
I1212 13:18:41.244162 402535 topological_sort.go:66] IAMInstanceProfileRole/masters.kops.domain.com: [IAMInstanceProfile/masters.kops.domain.com IAMRole/masters.kops.domain.com]
I1212 13:18:41.244185 402535 topological_sort.go:66] IAMInstanceProfile/masters.kops.domain.com: []
I1212 13:18:41.244191 402535 topological_sort.go:66] MirrorKeystore/mirror-keystore: [Secret/system:monitoring Secret/kubelet Secret/system:controller_manager Secret/admin Secret/kube Secret/kube-proxy Secret/system:scheduler Secret/system:logging Secret/system:dns]
I1212 13:18:41.244199 402535 topological_sort.go:66] Keypair/apiserver-aggregator: [Keypair/apiserver-aggregator-ca]
I1212 13:18:41.244205 402535 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6: []
I1212 13:18:41.244216 402535 topological_sort.go:66] SecurityGroupRule/master-egress: [SecurityGroup/masters.kops.domain.com]
I1212 13:18:41.244221 402535 topological_sort.go:66] Keypair/kubelet: [Keypair/ca]
I1212 13:18:41.244227 402535 topological_sort.go:66] LaunchConfiguration/master-us-west-1a.masters.kops.domain.com: [IAMInstanceProfile/masters.kops.domain.com SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 SecurityGroup/masters.kops.domain.com]
I1212 13:18:41.244234 402535 topological_sort.go:66] SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2: []
I1212 13:18:41.244240 402535 topological_sort.go:66] kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8: []
I1212 13:18:41.244250 402535 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0: []
I1212 13:18:41.244255 402535 topological_sort.go:66] IAMRolePolicy/masters.kops.domain.com: [IAMRole/masters.kops.domain.com DNSZone/Z237FHI0B4E3ZX]
I1212 13:18:41.244261 402535 topological_sort.go:66] RouteTableAssociation/us-west-1a.kops.domain.com: [RouteTable/kops.domain.com Subnet/us-west-1a.kops.domain.com]
I1212 13:18:41.244266 402535 topological_sort.go:66] IAMRole/masters.kops.domain.com: []
I1212 13:18:41.244271 402535 topological_sort.go:66] ManagedFile/etcd-cluster-spec-events: []
I1212 13:18:41.244276 402535 topological_sort.go:66] IAMRolePolicy/nodes.kops.domain.com: [IAMRole/nodes.kops.domain.com DNSZone/Z237FHI0B4E3ZX]
I1212 13:18:41.244286 402535 topological_sort.go:66] IAMRolePolicy/additional.masters.kops.domain.com: [IAMRole/masters.kops.domain.com]
I1212 13:18:41.244291 402535 topological_sort.go:66] kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9: []
I1212 13:18:41.244296 402535 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0: []
I1212 13:18:41.244301 402535 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6: []
I1212 13:18:41.244305 402535 topological_sort.go:66] Secret/kube: []
I1212 13:18:41.244310 402535 topological_sort.go:66] Secret/system:scheduler: []
I1212 13:18:41.244319 402535 topological_sort.go:66] Route/0.0.0.0/0: [RouteTable/kops.domain.com InternetGateway/kops.domain.com]
I1212 13:18:41.244325 402535 topological_sort.go:66] Secret/system:logging: []
I1212 13:18:41.244329 402535 topological_sort.go:66] kops.domain.com-addons-limit-range.addons.k8s.io: []
I1212 13:18:41.244334 402535 topological_sort.go:66] ManagedFile/manifests-etcdmanager-main: []
I1212 13:18:41.244342 402535 topological_sort.go:66] EBSVolume/a.etcd-main.kops.domain.com: []
I1212 13:18:41.244348 402535 topological_sort.go:66] InternetGateway/kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:41.244389 402535 topological_sort.go:66] Keypair/apiserver-aggregator-ca: []
I1212 13:18:41.244397 402535 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6: []
I1212 13:18:41.244402 402535 topological_sort.go:66] IAMInstanceProfileRole/nodes.kops.domain.com: [IAMInstanceProfile/nodes.kops.domain.com IAMRole/nodes.kops.domain.com]
I1212 13:18:41.244413 402535 topological_sort.go:66] SecurityGroupRule/ssh-external-to-node-0.0.0.0/0: [SecurityGroup/nodes.kops.domain.com]
I1212 13:18:41.244419 402535 topological_sort.go:66] Keypair/kube-proxy: [Keypair/ca]
I1212 13:18:41.244428 402535 topological_sort.go:66] ManagedFile/etcd-cluster-spec-main: []
I1212 13:18:41.244433 402535 topological_sort.go:66] Keypair/kubecfg: [Keypair/ca]
I1212 13:18:41.244438 402535 topological_sort.go:66] IAMInstanceProfile/nodes.kops.domain.com: []
I1212 13:18:41.244443 402535 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-1-2379: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:41.244449 402535 topological_sort.go:66] SecurityGroupRule/ssh-external-to-master-0.0.0.0/0: [SecurityGroup/masters.kops.domain.com]
I1212 13:18:41.244454 402535 topological_sort.go:66] Secret/kubelet: []
I1212 13:18:41.244463 402535 topological_sort.go:66] SecurityGroupRule/all-master-to-node: [SecurityGroup/nodes.kops.domain.com SecurityGroup/masters.kops.domain.com]
I1212 13:18:41.244468 402535 topological_sort.go:66] Keypair/etcd-peers-ca-events: []
I1212 13:18:41.244473 402535 topological_sort.go:66] Keypair/kubelet-api: [Keypair/ca]
I1212 13:18:41.244478 402535 topological_sort.go:66] IAMRole/nodes.kops.domain.com: []
I1212 13:18:41.244630 402535 topological_sort.go:66] AutoscalingGroup/master-us-west-1a.masters.kops.domain.com: [LaunchConfiguration/master-us-west-1a.masters.kops.domain.com Subnet/us-west-1a.kops.domain.com]
I1212 13:18:41.244645 402535 topological_sort.go:66] Subnet/us-west-1a.kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:41.244650 402535 topological_sort.go:66] SecurityGroupRule/all-node-to-node: [SecurityGroup/nodes.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:41.244656 402535 topological_sort.go:66] SecurityGroupRule/node-egress: [SecurityGroup/nodes.kops.domain.com]
I1212 13:18:41.244661 402535 topological_sort.go:66] DHCPOptions/kops.domain.com: []
I1212 13:18:41.244666 402535 topological_sort.go:66] IAMRolePolicy/additional.nodes.kops.domain.com: [IAMRole/nodes.kops.domain.com]
I1212 13:18:41.244671 402535 topological_sort.go:66] Keypair/kube-controller-manager: [Keypair/ca]
I1212 13:18:41.244680 402535 topological_sort.go:66] DNSZone/Z237FHI0B4E3ZX: []
I1212 13:18:41.244685 402535 topological_sort.go:66] SecurityGroupRule/https-external-to-master-0.0.0.0/0: [SecurityGroup/masters.kops.domain.com]
I1212 13:18:41.244691 402535 topological_sort.go:66] SecurityGroup/masters.kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:41.244696 402535 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-4003-65535: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:41.244701 402535 topological_sort.go:66] ManagedFile/manifests-etcdmanager-events: []
I1212 13:18:41.244710 402535 topological_sort.go:66] Keypair/etcd-peers-ca-main: []
I1212 13:18:41.244715 402535 topological_sort.go:66] SecurityGroupRule/all-master-to-master: [SecurityGroup/masters.kops.domain.com SecurityGroup/masters.kops.domain.com]
I1212 13:18:41.244720 402535 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-2382-4000: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:41.244726 402535 topological_sort.go:66] SecurityGroup/nodes.kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:41.244731 402535 topological_sort.go:66] Keypair/ca: []
I1212 13:18:41.244735 402535 topological_sort.go:66] Keypair/kube-scheduler: [Keypair/ca]
I1212 13:18:41.244744 402535 topological_sort.go:66] AutoscalingGroup/nodes.kops.domain.com: [LaunchConfiguration/nodes.kops.domain.com Subnet/us-west-1a.kops.domain.com]
I1212 13:18:41.244758 402535 topological_sort.go:66] Secret/system:monitoring: []
I1212 13:18:41.244766 402535 topological_sort.go:66] RouteTable/kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:41.244776 402535 topological_sort.go:66] Secret/system:controller_manager: []
I1212 13:18:41.244785 402535 topological_sort.go:66] MirrorSecrets/mirror-secrets: [Secret/system:monitoring Secret/kubelet Secret/system:controller_manager Secret/admin Secret/kube Secret/kube-proxy Secret/system:scheduler Secret/system:dns Secret/system:logging]
I1212 13:18:41.244805 402535 topological_sort.go:66] SecurityGroupRule/node-to-master-udp-1-65535: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:41.244813 402535 topological_sort.go:66] Keypair/etcd-manager-ca-main: []
I1212 13:18:41.244818 402535 topological_sort.go:66] Keypair/kops: [Keypair/ca]
I1212 13:18:41.244823 402535 topological_sort.go:66] Secret/admin: []
I1212 13:18:41.244828 402535 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0: []
I1212 13:18:41.244837 402535 topological_sort.go:66] LaunchConfiguration/nodes.kops.domain.com: [IAMInstanceProfile/nodes.kops.domain.com SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 SecurityGroup/nodes.kops.domain.com]
I1212 13:18:41.244848 402535 topological_sort.go:66] Keypair/master: [Keypair/ca]
I1212 13:18:41.244855 402535 topological_sort.go:66] Secret/kube-proxy: []
I1212 13:18:41.244860 402535 topological_sort.go:66] kops.domain.com-addons-core.addons.k8s.io: []
I1212 13:18:41.244864 402535 topological_sort.go:66] kops.domain.com-addons-bootstrap: []
I1212 13:18:41.244874 402535 topological_sort.go:66] Secret/system:dns: []
I1212 13:18:41.244879 402535 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12: []
I1212 13:18:41.244884 402535 topological_sort.go:66] EBSVolume/a.etcd-events.kops.domain.com: []
I1212 13:18:41.244889 402535 topological_sort.go:66] VPCDHCPOptionsAssociation/kops.domain.com: [VPC/kops.domain.com DHCPOptions/kops.domain.com]
I1212 13:18:41.245035 402535 executor.go:103] Tasks: 0 done / 86 total; 44 can run
I1212 13:18:41.247409 402535 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\": \"dedicated\", \"value\":\n \"master\"}]'\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n node-role.kubernetes.io/master: \"\"\n serviceAccount: dns-controller\n tolerations:\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - extensions\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller"}}
I1212 13:18:41.247764 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.248118 402535 executor.go:178] Executing task "Secret/system:scheduler": *fitasks.Secret {"Name":"system:scheduler","Lifecycle":"Sync"}
I1212 13:18:41.248205 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler"
I1212 13:18:41.248738 402535 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.15.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - patch\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - update\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:aws-cloud-provider\nsubjects:\n- kind: ServiceAccount\n name: aws-cloud-provider\n namespace: kube-system"}}
I1212 13:18:41.248876 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:41.249091 402535 executor.go:178] Executing task "Keypair/etcd-peers-ca-events": *fitasks.Keypair {"Name":"etcd-peers-ca-events","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-peers-ca-events","type":"ca","format":"v1alpha2"}
I1212 13:18:41.249302 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml"
I1212 13:18:41.250924 402535 executor.go:178] Executing task "VPC/kops.domain.com": *awstasks.VPC {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:18:41.251220 402535 request_logger.go:45] AWS request: ec2/DescribeVpcs
I1212 13:18:41.252001 402535 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.7.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs"}}
I1212 13:18:41.252078 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:41.252282 402535 executor.go:178] Executing task "Secret/system:monitoring": *fitasks.Secret {"Name":"system:monitoring","Lifecycle":"Sync"}
I1212 13:18:41.252342 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring"
I1212 13:18:41.252543 402535 executor.go:178] Executing task "IAMRole/masters.kops.domain.com": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}
I1212 13:18:41.252854 402535 request_logger.go:45] AWS request: iam/GetRole
I1212 13:18:41.253263 402535 executor.go:178] Executing task "Keypair/etcd-peers-ca-main": *fitasks.Keypair {"Name":"etcd-peers-ca-main","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-peers-ca-main","type":"ca","format":"v1alpha2"}
I1212 13:18:41.253332 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml"
I1212 13:18:41.253665 402535 executor.go:178] Executing task "Keypair/etcd-clients-ca": *fitasks.Keypair {"Name":"etcd-clients-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-clients-ca","type":"ca","format":"v1alpha2"}
I1212 13:18:41.253783 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml"
I1212 13:18:41.253988 402535 executor.go:178] Executing task "Secret/system:logging": *fitasks.Secret {"Name":"system:logging","Lifecycle":"Sync"}
I1212 13:18:41.254035 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging"
I1212 13:18:41.255625 402535 executor.go:178] Executing task "Keypair/apiserver-aggregator-ca": *fitasks.Keypair {"Name":"apiserver-aggregator-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","type":"ca","format":"v1alpha2"}
I1212 13:18:41.255681 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml"
I1212 13:18:41.255957 402535 executor.go:178] Executing task "Secret/kube": *fitasks.Secret {"Name":"kube","Lifecycle":"Sync"}
I1212 13:18:41.256011 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube"
I1212 13:18:41.256231 402535 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.12.yaml","Contents":{"Name":"","Resource":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns-autoscaler\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n prometheus.io/port: \"10055\"\n prometheus.io/scrape: \"true\"\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-app: kube-dns\n spec:\n affinity:\n podAntiAffinity:\n preferredDuringSchedulingIgnoredDuringExecution:\n - podAffinityTerm:\n labelSelector:\n matchExpressions:\n - key: k8s-app\n operator: In\n values:\n - kube-dns\n topologyKey: kubernetes.io/hostname\n weight: 1\n containers:\n - args:\n - --config-dir=/kube-dns-config\n - --dns-port=10053\n - --domain=cluster.local.\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/kubedns\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n volumeMounts:\n - mountPath: /kube-dns-config\n name: kube-dns-config\n - args:\n - -v=2\n - -logtostderr\n - -configDir=/etc/k8s/dns/dnsmasq-nanny\n - -restartDnsmasq=true\n - --\n - -k\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-negcache\n - --log-facility=-\n - --server=/cluster.local/127.0.0.1#10053\n - --server=/in-addr.arpa/127.0.0.1#10053\n - --server=/in6.arpa/127.0.0.1#10053\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/dnsmasq\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 20Mi\n volumeMounts:\n - mountPath: /etc/k8s/dns/dnsmasq-nanny\n name: kube-dns-config\n - args:\n - --v=2\n - --logtostderr\n - --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A\n - --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A\n image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: sidecar\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 10m\n memory: 20Mi\n dnsPolicy: Default\n serviceAccountName: kube-dns\n volumes:\n - configMap:\n name: kube-dns\n optional: true\n name: kube-dns-config\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n - apps\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kube-dns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: policy/v1beta1\nkind: PodDisruptionBudget\nmetadata:\n name: kube-dns\n namespace: kube-system\nspec:\n minAvailable: 1\n selector:\n matchLabels:\n k8s-app: kube-dns"}}
I1212 13:18:41.256533 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.256722 402535 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\": \"dedicated\", \"value\":\n \"master\"}]'\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n kubernetes.io/role: master"}}
I1212 13:18:41.256818 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:41.257071 402535 executor.go:178] Executing task "EBSVolume/a.etcd-events.kops.domain.com": *awstasks.EBSVolume {"Name":"a.etcd-events.kops.domain.com","Lifecycle":"Sync","AvailabilityZone":"us-west-1a","Encrypted":false,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/events":"a/a","k8s.io/role/master":"1","kubernetes.io/cluster/kops.domain.com":"owned"},"VolumeIops":null,"VolumeType":"gp2"}
I1212 13:18:41.257414 402535 request_logger.go:45] AWS request: ec2/DescribeVolumes
I1212 13:18:41.257715 402535 executor.go:178] Executing task "kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8","Lifecycle":"Sync","Location":"addons/rbac.addons.k8s.io/k8s-1.8.yaml","Contents":{"Name":"","Resource":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n addonmanager.kubernetes.io/mode: Reconcile\n k8s-addon: rbac.addons.k8s.io\n kubernetes.io/cluster-service: \"true\"\n name: kubelet-cluster-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:node\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet"}}
I1212 13:18:41.257784 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:41.258108 402535 executor.go:178] Executing task "Secret/system:dns": *fitasks.Secret {"Name":"system:dns","Lifecycle":"Sync"}
I1212 13:18:41.258168 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns"
I1212 13:18:41.258655 402535 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.6.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1beta1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1beta1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs"}}
I1212 13:18:41.258734 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:41.259173 402535 executor.go:178] Executing task "IAMInstanceProfile/nodes.kops.domain.com": *awstasks.IAMInstanceProfile {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false}
I1212 13:18:41.259363 402535 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1212 13:18:41.261179 402535 executor.go:178] Executing task "Secret/admin": *fitasks.Secret {"Name":"admin","Lifecycle":"Sync"}
I1212 13:18:41.261292 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin"
I1212 13:18:41.261570 402535 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.12.yaml","Contents":{"Name":"","Resource":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n node-role.kubernetes.io/master: \"\"\n serviceAccount: dns-controller\n tolerations:\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - extensions\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller"}}
I1212 13:18:41.261809 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:41.262091 402535 executor.go:178] Executing task "ManagedFile/etcd-cluster-spec-events": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-events","Lifecycle":"Sync","Location":"backups/etcd/events/control/etcd-cluster-spec","Contents":{"Name":"","Resource":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.3.10\"\n}"}}
I1212 13:18:41.262151 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events/control/etcd-cluster-spec"
I1212 13:18:41.262412 402535 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --mode=linear\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"min\":2}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns\n spec:\n containers:\n - args:\n - --domain=cluster.local.\n - --dns-port=10053\n - --config-map=kube-dns\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/kubedns-amd64:1.9\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz-kubedns\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n - args:\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-resolv\n - --server=127.0.0.1#10053\n - --log-facility=-\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz-dnsmasq\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 10Mi\n - args:\n - --v=2\n - --logtostderr\n image: k8s.gcr.io/dnsmasq-metrics-amd64:1.0\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq-metrics\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n memory: 10Mi\n - args:\n - --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 \u003e/dev/null\n - --url=/healthz-dnsmasq\n - --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1:10053 \u003e/dev/null\n - --url=/healthz-kubedns\n - --port=8080\n - --quiet\n image: k8s.gcr.io/exechealthz-amd64:1.2\n name: healthz\n ports:\n - containerPort: 8080\n protocol: TCP\n resources:\n limits:\n memory: 50Mi\n requests:\n cpu: 10m\n memory: 50Mi\n dnsPolicy: Default\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns"}}
I1212 13:18:41.262659 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:41.262902 402535 executor.go:178] Executing task "DHCPOptions/kops.domain.com": *awstasks.DHCPOptions {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"DomainName":"us-west-1.compute.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:18:41.263165 402535 request_logger.go:45] AWS request: ec2/DescribeDhcpOptions
I1212 13:18:41.263247 402535 executor.go:178] Executing task "Keypair/ca": *fitasks.Keypair {"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"}
I1212 13:18:41.263301 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:18:41.263615 402535 executor.go:178] Executing task "DNSZone/Z237FHI0B4E3ZX": *awstasks.DNSZone {"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}
I1212 13:18:41.263866 402535 request_logger.go:45] AWS request: route53/GetHostedZone
I1212 13:18:41.264169 402535 executor.go:178] Executing task "ManagedFile/etcd-cluster-spec-main": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-main","Lifecycle":"Sync","Location":"backups/etcd/main/control/etcd-cluster-spec","Contents":{"Name":"","Resource":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.3.10\"\n}"}}
I1212 13:18:41.264246 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main/control/etcd-cluster-spec"
I1212 13:18:41.264662 402535 executor.go:178] Executing task "IAMInstanceProfile/masters.kops.domain.com": *awstasks.IAMInstanceProfile {"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false}
I1212 13:18:41.264847 402535 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1212 13:18:41.264915 402535 executor.go:178] Executing task "ManagedFile/manifests-etcdmanager-events": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-events","Lifecycle":"Sync","Location":"manifests/etcd/events.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Pod\nmetadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-events\n name: etcd-manager-events\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events\n --client-urls=https://__name__:4002 --cluster-name=etcd-events --containerized=true\n --dns-suffix=.internal.kops.domain.com --etcd-insecure=false --grpc-port=3997\n --insecure=false --peer-urls=https://__name__:2381 --quarantine-client-urls=https://__name__:3995\n --v=6 --volume-name-tag=k8s.io/etcd/events --volume-provider=aws --volume-tag=k8s.io/etcd/events\n --volume-tag=k8s.io/role/master=1 --volume-tag=kubernetes.io/cluster/kops.domain.com=owned\n \u003e /tmp/pipe 2\u003e\u00261\n image: kopeio/etcd-manager:3.0.20190930\n name: etcd-manager\n resources:\n requests:\n cpu: 100m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /etc/hosts\n name: hosts\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /etc/hosts\n type: File\n name: hosts\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-events\n type: DirectoryOrCreate\n name: pki\n - hostPath:\n path: /var/log/etcd-events.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n"}}
I1212 13:18:41.265007 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/events.yaml"
I1212 13:18:41.265171 402535 executor.go:178] Executing task "ManagedFile/manifests-etcdmanager-main": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-main","Lifecycle":"Sync","Location":"manifests/etcd/main.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Pod\nmetadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-main\n name: etcd-manager-main\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main\n --client-urls=https://__name__:4001 --cluster-name=etcd --containerized=true\n --dns-suffix=.internal.kops.domain.com --etcd-insecure=false --grpc-port=3996\n --insecure=false --peer-urls=https://__name__:2380 --quarantine-client-urls=https://__name__:3994\n --v=6 --volume-name-tag=k8s.io/etcd/main --volume-provider=aws --volume-tag=k8s.io/etcd/main\n --volume-tag=k8s.io/role/master=1 --volume-tag=kubernetes.io/cluster/kops.domain.com=owned\n \u003e /tmp/pipe 2\u003e\u00261\n image: kopeio/etcd-manager:3.0.20190930\n name: etcd-manager\n resources:\n requests:\n cpu: 200m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /etc/hosts\n name: hosts\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /etc/hosts\n type: File\n name: hosts\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-main\n type: DirectoryOrCreate\n name: pki\n - hostPath:\n path: /var/log/etcd.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n"}}
I1212 13:18:41.265301 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/main.yaml"
I1212 13:18:41.265478 402535 executor.go:178] Executing task "Secret/kubelet": *fitasks.Secret {"Name":"kubelet","Lifecycle":"Sync"}
I1212 13:18:41.265592 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet"
I1212 13:18:41.265790 402535 executor.go:178] Executing task "Secret/system:controller_manager": *fitasks.Secret {"Name":"system:controller_manager","Lifecycle":"Sync"}
I1212 13:18:41.265830 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager"
I1212 13:18:41.266008 402535 executor.go:178] Executing task "SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2": *awstasks.SSHKey {"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":null}
I1212 13:18:41.266205 402535 sshkey.go:109] Computed SSH key fingerprint as "7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"
I1212 13:18:41.266315 402535 request_logger.go:45] AWS request: ec2/DescribeKeyPairs
I1212 13:18:41.266384 402535 executor.go:178] Executing task "EBSVolume/a.etcd-main.kops.domain.com": *awstasks.EBSVolume {"Name":"a.etcd-main.kops.domain.com","Lifecycle":"Sync","AvailabilityZone":"us-west-1a","Encrypted":false,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/main":"a/a","k8s.io/role/master":"1","kubernetes.io/cluster/kops.domain.com":"owned"},"VolumeIops":null,"VolumeType":"gp2"}
I1212 13:18:41.266547 402535 request_logger.go:45] AWS request: ec2/DescribeVolumes
I1212 13:18:41.266661 402535 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":"{}\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n prometheus.io/port: \"10055\"\n prometheus.io/scrape: \"true\"\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns\n spec:\n containers:\n - args:\n - --config-dir=/kube-dns-config\n - --dns-port=10053\n - --domain=cluster.local.\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/kubedns\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n volumeMounts:\n - mountPath: /kube-dns-config\n name: kube-dns-config\n - args:\n - -v=2\n - -logtostderr\n - -configDir=/etc/k8s/dns/dnsmasq-nanny\n - -restartDnsmasq=true\n - --\n - -k\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-negcache\n - --log-facility=-\n - --server=/cluster.local/127.0.0.1#10053\n - --server=/in-addr.arpa/127.0.0.1#10053\n - --server=/in6.arpa/127.0.0.1#10053\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/dnsmasq\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 20Mi\n volumeMounts:\n - mountPath: /etc/k8s/dns/dnsmasq-nanny\n name: kube-dns-config\n - args:\n - --v=2\n - --logtostderr\n - --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A\n - --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A\n image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: sidecar\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 10m\n memory: 20Mi\n dnsPolicy: Default\n serviceAccountName: kube-dns\n volumes:\n - configMap:\n name: kube-dns\n optional: true\n name: kube-dns-config\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kube-dns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system"}}
I1212 13:18:41.266861 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:41.267063 402535 executor.go:178] Executing task "Keypair/etcd-manager-ca-events": *fitasks.Keypair {"Name":"etcd-manager-ca-events","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-manager-ca-events","type":"ca","format":"v1alpha2"}
I1212 13:18:41.267121 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml"
I1212 13:18:41.267382 402535 executor.go:178] Executing task "Keypair/etcd-manager-ca-main": *fitasks.Keypair {"Name":"etcd-manager-ca-main","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-manager-ca-main","type":"ca","format":"v1alpha2"}
I1212 13:18:41.267432 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml"
I1212 13:18:41.267631 402535 executor.go:178] Executing task "kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9","Lifecycle":"Sync","Location":"addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml","Contents":{"Name":"","Resource":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: kops:system:kubelet-api-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:kubelet-api-admin\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet-api"}}
I1212 13:18:41.267743 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:41.267897 402535 executor.go:178] Executing task "Secret/kube-proxy": *fitasks.Secret {"Name":"kube-proxy","Lifecycle":"Sync"}
I1212 13:18:41.267933 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy"
I1212 13:18:41.268107 402535 executor.go:178] Executing task "kops.domain.com-addons-core.addons.k8s.io": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-core.addons.k8s.io","Lifecycle":"Sync","Location":"addons/core.addons.k8s.io/v1.4.0.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Namespace\nmetadata:\n name: kube-system"}}
I1212 13:18:41.268158 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:41.268299 402535 executor.go:178] Executing task "IAMRole/nodes.kops.domain.com": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}
I1212 13:18:41.268395 402535 request_logger.go:45] AWS request: iam/GetRole
I1212 13:18:41.268449 402535 executor.go:178] Executing task "kops.domain.com-addons-bootstrap": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-bootstrap","Lifecycle":"Sync","Location":"addons/bootstrap-channel.yaml","Contents":{"Name":"","Resource":"kind: Addons\nmetadata:\n creationTimestamp: null\n name: bootstrap\nspec:\n addons:\n - manifest: core.addons.k8s.io/v1.4.0.yaml\n manifestHash: 3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90\n name: core.addons.k8s.io\n selector:\n k8s-addon: core.addons.k8s.io\n version: 1.4.0\n - id: pre-k8s-1.6\n kubernetesVersion: \u003c1.6.0\n manifest: kube-dns.addons.k8s.io/pre-k8s-1.6.yaml\n manifestHash: 895c961cb9365cbedb22edd20a7648182ae7ed3f\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.6\n kubernetesVersion: '\u003e=1.6.0 \u003c1.12.0'\n manifest: kube-dns.addons.k8s.io/k8s-1.6.yaml\n manifestHash: 191685ca6fe009302e55512b0eefc5a676433f10\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.12\n kubernetesVersion: '\u003e=1.12.0'\n manifest: kube-dns.addons.k8s.io/k8s-1.12.yaml\n manifestHash: b4dff071aa340fd71650c96f213fdf4b4f799c71\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.8\n kubernetesVersion: '\u003e=1.8.0'\n manifest: rbac.addons.k8s.io/k8s-1.8.yaml\n manifestHash: 5d53ce7b920cd1e8d65d2306d80a041420711914\n name: rbac.addons.k8s.io\n selector:\n k8s-addon: rbac.addons.k8s.io\n version: 1.8.0\n - id: k8s-1.9\n kubernetesVersion: '\u003e=1.9.0'\n manifest: kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml\n manifestHash: e1508d77cb4e527d7a2939babe36dc350dd83745\n name: kubelet-api.rbac.addons.k8s.io\n selector:\n k8s-addon: kubelet-api.rbac.addons.k8s.io\n version: v0.0.1\n - manifest: limit-range.addons.k8s.io/v1.5.0.yaml\n manifestHash: 2ea50e23f1a5aa41df3724630ac25173738cc90c\n name: limit-range.addons.k8s.io\n selector:\n k8s-addon: limit-range.addons.k8s.io\n version: 1.5.0\n - id: pre-k8s-1.6\n kubernetesVersion: \u003c1.6.0\n manifest: dns-controller.addons.k8s.io/pre-k8s-1.6.yaml\n manifestHash: 41097765274e5bd95292ae88bd6e26268c5e8c59\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: k8s-1.6\n kubernetesVersion: '\u003e=1.6.0 \u003c1.12.0'\n manifest: dns-controller.addons.k8s.io/k8s-1.6.yaml\n manifestHash: 079663bb21f764bd016174115a00ad1e4d92e07d\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: k8s-1.12\n kubernetesVersion: '\u003e=1.12.0'\n manifest: dns-controller.addons.k8s.io/k8s-1.12.yaml\n manifestHash: 767f8242c35ba32b19b13234cedf26ac5f554dab\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: v1.15.0\n kubernetesVersion: '\u003e=1.15.0'\n manifest: storage-aws.addons.k8s.io/v1.15.0.yaml\n manifestHash: 23459f7be52d7c818dc060a8bcf5e3565bd87a7b\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n - id: v1.7.0\n kubernetesVersion: '\u003e=1.7.0 \u003c1.15.0'\n manifest: storage-aws.addons.k8s.io/v1.7.0.yaml\n manifestHash: 62705a596142e6cc283280e8aa973e51536994c5\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n - id: v1.6.0\n kubernetesVersion: \u003c1.7.0\n manifest: storage-aws.addons.k8s.io/v1.6.0.yaml\n manifestHash: 7de4b2eb0521d669172038759c521418711d8266\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n"}}
I1212 13:18:41.268596 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/bootstrap-channel.yaml"
I1212 13:18:41.268802 402535 executor.go:178] Executing task "kops.domain.com-addons-limit-range.addons.k8s.io": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-limit-range.addons.k8s.io","Lifecycle":"Sync","Location":"addons/limit-range.addons.k8s.io/v1.5.0.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: LimitRange\nmetadata:\n name: limits\n namespace: default\nspec:\n limits:\n - defaultRequest:\n cpu: 100m\n type: Container"}}
I1212 13:18:41.268874 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:41.590146 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:41.590199 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-events/"
I1212 13:18:41.629481 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:41.629621 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-main/"
I1212 13:18:41.631587 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:41.631777 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-events/"
I1212 13:18:41.632564 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method
I1212 13:18:41.632598 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/"
I1212 13:18:41.646326 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:41.646402 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-clients-ca/"
I1212 13:18:41.650696 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:41.650756 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-main/"
I1212 13:18:41.651807 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:41.651840 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator-ca/"
I1212 13:18:41.681886 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events: []
I1212 13:18:41.681964 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml"
I1212 13:18:41.723718 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: []
I1212 13:18:41.723802 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:18:41.724766 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events: []
I1212 13:18:41.724823 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml"
I1212 13:18:41.738527 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca: []
I1212 13:18:41.738716 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml"
I1212 13:18:41.740448 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main: []
I1212 13:18:41.740482 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml"
I1212 13:18:41.741102 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main: []
I1212 13:18:41.741132 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml"
I1212 13:18:41.743739 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca: []
I1212 13:18:41.743829 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml"
I1212 13:18:41.796029 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:41.796071 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-events/"
I1212 13:18:41.823876 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:41.823961 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-main/"
I1212 13:18:41.825006 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:41.825071 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-clients-ca/"
I1212 13:18:41.827491 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method
I1212 13:18:41.827558 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/"
I1212 13:18:41.843391 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:41.843466 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-main/"
I1212 13:18:41.888746 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events: []
I1212 13:18:41.903113 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:41.903199 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator-ca/"
I1212 13:18:41.916420 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main: []
I1212 13:18:41.920103 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca: []
I1212 13:18:41.935986 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: []
I1212 13:18:41.954346 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main: []
I1212 13:18:41.997118 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca: []
I1212 13:18:42.086007 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:42.086067 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-events/"
I1212 13:18:42.177418 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events: []
I1212 13:18:42.177653 402535 executor.go:103] Tasks: 44 done / 86 total; 24 can run
I1212 13:18:42.177764 402535 executor.go:178] Executing task "IAMInstanceProfileRole/nodes.kops.domain.com": *awstasks.IAMInstanceProfileRole {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","InstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}}
I1212 13:18:42.178069 402535 iaminstanceprofilerole.go:45] Role/RoleID not set
I1212 13:18:42.178190 402535 executor.go:178] Executing task "RouteTable/kops.domain.com": *awstasks.RouteTable {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}}
I1212 13:18:42.178797 402535 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1212 13:18:42.179175 402535 executor.go:178] Executing task "MirrorSecrets/mirror-secrets": *fitasks.MirrorSecrets {"Name":"mirror-secrets","Lifecycle":null,"MirrorPath":{}}
I1212 13:18:42.179447 402535 executor.go:178] Executing task "SecurityGroup/masters.kops.domain.com": *awstasks.SecurityGroup {"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:18:42.179952 402535 executor.go:178] Executing task "IAMRolePolicy/additional.nodes.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.nodes.kops.domain.com","Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Name":"","Resource":""}}
I1212 13:18:42.180327 402535 request_logger.go:45] AWS request: iam/GetRolePolicy
I1212 13:18:42.180581 402535 executor.go:178] Executing task "SecurityGroup/nodes.kops.domain.com": *awstasks.SecurityGroup {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:18:42.180881 402535 executor.go:178] Executing task "Keypair/kube-proxy": *fitasks.Keypair {"Name":"kube-proxy","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-proxy","type":"client","format":"v1alpha2"}
I1212 13:18:42.181023 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml"
I1212 13:18:42.181675 402535 executor.go:178] Executing task "IAMRolePolicy/additional.masters.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.masters.kops.domain.com","Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Name":"","Resource":""}}
I1212 13:18:42.181913 402535 request_logger.go:45] AWS request: iam/GetRolePolicy
I1212 13:18:42.182794 402535 executor.go:178] Executing task "Keypair/kubecfg": *fitasks.Keypair {"Name":"kubecfg","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:masters,cn=kubecfg","type":"client","format":"v1alpha2"}
I1212 13:18:42.182883 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml"
I1212 13:18:42.183284 402535 executor.go:178] Executing task "Keypair/kube-controller-manager": *fitasks.Keypair {"Name":"kube-controller-manager","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-controller-manager","type":"client","format":"v1alpha2"}
I1212 13:18:42.183417 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml"
I1212 13:18:42.184178 402535 executor.go:178] Executing task "Subnet/us-west-1a.kops.domain.com": *awstasks.Subnet {"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}
I1212 13:18:42.184772 402535 request_logger.go:45] AWS request: ec2/DescribeSubnets
I1212 13:18:42.185042 402535 executor.go:178] Executing task "IAMRolePolicy/nodes.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","Role":{"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"kops.domain.com","creationTimestamp":"2019-12-12T13:18:38Z"},"spec":{"channel":"stable","configBase":"s3://kops-domain-com-state-store/kops.domain.com","cloudProvider":"aws","kubernetesVersion":"1.15.5","subnets":[{"name":"us-west-1a","cidr":"172.20.32.0/19","zone":"us-west-1a","type":"Public"}],"masterPublicName":"api.kops.domain.com","masterInternalName":"api.internal.kops.domain.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://kops-domain-com-state-store/kops.domain.com/secrets","keyStore":"s3://kops-domain-com-state-store/kops.domain.com/pki","configStore":"s3://kops-domain-com-state-store/kops.domain.com","dnsZone":"Z237FHI0B4E3ZX","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"100m"}],"docker":{"ipMasq":false,"ipTables":false,"logDriver":"json-file","logLevel":"warn","logOpt":["max-size=10m","max-file=5"],"storage":"overlay2,overlay,aufs","version":"18.06.3"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.15.5","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"bindAddress":"0.0.0.0","insecureBindAddress":"127.0.0.1","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.15.5","cloudProvider":"aws","clusterName":"kops.domain.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.15.5","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.15.5","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-west-1","ResourceARN":null,"Role":"Node"},"DNSZone":{"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":"kops.domain.com","ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}}}
I1212 13:18:42.185757 402535 request_logger.go:45] AWS request: iam/GetRolePolicy
I1212 13:18:42.186111 402535 executor.go:178] Executing task "Keypair/master": *fitasks.Keypair {"Name":"master","alternateNames":["kubernetes","kubernetes.default","kubernetes.default.svc","kubernetes.default.svc.cluster.local","api.kops.domain.com","api.internal.kops.domain.com","100.64.0.1","127.0.0.1"],"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=kubernetes-master","type":"server","format":"v1alpha2"}
I1212 13:18:42.186223 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml"
I1212 13:18:42.186665 402535 executor.go:178] Executing task "Keypair/apiserver-proxy-client": *fitasks.Keypair {"Name":"apiserver-proxy-client","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=apiserver-proxy-client","type":"client","format":"v1alpha2"}
I1212 13:18:42.186810 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml"
I1212 13:18:42.187216 402535 executor.go:178] Executing task "IAMInstanceProfileRole/masters.kops.domain.com": *awstasks.IAMInstanceProfileRole {"Name":"masters.kops.domain.com","Lifecycle":"Sync","InstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}}
I1212 13:18:42.187274 402535 iaminstanceprofilerole.go:45] Role/RoleID not set
I1212 13:18:42.187329 402535 executor.go:178] Executing task "InternetGateway/kops.domain.com": *awstasks.InternetGateway {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:18:42.187783 402535 request_logger.go:45] AWS request: ec2/DescribeInternetGateways
I1212 13:18:42.188201 402535 executor.go:178] Executing task "MirrorKeystore/mirror-keystore": *fitasks.MirrorKeystore {"Name":"mirror-keystore","Lifecycle":null,"MirrorPath":{}}
I1212 13:18:42.188375 402535 executor.go:178] Executing task "VPCDHCPOptionsAssociation/kops.domain.com": *awstasks.VPCDHCPOptionsAssociation {"Name":"kops.domain.com","Lifecycle":"Sync","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"DHCPOptions":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"DomainName":"us-west-1.compute.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}}
I1212 13:18:42.188659 402535 executor.go:178] Executing task "IAMRolePolicy/masters.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","Role":{"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"kops.domain.com","creationTimestamp":"2019-12-12T13:18:38Z"},"spec":{"channel":"stable","configBase":"s3://kops-domain-com-state-store/kops.domain.com","cloudProvider":"aws","kubernetesVersion":"1.15.5","subnets":[{"name":"us-west-1a","cidr":"172.20.32.0/19","zone":"us-west-1a","type":"Public"}],"masterPublicName":"api.kops.domain.com","masterInternalName":"api.internal.kops.domain.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://kops-domain-com-state-store/kops.domain.com/secrets","keyStore":"s3://kops-domain-com-state-store/kops.domain.com/pki","configStore":"s3://kops-domain-com-state-store/kops.domain.com","dnsZone":"Z237FHI0B4E3ZX","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"100m"}],"docker":{"ipMasq":false,"ipTables":false,"logDriver":"json-file","logLevel":"warn","logOpt":["max-size=10m","max-file=5"],"storage":"overlay2,overlay,aufs","version":"18.06.3"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.15.5","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"bindAddress":"0.0.0.0","insecureBindAddress":"127.0.0.1","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.15.5","cloudProvider":"aws","clusterName":"kops.domain.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.15.5","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.15.5","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-west-1","ResourceARN":null,"Role":"Master"},"DNSZone":{"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":"kops.domain.com","ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}}}
I1212 13:18:42.189160 402535 request_logger.go:45] AWS request: iam/GetRolePolicy
I1212 13:18:42.189322 402535 executor.go:178] Executing task "Keypair/kubelet": *fitasks.Keypair {"Name":"kubelet","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:nodes,cn=kubelet","type":"client","format":"v1alpha2"}
I1212 13:18:42.189405 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml"
I1212 13:18:42.189789 402535 executor.go:178] Executing task "Keypair/kube-scheduler": *fitasks.Keypair {"Name":"kube-scheduler","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-scheduler","type":"client","format":"v1alpha2"}
I1212 13:18:42.189910 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml"
I1212 13:18:42.190428 402535 executor.go:178] Executing task "Keypair/apiserver-aggregator": *fitasks.Keypair {"Name":"apiserver-aggregator","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"apiserver-aggregator-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","type":"ca","format":"v1alpha2"},"subject":"cn=aggregator","type":"client","format":"v1alpha2"}
I1212 13:18:42.190555 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml"
I1212 13:18:42.190966 402535 executor.go:178] Executing task "Keypair/kops": *fitasks.Keypair {"Name":"kops","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:masters,cn=kops","type":"client","format":"v1alpha2"}
I1212 13:18:42.191049 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml"
I1212 13:18:42.191549 402535 executor.go:178] Executing task "Keypair/kubelet-api": *fitasks.Keypair {"Name":"kubelet-api","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=kubelet-api","type":"client","format":"v1alpha2"}
I1212 13:18:42.191656 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml"
I1212 13:18:42.271457 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml", falling back to directory-list method
I1212 13:18:42.271550 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-proxy/"
I1212 13:18:42.283105 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml", falling back to directory-list method
I1212 13:18:42.283146 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubecfg/"
I1212 13:18:42.356122 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml", falling back to directory-list method
I1212 13:18:42.356216 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-controller-manager/"
I1212 13:18:42.381998 402535 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:18:42.382045 402535 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:18:42.382199 402535 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:18:42.384565 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml", falling back to directory-list method
I1212 13:18:42.384622 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/master/"
I1212 13:18:42.400048 402535 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1212 13:18:42.410174 402535 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:18:42.410247 402535 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:18:42.410426 402535 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:18:42.443560 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml", falling back to directory-list method
I1212 13:18:42.443642 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-proxy-client/"
I1212 13:18:42.485790 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml", falling back to directory-list method
I1212 13:18:42.485896 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet/"
I1212 13:18:42.523934 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml", falling back to directory-list method
I1212 13:18:42.524005 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-scheduler/"
I1212 13:18:42.526613 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml", falling back to directory-list method
I1212 13:18:42.526683 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kops/"
I1212 13:18:42.530160 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml", falling back to directory-list method
I1212 13:18:42.530203 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator/"
I1212 13:18:42.538799 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy: []
I1212 13:18:42.538840 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml"
I1212 13:18:42.542408 402535 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml", falling back to directory-list method
I1212 13:18:42.542481 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet-api/"
I1212 13:18:42.543544 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager: []
I1212 13:18:42.543569 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml"
I1212 13:18:42.550839 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client: []
I1212 13:18:42.550904 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml"
I1212 13:18:42.556358 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg: []
I1212 13:18:42.556424 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml"
I1212 13:18:42.561850 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master: []
I1212 13:18:42.561898 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml"
I1212 13:18:42.593539 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet: []
I1212 13:18:42.593633 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml"
I1212 13:18:42.616561 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler: []
I1212 13:18:42.616647 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml"
I1212 13:18:42.617299 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops: []
I1212 13:18:42.617320 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml"
I1212 13:18:42.620117 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator: []
I1212 13:18:42.620152 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml"
I1212 13:18:42.622028 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml", falling back to directory-list method
I1212 13:18:42.622080 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-proxy/"
I1212 13:18:42.628909 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml", falling back to directory-list method
I1212 13:18:42.629011 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-controller-manager/"
I1212 13:18:42.633077 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml", falling back to directory-list method
I1212 13:18:42.633101 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-proxy-client/"
I1212 13:18:42.646912 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml", falling back to directory-list method
I1212 13:18:42.647016 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubecfg/"
I1212 13:18:42.652743 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml", falling back to directory-list method
I1212 13:18:42.652846 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/master/"
I1212 13:18:42.686632 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api: []
I1212 13:18:42.686674 402535 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml"
I1212 13:18:42.696742 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml", falling back to directory-list method
I1212 13:18:42.696820 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet/"
I1212 13:18:42.701628 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml", falling back to directory-list method
I1212 13:18:42.701702 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kops/"
I1212 13:18:42.705786 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml", falling back to directory-list method
I1212 13:18:42.705831 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-scheduler/"
I1212 13:18:42.706803 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml", falling back to directory-list method
I1212 13:18:42.706835 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator/"
I1212 13:18:42.722781 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy: []
I1212 13:18:42.723338 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client: []
I1212 13:18:42.746076 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/master: []
I1212 13:18:42.757246 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager: []
I1212 13:18:42.767918 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg: []
I1212 13:18:42.770163 402535 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml", falling back to directory-list method
I1212 13:18:42.770188 402535 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet-api/"
I1212 13:18:42.792781 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops: []
I1212 13:18:42.793645 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet: []
I1212 13:18:42.796882 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler: []
I1212 13:18:42.797873 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator: []
I1212 13:18:42.902118 402535 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api: []
I1212 13:18:42.902292 402535 executor.go:103] Tasks: 68 done / 86 total; 16 can run
I1212 13:18:42.902373 402535 executor.go:178] Executing task "SecurityGroupRule/all-master-to-master": *awstasks.SecurityGroupRule {"Name":"all-master-to-master","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:18:42.902899 402535 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-2382-4000": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-2382-4000","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":2382,"ToPort":4000,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:18:42.903075 402535 executor.go:178] Executing task "SecurityGroupRule/node-to-master-udp-1-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-udp-1-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"udp","FromPort":1,"ToPort":65535,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:18:42.903236 402535 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-1-2379": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-1-2379","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":1,"ToPort":2379,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:18:42.903458 402535 executor.go:178] Executing task "SecurityGroupRule/ssh-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null}
I1212 13:18:42.903641 402535 executor.go:178] Executing task "SecurityGroupRule/https-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"https-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":443,"ToPort":443,"SourceGroup":null,"Egress":null}
I1212 13:18:42.903762 402535 executor.go:178] Executing task "LaunchConfiguration/nodes.kops.domain.com": *awstasks.LaunchConfiguration {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"t2.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":128,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}}
I1212 13:18:42.904376 402535 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1212 13:18:42.905029 402535 executor.go:178] Executing task "RouteTableAssociation/us-west-1a.kops.domain.com": *awstasks.RouteTableAssociation {"Name":"us-west-1a.kops.domain.com","Lifecycle":"Sync","ID":null,"RouteTable":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}},"Subnet":{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}}
I1212 13:18:42.905319 402535 executor.go:178] Executing task "SecurityGroupRule/all-master-to-node": *awstasks.SecurityGroupRule {"Name":"all-master-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:18:42.905556 402535 executor.go:178] Executing task "SecurityGroupRule/node-egress": *awstasks.SecurityGroupRule {"Name":"node-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true}
I1212 13:18:42.905771 402535 executor.go:178] Executing task "Route/0.0.0.0/0": *awstasks.Route {"Name":"0.0.0.0/0","Lifecycle":"Sync","RouteTable":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}},"Instance":null,"CIDR":"0.0.0.0/0","InternetGateway":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"NatGateway":null}
I1212 13:18:42.906194 402535 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-4003-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-4003-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":4003,"ToPort":65535,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:18:42.906319 402535 executor.go:178] Executing task "SecurityGroupRule/master-egress": *awstasks.SecurityGroupRule {"Name":"master-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true}
I1212 13:18:42.906451 402535 executor.go:178] Executing task "LaunchConfiguration/master-us-west-1a.masters.kops.domain.com": *awstasks.LaunchConfiguration {"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"m3.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":64,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC1aWKcsCEQV7fEVed7D8+UQKo4gmM8EKWmFirX1iPSO3eX5cQzHhVyQ/hK4rYPLqOybB3OTUNLFjjeSlvsS+yj1+5DrNjqdX5XDCqpJTKJZJBALuPzRNgBmCPZ7eRk3sHzgU4cXqJxVlX135yQIK+ii6oGCKD6JWWHUCo3SQKtiIQHyMI8j3XXvanJhHUlbLhO/BKSkNd/3ER24IPdMmKl+3LuvsR3UhDGdB3F3m4l+Y8RWq2bOyffgTfv4zGRJFNPuBD+afICXsd07p8s5xAmZLL3x///uQr9Hmw5zwb6zVnciT+1s0hxn/MK6OWGABNOhqTYBpunxsceirSDzqRHNd3b7dG9DR+Foek/xELVXCJ+wJXEhA9wBMSO38eJTSUXfId66MbfQB5qvMwxTvoOmJA+AW/9CPawmrZgSYxkALNhkbVY9PLCMnDhl7NqLOpHp8OSLY1owsRc/bRH9l8wHpuBVR0qrZ70KP/w4j9WrQ5g+ygf3H5Q+OjA5SO6mhk= user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}}
I1212 13:18:42.907016 402535 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1212 13:18:42.907152 402535 executor.go:178] Executing task "SecurityGroupRule/ssh-external-to-node-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-node-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null}
I1212 13:18:42.907304 402535 executor.go:178] Executing task "SecurityGroupRule/all-node-to-node": *awstasks.SecurityGroupRule {"Name":"all-node-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:18:43.531490 402535 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1212 13:18:43.550702 402535 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1212 13:18:43.717543 402535 executor.go:103] Tasks: 84 done / 86 total; 2 can run
I1212 13:18:43.717607 402535 executor.go:178] Executing task "AutoscalingGroup/nodes.kops.domain.com": *awstasks.AutoscalingGroup {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","Granularity":"1Minute","InstanceProtection":null,"LaunchConfiguration":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"t2.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":128,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}},"LaunchTemplate":null,"MaxSize":2,"Metrics":["GroupDesiredCapacity","GroupInServiceInstances","GroupMaxSize","GroupMinSize","GroupPendingInstances","GroupStandbyInstances","GroupTerminatingInstances","GroupTotalInstances"],"MinSize":2,"MixedInstanceOverrides":null,"MixedOnDemandAllocationStrategy":null,"MixedOnDemandBase":null,"MixedOnDemandAboveBase":null,"MixedSpotAllocationStrategy":null,"MixedSpotInstancePools":null,"MixedSpotMaxPrice":null,"Subnets":[{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}],"SuspendProcesses":[],"Tags":{"k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup":"nodes","k8s.io/role/node":"1","kops.k8s.io/instancegroup":"nodes"}}
I1212 13:18:43.718164 402535 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups
I1212 13:18:43.718363 402535 executor.go:178] Executing task "AutoscalingGroup/master-us-west-1a.masters.kops.domain.com": *awstasks.AutoscalingGroup {"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","Granularity":"1Minute","InstanceProtection":null,"LaunchConfiguration":{"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"m3.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":64,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}},"LaunchTemplate":null,"MaxSize":1,"Metrics":["GroupDesiredCapacity","GroupInServiceInstances","GroupMaxSize","GroupMinSize","GroupPendingInstances","GroupStandbyInstances","GroupTerminatingInstances","GroupTotalInstances"],"MinSize":1,"MixedInstanceOverrides":null,"MixedOnDemandAllocationStrategy":null,"MixedOnDemandBase":null,"MixedOnDemandAboveBase":null,"MixedSpotAllocationStrategy":null,"MixedSpotInstancePools":null,"MixedSpotMaxPrice":null,"Subnets":[{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}],"SuspendProcesses":[],"Tags":{"k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup":"master-us-west-1a","k8s.io/role/master":"1","kops.k8s.io/instancegroup":"master-us-west-1a"}}
I1212 13:18:43.718646 402535 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups
I1212 13:18:43.933012 402535 executor.go:103] Tasks: 86 done / 86 total; 0 can run
I1212 13:18:43.934872 402535 dryrun_target.go:255] ContainerAssets:
I1212 13:18:43.934888 402535 dryrun_target.go:257] k8s.gcr.io/kube-apiserver:v1.15.5
I1212 13:18:43.934896 402535 dryrun_target.go:257] k8s.gcr.io/pause-amd64:3.0
I1212 13:18:43.934916 402535 dryrun_target.go:257] k8s.gcr.io/kube-controller-manager:v1.15.5
I1212 13:18:43.934924 402535 dryrun_target.go:257] k8s.gcr.io/kube-scheduler:v1.15.5
I1212 13:18:43.934930 402535 dryrun_target.go:257] k8s.gcr.io/kube-proxy:v1.15.5
I1212 13:18:43.934936 402535 dryrun_target.go:257] k8s.gcr.io/kube-apiserver:v1.15.5
I1212 13:18:43.934942 402535 dryrun_target.go:257] k8s.gcr.io/pause-amd64:3.0
I1212 13:18:43.934949 402535 dryrun_target.go:257] k8s.gcr.io/kube-controller-manager:v1.15.5
I1212 13:18:43.934955 402535 dryrun_target.go:257] k8s.gcr.io/kube-proxy:v1.15.5
I1212 13:18:43.934961 402535 dryrun_target.go:257] k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0
I1212 13:18:43.934967 402535 dryrun_target.go:257] k8s.gcr.io/kubedns-amd64:1.9
I1212 13:18:43.934973 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10
I1212 13:18:43.934979 402535 dryrun_target.go:257] k8s.gcr.io/dnsmasq-metrics-amd64:1.0
I1212 13:18:43.934997 402535 dryrun_target.go:257] k8s.gcr.io/exechealthz-amd64:1.2
I1212 13:18:43.935004 402535 dryrun_target.go:257] k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2
I1212 13:18:43.935011 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10
I1212 13:18:43.935017 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10
I1212 13:18:43.935024 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10
I1212 13:18:43.935030 402535 dryrun_target.go:257] k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0
I1212 13:18:43.935036 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13
I1212 13:18:43.935042 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13
I1212 13:18:43.935048 402535 dryrun_target.go:257] k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13
I1212 13:18:43.935054 402535 dryrun_target.go:257] kope/dns-controller:1.15.0
I1212 13:18:43.935060 402535 dryrun_target.go:257] kope/dns-controller:1.15.0
I1212 13:18:43.935080 402535 dryrun_target.go:257] kope/dns-controller:1.15.0
I1212 13:18:43.935086 402535 dryrun_target.go:257] kopeio/etcd-manager:3.0.20190930
I1212 13:18:43.935092 402535 dryrun_target.go:257] kopeio/etcd-manager:3.0.20190930
I1212 13:18:43.935097 402535 dryrun_target.go:262] FileAssets:
I1212 13:18:43.935118 402535 dryrun_target.go:267] https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet
I1212 13:18:43.935125 402535 dryrun_target.go:267] https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl
I1212 13:18:43.935132 402535 dryrun_target.go:267] https://storage.googleapis.com/kubernetes-release/network-plugins/cni-plugins-amd64-v0.7.5.tgz
I1212 13:18:43.935139 402535 dryrun_target.go:267] https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz
I1212 13:18:43.935159 402535 dryrun_target.go:267] https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup
I1212 13:18:43.935166 402535 dryrun_target.go:267] https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz
Will create resources:
AutoscalingGroup/master-us-west-1a.masters.kops.domain.com
Granularity 1Minute
LaunchConfiguration name:master-us-west-1a.masters.kops.domain.com
MaxSize 1
Metrics [GroupDesiredCapacity, GroupInServiceInstances, GroupMaxSize, GroupMinSize, GroupPendingInstances, GroupStandbyInstances, GroupTerminatingInstances, GroupTotalInstances]
MinSize 1
Subnets [name:us-west-1a.kops.domain.com]
SuspendProcesses []
Tags {k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup: master-us-west-1a, k8s.io/role/master: 1, kops.k8s.io/instancegroup: master-us-west-1a, Name: master-us-west-1a.masters.kops.domain.com, KubernetesCluster: kops.domain.com}
AutoscalingGroup/nodes.kops.domain.com
Granularity 1Minute
LaunchConfiguration name:nodes.kops.domain.com
MaxSize 2
Metrics [GroupDesiredCapacity, GroupInServiceInstances, GroupMaxSize, GroupMinSize, GroupPendingInstances, GroupStandbyInstances, GroupTerminatingInstances, GroupTotalInstances]
MinSize 2
Subnets [name:us-west-1a.kops.domain.com]
SuspendProcesses []
Tags {k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup: nodes, k8s.io/role/node: 1, kops.k8s.io/instancegroup: nodes, Name: nodes.kops.domain.com, KubernetesCluster: kops.domain.com}
DHCPOptions/kops.domain.com
DomainName us-west-1.compute.internal
DomainNameServers AmazonProvidedDNS
Shared false
Tags {Name: kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned}
EBSVolume/a.etcd-events.kops.domain.com
AvailabilityZone us-west-1a
Encrypted false
SizeGB 20
Tags {k8s.io/etcd/events: a/a, k8s.io/role/master: 1, kubernetes.io/cluster/kops.domain.com: owned, Name: a.etcd-events.kops.domain.com, KubernetesCluster: kops.domain.com}
VolumeType gp2
EBSVolume/a.etcd-main.kops.domain.com
AvailabilityZone us-west-1a
Encrypted false
SizeGB 20
Tags {k8s.io/etcd/main: a/a, k8s.io/role/master: 1, kubernetes.io/cluster/kops.domain.com: owned, Name: a.etcd-main.kops.domain.com, KubernetesCluster: kops.domain.com}
VolumeType gp2
IAMInstanceProfile/masters.kops.domain.com
Shared false
IAMInstanceProfile/nodes.kops.domain.com
Shared false
IAMInstanceProfileRole/masters.kops.domain.com
InstanceProfile name:masters.kops.domain.com id:masters.kops.domain.com
Role name:masters.kops.domain.com
IAMInstanceProfileRole/nodes.kops.domain.com
InstanceProfile name:nodes.kops.domain.com id:nodes.kops.domain.com
Role name:nodes.kops.domain.com
IAMRole/masters.kops.domain.com
ExportWithID masters
IAMRole/nodes.kops.domain.com
ExportWithID nodes
IAMRolePolicy/masters.kops.domain.com
Role name:masters.kops.domain.com
IAMRolePolicy/nodes.kops.domain.com
Role name:nodes.kops.domain.com
InternetGateway/kops.domain.com
VPC name:kops.domain.com
Shared false
Tags {Name: kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned}
Keypair/apiserver-aggregator
Signer name:apiserver-aggregator-ca id:cn=apiserver-aggregator-ca
Subject cn=aggregator
Type client
Format v1alpha2
Keypair/apiserver-aggregator-ca
Subject cn=apiserver-aggregator-ca
Type ca
Format v1alpha2
Keypair/apiserver-proxy-client
Signer name:ca id:cn=kubernetes
Subject cn=apiserver-proxy-client
Type client
Format v1alpha2
Keypair/ca
Subject cn=kubernetes
Type ca
Format v1alpha2
Keypair/etcd-clients-ca
Subject cn=etcd-clients-ca
Type ca
Format v1alpha2
Keypair/etcd-manager-ca-events
Subject cn=etcd-manager-ca-events
Type ca
Format v1alpha2
Keypair/etcd-manager-ca-main
Subject cn=etcd-manager-ca-main
Type ca
Format v1alpha2
Keypair/etcd-peers-ca-events
Subject cn=etcd-peers-ca-events
Type ca
Format v1alpha2
Keypair/etcd-peers-ca-main
Subject cn=etcd-peers-ca-main
Type ca
Format v1alpha2
Keypair/kops
Signer name:ca id:cn=kubernetes
Subject o=system:masters,cn=kops
Type client
Format v1alpha2
Keypair/kube-controller-manager
Signer name:ca id:cn=kubernetes
Subject cn=system:kube-controller-manager
Type client
Format v1alpha2
Keypair/kube-proxy
Signer name:ca id:cn=kubernetes
Subject cn=system:kube-proxy
Type client
Format v1alpha2
Keypair/kube-scheduler
Signer name:ca id:cn=kubernetes
Subject cn=system:kube-scheduler
Type client
Format v1alpha2
Keypair/kubecfg
Signer name:ca id:cn=kubernetes
Subject o=system:masters,cn=kubecfg
Type client
Format v1alpha2
Keypair/kubelet
Signer name:ca id:cn=kubernetes
Subject o=system:nodes,cn=kubelet
Type client
Format v1alpha2
Keypair/kubelet-api
Signer name:ca id:cn=kubernetes
Subject cn=kubelet-api
Type client
Format v1alpha2
Keypair/master
AlternateNames [100.64.0.1, 127.0.0.1, api.kops.domain.com, api.internal.kops.domain.com, kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local]
Signer name:ca id:cn=kubernetes
Subject cn=kubernetes-master
Type server
Format v1alpha2
LaunchConfiguration/master-us-west-1a.masters.kops.domain.com
AssociatePublicIP true
IAMInstanceProfile name:masters.kops.domain.com id:masters.kops.domain.com
ImageID kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26
InstanceType m3.medium
RootVolumeSize 64
RootVolumeType gp2
SSHKey name:kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 id:kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2
SecurityGroups [name:masters.kops.domain.com]
SpotPrice
LaunchConfiguration/nodes.kops.domain.com
AssociatePublicIP true
IAMInstanceProfile name:nodes.kops.domain.com id:nodes.kops.domain.com
ImageID kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26
InstanceType t2.medium
RootVolumeSize 128
RootVolumeType gp2
SSHKey name:kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 id:kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2
SecurityGroups [name:nodes.kops.domain.com]
SpotPrice
ManagedFile/kops.domain.com-addons-bootstrap
Location addons/bootstrap-channel.yaml
ManagedFile/kops.domain.com-addons-core.addons.k8s.io
Location addons/core.addons.k8s.io/v1.4.0.yaml
ManagedFile/kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12
Location addons/dns-controller.addons.k8s.io/k8s-1.12.yaml
ManagedFile/kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6
Location addons/dns-controller.addons.k8s.io/k8s-1.6.yaml
ManagedFile/kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6
Location addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml
ManagedFile/kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12
Location addons/kube-dns.addons.k8s.io/k8s-1.12.yaml
ManagedFile/kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6
Location addons/kube-dns.addons.k8s.io/k8s-1.6.yaml
ManagedFile/kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6
Location addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml
ManagedFile/kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9
Location addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml
ManagedFile/kops.domain.com-addons-limit-range.addons.k8s.io
Location addons/limit-range.addons.k8s.io/v1.5.0.yaml
ManagedFile/kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8
Location addons/rbac.addons.k8s.io/k8s-1.8.yaml
ManagedFile/kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0
Location addons/storage-aws.addons.k8s.io/v1.15.0.yaml
ManagedFile/kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0
Location addons/storage-aws.addons.k8s.io/v1.6.0.yaml
ManagedFile/kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0
Location addons/storage-aws.addons.k8s.io/v1.7.0.yaml
ManagedFile/etcd-cluster-spec-events
Location backups/etcd/events/control/etcd-cluster-spec
ManagedFile/etcd-cluster-spec-main
Location backups/etcd/main/control/etcd-cluster-spec
ManagedFile/manifests-etcdmanager-events
Location manifests/etcd/events.yaml
ManagedFile/manifests-etcdmanager-main
Location manifests/etcd/main.yaml
Route/0.0.0.0/0
RouteTable name:kops.domain.com
CIDR 0.0.0.0/0
InternetGateway name:kops.domain.com
RouteTable/kops.domain.com
VPC name:kops.domain.com
Shared false
Tags {Name: kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned, kubernetes.io/kops/role: public}
RouteTableAssociation/us-west-1a.kops.domain.com
RouteTable name:kops.domain.com
Subnet name:us-west-1a.kops.domain.com
SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2
KeyFingerprint 7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45
Secret/admin
Secret/kube
Secret/kube-proxy
Secret/kubelet
Secret/system:controller_manager
Secret/system:dns
Secret/system:logging
Secret/system:monitoring
Secret/system:scheduler
SecurityGroup/masters.kops.domain.com
Description Security group for masters
VPC name:kops.domain.com
RemoveExtraRules [port=22, port=443, port=2380, port=2381, port=4001, port=4002, port=4789, port=179]
Tags {kubernetes.io/cluster/kops.domain.com: owned, Name: masters.kops.domain.com, KubernetesCluster: kops.domain.com}
SecurityGroup/nodes.kops.domain.com
Description Security group for nodes
VPC name:kops.domain.com
RemoveExtraRules [port=22]
Tags {Name: nodes.kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned}
SecurityGroupRule/all-master-to-master
SecurityGroup name:masters.kops.domain.com
SourceGroup name:masters.kops.domain.com
SecurityGroupRule/all-master-to-node
SecurityGroup name:nodes.kops.domain.com
SourceGroup name:masters.kops.domain.com
SecurityGroupRule/all-node-to-node
SecurityGroup name:nodes.kops.domain.com
SourceGroup name:nodes.kops.domain.com
SecurityGroupRule/https-external-to-master-0.0.0.0/0
SecurityGroup name:masters.kops.domain.com
CIDR 0.0.0.0/0
Protocol tcp
FromPort 443
ToPort 443
SecurityGroupRule/master-egress
SecurityGroup name:masters.kops.domain.com
CIDR 0.0.0.0/0
Egress true
SecurityGroupRule/node-egress
SecurityGroup name:nodes.kops.domain.com
CIDR 0.0.0.0/0
Egress true
SecurityGroupRule/node-to-master-tcp-1-2379
SecurityGroup name:masters.kops.domain.com
Protocol tcp
FromPort 1
ToPort 2379
SourceGroup name:nodes.kops.domain.com
SecurityGroupRule/node-to-master-tcp-2382-4000
SecurityGroup name:masters.kops.domain.com
Protocol tcp
FromPort 2382
ToPort 4000
SourceGroup name:nodes.kops.domain.com
SecurityGroupRule/node-to-master-tcp-4003-65535
SecurityGroup name:masters.kops.domain.com
Protocol tcp
FromPort 4003
ToPort 65535
SourceGroup name:nodes.kops.domain.com
SecurityGroupRule/node-to-master-udp-1-65535
SecurityGroup name:masters.kops.domain.com
Protocol udp
FromPort 1
ToPort 65535
SourceGroup name:nodes.kops.domain.com
SecurityGroupRule/ssh-external-to-master-0.0.0.0/0
SecurityGroup name:masters.kops.domain.com
CIDR 0.0.0.0/0
Protocol tcp
FromPort 22
ToPort 22
SecurityGroupRule/ssh-external-to-node-0.0.0.0/0
SecurityGroup name:nodes.kops.domain.com
CIDR 0.0.0.0/0
Protocol tcp
FromPort 22
ToPort 22
Subnet/us-west-1a.kops.domain.com
ShortName us-west-1a
VPC name:kops.domain.com
AvailabilityZone us-west-1a
CIDR 172.20.32.0/19
Shared false
Tags {Name: us-west-1a.kops.domain.com, KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned, SubnetType: Public, kubernetes.io/role/elb: 1}
VPC/kops.domain.com
CIDR 172.20.0.0/16
EnableDNSHostnames true
EnableDNSSupport true
Shared false
Tags {KubernetesCluster: kops.domain.com, kubernetes.io/cluster/kops.domain.com: owned, Name: kops.domain.com}
VPCDHCPOptionsAssociation/kops.domain.com
VPC name:kops.domain.com
DHCPOptions name:kops.domain.com
I1212 13:18:43.935186 402535 context.go:91] deleting temp dir: "/tmp/deploy342416001"
Must specify --yes to apply changes
Cluster configuration has been created.
Suggestions:
* list clusters with: kops get cluster
* edit this cluster with: kops edit cluster kops.domain.com
* edit your node instance group: kops edit ig --name=kops.domain.com nodes
* edit your master instance group: kops edit ig --name=kops.domain.com master-us-west-1a
Finally configure your cluster with: kops update cluster --name kops.domain.com --yes
I1212 13:18:53.203105 402540 factory.go:68] state store s3://kops-domain-com-state-store
I1212 13:18:53.203226 402540 s3context.go:325] unable to read /sys/devices/virtual/dmi/id/product_uuid, assuming not running on EC2: open /sys/devices/virtual/dmi/id/product_uuid: permission denied
I1212 13:18:53.203259 402540 s3context.go:170] defaulting region to "us-east-1"
I1212 13:18:53.597036 402540 s3context.go:210] found bucket in region "us-east-1"
I1212 13:18:53.597086 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/config"
I1212 13:18:53.993087 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/instancegroup/"
I1212 13:18:54.093564 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/instancegroup: [s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes]
I1212 13:18:54.093630 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a"
I1212 13:18:54.185766 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes"
I1212 13:18:54.274462 402540 channel.go:99] resolving "stable" against default channel location "https://raw.githubusercontent.com/kubernetes/kops/master/channels/"
I1212 13:18:54.274558 402540 channel.go:104] Loading channel from "https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable"
I1212 13:18:54.274600 402540 context.go:177] Performing HTTP request: GET https://raw.githubusercontent.com/kubernetes/kops/master/channels/stable
I1212 13:18:54.301959 402540 channel.go:113] Channel contents: spec:
images:
# We put the "legacy" version first, for kops versions that don't support versions ( < 1.5.0 )
- name: kope.io/k8s-1.4-debian-jessie-amd64-hvm-ebs-2017-07-28
providerID: aws
kubernetesVersion: ">=1.4.0 <1.5.0"
- name: kope.io/k8s-1.5-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.5.0 <1.6.0"
- name: kope.io/k8s-1.6-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.6.0 <1.7.0"
- name: kope.io/k8s-1.7-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.7.0 <1.8.0"
- name: kope.io/k8s-1.8-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.8.0 <1.9.0"
- name: kope.io/k8s-1.9-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.9.0 <1.10.0"
- name: kope.io/k8s-1.10-debian-jessie-amd64-hvm-ebs-2018-08-17
providerID: aws
kubernetesVersion: ">=1.10.0 <1.11.0"
# Stretch is the default for 1.11 (for nvme)
- name: kope.io/k8s-1.11-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.11.0 <1.12.0"
- name: kope.io/k8s-1.12-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.12.0 <1.13.0"
- name: kope.io/k8s-1.13-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.13.0 <1.14.0"
- name: kope.io/k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.14.0 <1.15.0"
- name: kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26
providerID: aws
kubernetesVersion: ">=1.15.0"
- providerID: gce
name: "cos-cloud/cos-stable-65-10323-99-0"
cluster:
kubernetesVersion: v1.5.8
networking:
kubenet: {}
kubernetesVersions:
- range: ">=1.17.0"
recommendedVersion: 1.17.0
requiredVersion: 1.17.0
- range: ">=1.16.0"
recommendedVersion: 1.16.2
requiredVersion: 1.16.0
- range: ">=1.15.0"
recommendedVersion: 1.15.5
requiredVersion: 1.15.0
- range: ">=1.14.0"
recommendedVersion: 1.14.8
requiredVersion: 1.14.0
- range: ">=1.13.0"
recommendedVersion: 1.13.12
requiredVersion: 1.13.0
- range: ">=1.12.0"
recommendedVersion: 1.12.10
requiredVersion: 1.12.0
- range: ">=1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.0
- range: "<1.11.0"
recommendedVersion: 1.11.10
requiredVersion: 1.11.10
kopsVersions:
- range: ">=1.17.0-alpha.1"
#recommendedVersion: "1.17.0"
#requiredVersion: 1.17.0
kubernetesVersion: 1.17.0
- range: ">=1.16.0-alpha.1"
#recommendedVersion: "1.16.0"
#requiredVersion: 1.16.0
kubernetesVersion: 1.16.2
- range: ">=1.15.0-alpha.1"
#recommendedVersion: "1.15.0"
#requiredVersion: 1.15.0
kubernetesVersion: 1.15.5
- range: ">=1.14.0-alpha.1"
#recommendedVersion: "1.14.0"
#requiredVersion: 1.14.0
kubernetesVersion: 1.14.8
- range: ">=1.13.0-alpha.1"
#recommendedVersion: "1.13.0"
#requiredVersion: 1.13.0
kubernetesVersion: 1.13.12
- range: ">=1.12.0-alpha.1"
recommendedVersion: "1.12.1"
#requiredVersion: 1.12.0
kubernetesVersion: 1.12.10
- range: ">=1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.11.0
kubernetesVersion: 1.11.10
- range: "<1.11.0-alpha.1"
recommendedVersion: "1.11.1"
#requiredVersion: 1.10.0
kubernetesVersion: 1.11.10
I1212 13:18:54.302473 402540 populate_cluster_spec.go:371] Defaulted KubeControllerManager.ClusterCIDR to 100.96.0.0/11
I1212 13:18:54.302520 402540 populate_cluster_spec.go:378] Defaulted ServiceClusterIPRange to 100.64.0.0/13
I1212 13:18:54.304003 402540 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:54.304167 402540 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:54.964206 402540 subnets.go:49] All subnets have CIDRs; skipping assignment logic
I1212 13:18:54.964255 402540 defaults.go:224] Not setting up Proxy Excludes
I1212 13:18:54.964381 402540 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:54.964618 402540 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:55.147951 402540 utils.go:167] Querying for all DNS zones to find match for "kops.domain.com"
I1212 13:18:55.148141 402540 route53.go:53] AWS request: route53 ListHostedZones
I1212 13:18:55.498357 402540 populate_cluster_spec.go:253] Defaulting DNS zone to: Z237FHI0B4E3ZX
I1212 13:18:55.498396 402540 tagbuilder.go:95] tags: [_aws _k8s_1_6]
I1212 13:18:55.498721 402540 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder
I1212 13:18:55.498738 402540 options_loader.go:130] executing builder *components.EtcdOptionsBuilder
I1212 13:18:55.498770 402540 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I1212 13:18:55.498784 402540 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder
I1212 13:18:55.498792 402540 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder
I1212 13:18:55.498850 402540 options_loader.go:130] executing builder *components.DockerOptionsBuilder
I1212 13:18:55.498864 402540 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder
I1212 13:18:55.498873 402540 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder
I1212 13:18:55.498887 402540 options_loader.go:130] executing builder *components.KubeletOptionsBuilder
I1212 13:18:55.498902 402540 kubelet.go:171] Cloud Provider: aws
I1212 13:18:55.498932 402540 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder
I1212 13:18:55.498944 402540 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure
I1212 13:18:55.498961 402540 kubecontrollermanager.go:79] AttachDetachReconcileSyncPeriod is not set; will set to default 1m0s
I1212 13:18:55.498979 402540 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder
I1212 13:18:55.498991 402540 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder
I1212 13:18:55.499535 402540 options_loader.go:130] executing builder *components.DefaultsOptionsBuilder
I1212 13:18:55.499550 402540 options_loader.go:130] executing builder *components.EtcdOptionsBuilder
I1212 13:18:55.499576 402540 options_loader.go:130] executing builder *etcdmanager.EtcdManagerOptionsBuilder
I1212 13:18:55.499585 402540 options_loader.go:130] executing builder *nodeauthorizer.OptionsBuilder
I1212 13:18:55.499592 402540 options_loader.go:130] executing builder *components.KubeAPIServerOptionsBuilder
I1212 13:18:55.499624 402540 options_loader.go:130] executing builder *components.DockerOptionsBuilder
I1212 13:18:55.499666 402540 options_loader.go:130] executing builder *components.NetworkingOptionsBuilder
I1212 13:18:55.499691 402540 options_loader.go:130] executing builder *components.KubeDnsOptionsBuilder
I1212 13:18:55.499707 402540 options_loader.go:130] executing builder *components.KubeletOptionsBuilder
I1212 13:18:55.499727 402540 kubelet.go:171] Cloud Provider: aws
I1212 13:18:55.499784 402540 options_loader.go:130] executing builder *components.KubeControllerManagerOptionsBuilder
I1212 13:18:55.499803 402540 kubecontrollermanager.go:74] Kubernetes version "1.15.5" supports AttachDetachReconcileSyncPeriod; will configure
I1212 13:18:55.499863 402540 options_loader.go:130] executing builder *components.KubeSchedulerOptionsBuilder
I1212 13:18:55.499880 402540 options_loader.go:130] executing builder *components.KubeProxyOptionsBuilder
I1212 13:18:55.500654 402540 spec_builder.go:49] options: {
"channel": "stable",
"configBase": "s3://kops-domain-com-state-store/kops.domain.com",
"cloudProvider": "aws",
"kubernetesVersion": "1.15.5",
"subnets": [
{
"name": "us-west-1a",
"cidr": "172.20.32.0/19",
"zone": "us-west-1a",
"type": "Public"
}
],
"masterPublicName": "api.kops.domain.com",
"masterInternalName": "api.internal.kops.domain.com",
"networkCIDR": "172.20.0.0/16",
"topology": {
"masters": "public",
"nodes": "public",
"dns": {
"type": "Public"
}
},
"secretStore": "s3://kops-domain-com-state-store/kops.domain.com/secrets",
"keyStore": "s3://kops-domain-com-state-store/kops.domain.com/pki",
"configStore": "s3://kops-domain-com-state-store/kops.domain.com",
"dnsZone": "Z237FHI0B4E3ZX",
"clusterDNSDomain": "cluster.local",
"serviceClusterIPRange": "100.64.0.0/13",
"nonMasqueradeCIDR": "100.64.0.0/10",
"sshAccess": [
"0.0.0.0/0"
],
"kubernetesApiAccess": [
"0.0.0.0/0"
],
"etcdClusters": [
{
"name": "main",
"provider": "Manager",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "master-us-west-1a"
}
],
"enableEtcdTLS": true,
"enableTLSAuth": true,
"version": "3.3.10",
"backups": {
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"
},
"manager": {},
"memoryRequest": "100Mi",
"cpuRequest": "200m"
},
{
"name": "events",
"provider": "Manager",
"etcdMembers": [
{
"name": "a",
"instanceGroup": "master-us-west-1a"
}
],
"enableEtcdTLS": true,
"enableTLSAuth": true,
"version": "3.3.10",
"backups": {
"backupStore": "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"
},
"manager": {},
"memoryRequest": "100Mi",
"cpuRequest": "100m"
}
],
"docker": {
"ipMasq": false,
"ipTables": false,
"logDriver": "json-file",
"logLevel": "warn",
"logOpt": [
"max-size=10m",
"max-file=5"
],
"storage": "overlay2,overlay,aufs",
"version": "18.06.3"
},
"kubeDNS": {
"cacheMaxSize": 1000,
"cacheMaxConcurrent": 150,
"domain": "cluster.local",
"replicas": 2,
"serverIP": "100.64.0.10",
"memoryRequest": "70Mi",
"cpuRequest": "100m",
"memoryLimit": "170Mi"
},
"kubeAPIServer": {
"image": "k8s.gcr.io/kube-apiserver:v1.15.5",
"logLevel": 2,
"cloudProvider": "aws",
"securePort": 443,
"insecurePort": 8080,
"bindAddress": "0.0.0.0",
"insecureBindAddress": "127.0.0.1",
"enableAdmissionPlugins": [
"NamespaceLifecycle",
"LimitRanger",
"ServiceAccount",
"PersistentVolumeLabel",
"DefaultStorageClass",
"DefaultTolerationSeconds",
"MutatingAdmissionWebhook",
"ValidatingAdmissionWebhook",
"NodeRestriction",
"ResourceQuota"
],
"serviceClusterIPRange": "100.64.0.0/13",
"etcdServers": [
"http://127.0.0.1:4001"
],
"etcdServersOverrides": [
"/events#http://127.0.0.1:4002"
],
"allowPrivileged": true,
"apiServerCount": 1,
"anonymousAuth": false,
"kubeletPreferredAddressTypes": [
"InternalIP",
"Hostname",
"ExternalIP"
],
"storageBackend": "etcd3",
"authorizationMode": "RBAC",
"requestheaderUsernameHeaders": [
"X-Remote-User"
],
"requestheaderGroupHeaders": [
"X-Remote-Group"
],
"requestheaderExtraHeaderPrefixes": [
"X-Remote-Extra-"
],
"requestheaderAllowedNames": [
"aggregator"
]
},
"kubeControllerManager": {
"logLevel": 2,
"image": "k8s.gcr.io/kube-controller-manager:v1.15.5",
"cloudProvider": "aws",
"clusterName": "kops.domain.com",
"clusterCIDR": "100.96.0.0/11",
"allocateNodeCIDRs": true,
"configureCloudRoutes": true,
"leaderElection": {
"leaderElect": true
},
"attachDetachReconcileSyncPeriod": "1m0s",
"useServiceAccountCredentials": true
},
"kubeScheduler": {
"logLevel": 2,
"image": "k8s.gcr.io/kube-scheduler:v1.15.5",
"leaderElection": {
"leaderElect": true
}
},
"kubeProxy": {
"image": "k8s.gcr.io/kube-proxy:v1.15.5",
"cpuRequest": "100m",
"logLevel": 2,
"clusterCIDR": "100.96.0.0/11",
"hostnameOverride": "@aws"
},
"kubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "kubenet",
"cloudProvider": "aws",
"cgroupRoot": "/",
"nonMasqueradeCIDR": "100.64.0.0/10",
"networkPluginMTU": 9001,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"ExperimentalCriticalPodAnnotation": "true"
}
},
"masterKubelet": {
"anonymousAuth": false,
"kubeconfigPath": "/var/lib/kubelet/kubeconfig",
"logLevel": 2,
"podManifestPath": "/etc/kubernetes/manifests",
"hostnameOverride": "@aws",
"podInfraContainerImage": "k8s.gcr.io/pause-amd64:3.0",
"enableDebuggingHandlers": true,
"clusterDomain": "cluster.local",
"clusterDNS": "100.64.0.10",
"networkPluginName": "kubenet",
"cloudProvider": "aws",
"cgroupRoot": "/",
"registerSchedulable": false,
"nonMasqueradeCIDR": "100.64.0.0/10",
"networkPluginMTU": 9001,
"evictionHard": "memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%",
"featureGates": {
"ExperimentalCriticalPodAnnotation": "true"
}
},
"networking": {
"kubenet": {}
},
"api": {
"dns": {}
},
"authorization": {
"rbac": {}
},
"iam": {
"legacy": false,
"allowContainerRegistry": true
}
}
I1212 13:18:55.501242 402540 channel.go:241] version range ">=1.17.0-alpha.1" does not apply to version "1.15.0"; skipping
I1212 13:18:55.501313 402540 channel.go:241] version range ">=1.16.0-alpha.1" does not apply to version "1.15.0"; skipping
I1212 13:18:55.501375 402540 channel.go:152] VersionRecommendationSpec does not specify RecommendedVersion
I1212 13:18:55.501384 402540 channel.go:192] VersionRecommendationSpec does not specify RequiredVersion
I1212 13:18:55.501394 402540 channel.go:220] version range ">=1.17.0" does not apply to version "1.15.5"; skipping
I1212 13:18:55.501402 402540 channel.go:220] version range ">=1.16.0" does not apply to version "1.15.5"; skipping
I1212 13:18:55.501418 402540 channel.go:144] RecommendedVersion="1.15.5", Have="1.15.5". No upgrade needed.
I1212 13:18:55.501435 402540 channel.go:184] RequiredVersion="1.15.0", Have="1.15.5". No upgrade needed.
I1212 13:18:55.501615 402540 context.go:177] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet.sha256
I1212 13:18:55.529854 402540 builder.go:318] Found hash "de590308448a62982aa6209b52da6de69ee4855e449e5508c288c8d12d074ec5" for "https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet"
I1212 13:18:55.529931 402540 builder.go:235] adding file: &{DownloadURL:https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubelet CanonicalURL:<nil> SHAValue:de590308448a62982aa6209b52da6de69ee4855e449e5508c288c8d12d074ec5}
I1212 13:18:55.530008 402540 context.go:177] Performing HTTP request: GET https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl.sha256
I1212 13:18:55.534227 402540 builder.go:318] Found hash "be84cf088241f29eca6221430f8fdb3788bc80eccb79b839d721c0daa6b46244" for "https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl"
I1212 13:18:55.534282 402540 builder.go:235] adding file: &{DownloadURL:https://storage.googleapis.com/kubernetes-release/release/v1.15.5/bin/linux/amd64/kubectl CanonicalURL:<nil> SHAValue:be84cf088241f29eca6221430f8fdb3788bc80eccb79b839d721c0daa6b46244}
I1212 13:18:55.534344 402540 networking.go:175] Adding default CNI asset for k8s >= 1.11: https://storage.googleapis.com/kubernetes-release/network-plugins/cni-plugins-amd64-v0.6.0.tgz
I1212 13:18:55.534366 402540 urls.go:81] Using default base url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/"
I1212 13:18:55.534394 402540 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz.sha256
I1212 13:18:55.869754 402540 builder.go:318] Found hash "71b7bc444ba0a5f7cd7a36e91b594c1c3d13890e160d85e0dfde38c46a24e416" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz"
I1212 13:18:55.869827 402540 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/utils.tar.gz CanonicalURL:<nil> SHAValue:71b7bc444ba0a5f7cd7a36e91b594c1c3d13890e160d85e0dfde38c46a24e416}
I1212 13:18:55.869877 402540 urls.go:73] Using cached kopsBaseUrl url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/"
I1212 13:18:55.869915 402540 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup.sha256
I1212 13:18:55.954782 402540 builder.go:318] Found hash "9604ef18267ad7b5cf4cebbf7ab64423cf5bb0342d169c608ac6376e6af26d81" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup"
I1212 13:18:55.954850 402540 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup CanonicalURL:<nil> SHAValue:9604ef18267ad7b5cf4cebbf7ab64423cf5bb0342d169c608ac6376e6af26d81}
I1212 13:18:55.954902 402540 urls.go:137] Using default nodeup location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/linux/amd64/nodeup"
I1212 13:18:55.954925 402540 urls.go:73] Using cached kopsBaseUrl url: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/"
I1212 13:18:55.954947 402540 context.go:177] Performing HTTP request: GET https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz.sha256
I1212 13:18:56.037523 402540 builder.go:318] Found hash "42a9c4324fe26d63ce11f3dd7836371bc93fa06ca8f479807728f3746e27061b" for "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz"
I1212 13:18:56.037624 402540 builder.go:235] adding file: &{DownloadURL:https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz CanonicalURL:<nil> SHAValue:42a9c4324fe26d63ce11f3dd7836371bc93fa06ca8f479807728f3746e27061b}
I1212 13:18:56.037661 402540 urls.go:178] Using default protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz"
I1212 13:18:56.037722 402540 aws_cloud.go:1229] Querying EC2 for all valid zones in region "us-west-1"
I1212 13:18:56.037873 402540 request_logger.go:45] AWS request: ec2/DescribeAvailabilityZones
I1212 13:18:56.209044 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/ssh/public/admin/"
I1212 13:18:56.303554 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin: [s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2]
I1212 13:18:56.303656 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/ssh/public/admin/4ab21dc359bfd9a9ba93720305e9f4c2"
I1212 13:18:56.392833 402540 route53.go:53] AWS request: route53 ListHostedZones
I1212 13:18:56.481736 402540 dns.go:104] Doing DNS lookup to verify NS records for "kops.domain.com"
I1212 13:18:56.490632 402540 dns.go:121] Found NS records for "kops.domain.com": [ns-947.awsdns-54.net. ns-1265.awsdns-30.org. ns-1946.awsdns-51.co.uk. ns-287.awsdns-35.com.]
I1212 13:18:56.490736 402540 tagbuilder.go:95] tags: [_aws _k8s_1_6]
I1212 13:18:56.491151 402540 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:56.491221 402540 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:56.491304 402540 templates.go:80] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.491376 402540 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.491453 402540 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:56.491820 402540 templates.go:80] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:56.492177 402540 templates.go:88] loading resource "addons/external-dns.addons.k8s.io/README.md"
I1212 13:18:56.492541 402540 templates.go:80] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml"
I1212 13:18:56.492758 402540 templates.go:80] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml"
I1212 13:18:56.493000 402540 templates.go:80] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:56.493429 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.9.yaml"
I1212 13:18:56.493719 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml"
I1212 13:18:56.494239 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.12.yaml"
I1212 13:18:56.495138 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml"
I1212 13:18:56.495722 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.8.yaml"
I1212 13:18:56.495986 402540 templates.go:80] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.11.yaml"
I1212 13:18:56.496181 402540 templates.go:80] loading (templated) resource "addons/networking.romana/k8s-1.12.yaml"
I1212 13:18:56.496703 402540 templates.go:80] loading (templated) resource "addons/networking.romana/k8s-1.7.yaml"
I1212 13:18:56.497057 402540 templates.go:80] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml"
I1212 13:18:56.497536 402540 templates.go:80] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml"
I1212 13:18:56.497858 402540 templates.go:88] loading resource "addons/core.addons.k8s.io/addon.yaml"
I1212 13:18:56.498115 402540 templates.go:80] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.498394 402540 templates.go:80] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.7.yaml"
I1212 13:18:56.498767 402540 templates.go:88] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:56.498849 402540 templates.go:88] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:56.499034 402540 templates.go:88] loading resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.499177 402540 templates.go:88] loading resource "addons/storage-gce.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:56.499422 402540 templates.go:80] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml"
I1212 13:18:56.499676 402540 templates.go:80] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.499793 402540 templates.go:88] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:56.500008 402540 templates.go:88] loading resource "addons/limit-range.addons.k8s.io/addon.yaml"
I1212 13:18:56.500581 402540 templates.go:80] loading (templated) resource "addons/networking.cilium.io/k8s-1.12.yaml"
I1212 13:18:56.501232 402540 templates.go:80] loading (templated) resource "addons/networking.cilium.io/k8s-1.7.yaml"
I1212 13:18:56.501519 402540 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.8.yaml"
I1212 13:18:56.501607 402540 templates.go:80] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml"
I1212 13:18:56.501747 402540 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.12.yaml"
I1212 13:18:56.502047 402540 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml"
I1212 13:18:56.502392 402540 templates.go:80] loading (templated) resource "addons/networking.weave/k8s-1.7.yaml"
I1212 13:18:56.502642 402540 templates.go:88] loading resource "addons/authentication.kope.io/k8s-1.12.yaml"
I1212 13:18:56.502868 402540 templates.go:88] loading resource "addons/authentication.kope.io/k8s-1.8.yaml"
I1212 13:18:56.503243 402540 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml"
I1212 13:18:56.503529 402540 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml"
I1212 13:18:56.503957 402540 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml"
I1212 13:18:56.504345 402540 templates.go:80] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml"
I1212 13:18:56.504679 402540 templates.go:88] loading resource "addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:56.505040 402540 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:56.505298 402540 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:56.506045 402540 templates.go:88] loading resource "addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.506149 402540 templates.go:80] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml"
I1212 13:18:56.506290 402540 templates.go:80] loading (templated) resource "addons/authentication.aws/k8s-1.10.yaml"
I1212 13:18:56.506391 402540 templates.go:80] loading (templated) resource "addons/networking.flannel/pre-k8s-1.6.yaml"
I1212 13:18:56.506529 402540 templates.go:80] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml"
I1212 13:18:56.506626 402540 templates.go:80] loading (templated) resource "addons/networking.flannel/k8s-1.6.yaml"
I1212 13:18:56.506944 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.12.yaml"
I1212 13:18:56.507182 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml"
I1212 13:18:56.507570 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7-v3.yaml"
I1212 13:18:56.507776 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7.yaml"
I1212 13:18:56.507931 402540 templates.go:80] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml"
I1212 13:18:56.507995 402540 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml"
I1212 13:18:56.508044 402540 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.508086 402540 templates.go:80] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:56.508134 402540 templates.go:88] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.508211 402540 templates.go:80] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:56.508319 402540 templates.go:80] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.508564 402540 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.508747 402540 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:56.508878 402540 templates.go:80] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:56.508943 402540 templates.go:88] loading resource "addons/networking.kope.io/k8s-1.12.yaml"
I1212 13:18:56.508995 402540 templates.go:88] loading resource "addons/networking.kope.io/k8s-1.6.yaml"
I1212 13:18:56.509295 402540 templates.go:88] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml"
I1212 13:18:56.509381 402540 tree_walker.go:98] visit "cloudup/resources"
I1212 13:18:56.509404 402540 tree_walker.go:98] visit "cloudup/resources/addons"
I1212 13:18:56.509546 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io"
I1212 13:18:56.509579 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:56.509667 402540 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:56.509680 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:56.509719 402540 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:56.509728 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.509937 402540 loader.go:362] loading resource "addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.509947 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws"
I1212 13:18:56.509963 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws/k8s-1.10.yaml.template"
I1212 13:18:56.510046 402540 loader.go:354] loading (templated) resource "addons/authentication.aws/k8s-1.10.yaml"
I1212 13:18:56.510058 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.aws/k8s-1.12.yaml.template"
I1212 13:18:56.510130 402540 loader.go:354] loading (templated) resource "addons/authentication.aws/k8s-1.12.yaml"
I1212 13:18:56.510140 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel"
I1212 13:18:56.510157 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/k8s-1.12.yaml.template"
I1212 13:18:56.510238 402540 loader.go:354] loading (templated) resource "addons/networking.flannel/k8s-1.12.yaml"
I1212 13:18:56.510251 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/k8s-1.6.yaml.template"
I1212 13:18:56.510637 402540 loader.go:354] loading (templated) resource "addons/networking.flannel/k8s-1.6.yaml"
I1212 13:18:56.510680 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.flannel/pre-k8s-1.6.yaml.template"
I1212 13:18:56.510754 402540 loader.go:354] loading (templated) resource "addons/networking.flannel/pre-k8s-1.6.yaml"
I1212 13:18:56.510769 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org"
I1212 13:18:56.511365 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.12.yaml.template"
I1212 13:18:56.511990 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.12.yaml"
I1212 13:18:56.512403 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.6.yaml.template"
I1212 13:18:56.512738 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.6.yaml"
I1212 13:18:56.512778 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.7-v3.yaml.template"
I1212 13:18:56.513130 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7-v3.yaml"
I1212 13:18:56.513160 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/k8s-1.7.yaml.template"
I1212 13:18:56.513537 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/k8s-1.7.yaml"
I1212 13:18:56.513558 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org/pre-k8s-1.6.yaml.template"
I1212 13:18:56.513797 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org/pre-k8s-1.6.yaml"
I1212 13:18:56.513832 402540 tree_walker.go:98] visit "cloudup/resources/addons/rbac.addons.k8s.io"
I1212 13:18:56.513855 402540 tree_walker.go:98] visit "cloudup/resources/addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:56.514004 402540 loader.go:362] loading resource "addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:56.514022 402540 tree_walker.go:98] visit "cloudup/resources/addons/scheduler.addons.k8s.io"
I1212 13:18:56.514042 402540 tree_walker.go:98] visit "cloudup/resources/addons/scheduler.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.514130 402540 loader.go:362] loading resource "addons/scheduler.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.514141 402540 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io"
I1212 13:18:56.514163 402540 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:56.514297 402540 loader.go:354] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.514315 402540 tree_walker.go:98] visit "cloudup/resources/addons/coredns.addons.k8s.io/k8s-1.6.yaml.template"
I1212 13:18:56.514575 402540 loader.go:354] loading (templated) resource "addons/coredns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:56.514594 402540 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io"
I1212 13:18:56.514629 402540 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:56.514787 402540 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.514859 402540 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml.template"
I1212 13:18:56.515029 402540 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:56.515049 402540 tree_walker.go:98] visit "cloudup/resources/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1212 13:18:56.515265 402540 loader.go:354] loading (templated) resource "addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:56.515284 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io"
I1212 13:18:56.515309 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/k8s-1.12.yaml"
I1212 13:18:56.515385 402540 loader.go:362] loading resource "addons/networking.kope.io/k8s-1.12.yaml"
I1212 13:18:56.515434 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/k8s-1.6.yaml"
I1212 13:18:56.515555 402540 loader.go:362] loading resource "addons/networking.kope.io/k8s-1.6.yaml"
I1212 13:18:56.515571 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kope.io/pre-k8s-1.6.yaml"
I1212 13:18:56.515714 402540 loader.go:362] loading resource "addons/networking.kope.io/pre-k8s-1.6.yaml"
I1212 13:18:56.515726 402540 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io"
I1212 13:18:56.515746 402540 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml.template"
I1212 13:18:56.515817 402540 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:56.515830 402540 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml.template"
I1212 13:18:56.515954 402540 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.10.yaml"
I1212 13:18:56.515970 402540 tree_walker.go:98] visit "cloudup/resources/addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:56.516036 402540 loader.go:354] loading (templated) resource "addons/podsecuritypolicy.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.516053 402540 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io"
I1212 13:18:56.516071 402540 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:56.516458 402540 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.516486 402540 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml.template"
I1212 13:18:56.516650 402540 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:56.516675 402540 tree_walker.go:98] visit "cloudup/resources/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1212 13:18:56.516749 402540 loader.go:354] loading (templated) resource "addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:56.516766 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io"
I1212 13:18:56.516799 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/README.md"
I1212 13:18:56.516894 402540 loader.go:362] loading resource "addons/external-dns.addons.k8s.io/README.md"
I1212 13:18:56.516906 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:56.517192 402540 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.517211 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/k8s-1.6.yaml.template"
I1212 13:18:56.517325 402540 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:56.517338 402540 tree_walker.go:98] visit "cloudup/resources/addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml.template"
I1212 13:18:56.517400 402540 loader.go:354] loading (templated) resource "addons/external-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:56.517423 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter"
I1212 13:18:56.517444 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.12.yaml.template"
I1212 13:18:56.517559 402540 loader.go:354] loading (templated) resource "addons/networking.kuberouter/k8s-1.12.yaml"
I1212 13:18:56.517786 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.kuberouter/k8s-1.6.yaml.template"
I1212 13:18:56.517890 402540 loader.go:354] loading (templated) resource "addons/networking.kuberouter/k8s-1.6.yaml"
I1212 13:18:56.517906 402540 tree_walker.go:98] visit "cloudup/resources/addons/digitalocean-cloud-controller.addons.k8s.io"
I1212 13:18:56.517946 402540 tree_walker.go:98] visit "cloudup/resources/addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml.template"
I1212 13:18:56.518017 402540 loader.go:354] loading (templated) resource "addons/digitalocean-cloud-controller.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:56.518083 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal"
I1212 13:18:56.518116 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.12.yaml.template"
I1212 13:18:56.518394 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.12.yaml"
I1212 13:18:56.518585 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.6.yaml.template"
I1212 13:18:56.518792 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.6.yaml"
I1212 13:18:56.518816 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.8.yaml.template"
I1212 13:18:56.519011 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.8.yaml"
I1212 13:18:56.519033 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/k8s-1.9.yaml.template"
I1212 13:18:56.519435 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/k8s-1.9.yaml"
I1212 13:18:56.519469 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml.template"
I1212 13:18:56.519629 402540 loader.go:354] loading (templated) resource "addons/networking.projectcalico.org.canal/pre-k8s-1.6.yaml"
I1212 13:18:56.519654 402540 tree_walker.go:98] visit "cloudup/resources/addons/openstack.addons.k8s.io"
I1212 13:18:56.519688 402540 tree_walker.go:98] visit "cloudup/resources/addons/openstack.addons.k8s.io/k8s-1.11.yaml.template"
I1212 13:18:56.519818 402540 loader.go:354] loading (templated) resource "addons/openstack.addons.k8s.io/k8s-1.11.yaml"
I1212 13:18:56.519845 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana"
I1212 13:18:56.519863 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana/k8s-1.12.yaml.template"
I1212 13:18:56.520079 402540 loader.go:354] loading (templated) resource "addons/networking.romana/k8s-1.12.yaml"
I1212 13:18:56.520099 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.romana/k8s-1.7.yaml.template"
I1212 13:18:56.520278 402540 loader.go:354] loading (templated) resource "addons/networking.romana/k8s-1.7.yaml"
I1212 13:18:56.520307 402540 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io"
I1212 13:18:56.520327 402540 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml.template"
I1212 13:18:56.520442 402540 loader.go:354] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.9.0.yaml"
I1212 13:18:56.520460 402540 tree_walker.go:98] visit "cloudup/resources/addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml.template"
I1212 13:18:56.520730 402540 loader.go:354] loading (templated) resource "addons/spotinst-kubernetes-cluster-controller.addons.k8s.io/v1.8.0.yaml"
I1212 13:18:56.520755 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io"
I1212 13:18:56.520789 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/addon.yaml"
I1212 13:18:56.520843 402540 loader.go:362] loading resource "addons/core.addons.k8s.io/addon.yaml"
I1212 13:18:56.520855 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:56.520969 402540 loader.go:354] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.520988 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/k8s-1.7.yaml.template"
I1212 13:18:56.521086 402540 loader.go:354] loading (templated) resource "addons/core.addons.k8s.io/k8s-1.7.yaml"
I1212 13:18:56.521101 402540 tree_walker.go:98] visit "cloudup/resources/addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:56.521463 402540 loader.go:362] loading resource "addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:56.521483 402540 tree_walker.go:98] visit "cloudup/resources/addons/kubelet-api.rbac.addons.k8s.io"
I1212 13:18:56.521516 402540 tree_walker.go:98] visit "cloudup/resources/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:56.521573 402540 loader.go:362] loading resource "addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:56.521585 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io"
I1212 13:18:56.521601 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:56.521671 402540 loader.go:362] loading resource "addons/storage-gce.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:56.521683 402540 tree_walker.go:98] visit "cloudup/resources/addons/storage-gce.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.521726 402540 loader.go:362] loading resource "addons/storage-gce.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:56.521752 402540 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io"
I1212 13:18:56.521768 402540 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io/addon.yaml"
I1212 13:18:56.521811 402540 loader.go:362] loading resource "addons/limit-range.addons.k8s.io/addon.yaml"
I1212 13:18:56.521823 402540 tree_walker.go:98] visit "cloudup/resources/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:56.522059 402540 loader.go:362] loading resource "addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:56.522081 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io"
I1212 13:18:56.522098 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io/k8s-1.12.yaml.template"
I1212 13:18:56.522451 402540 loader.go:354] loading (templated) resource "addons/networking.cilium.io/k8s-1.12.yaml"
I1212 13:18:56.522486 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.cilium.io/k8s-1.7.yaml.template"
I1212 13:18:56.523108 402540 loader.go:354] loading (templated) resource "addons/networking.cilium.io/k8s-1.7.yaml"
I1212 13:18:56.523161 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave"
I1212 13:18:56.523214 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/pre-k8s-1.6.yaml.template"
I1212 13:18:56.523344 402540 loader.go:354] loading (templated) resource "addons/networking.weave/pre-k8s-1.6.yaml"
I1212 13:18:56.523379 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.12.yaml.template"
I1212 13:18:56.523640 402540 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.12.yaml"
I1212 13:18:56.523672 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.6.yaml.template"
I1212 13:18:56.523988 402540 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.6.yaml"
I1212 13:18:56.524017 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.7.yaml.template"
I1212 13:18:56.524240 402540 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.7.yaml"
I1212 13:18:56.524271 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.weave/k8s-1.8.yaml.template"
I1212 13:18:56.524447 402540 loader.go:354] loading (templated) resource "addons/networking.weave/k8s-1.8.yaml"
I1212 13:18:56.524471 402540 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io"
I1212 13:18:56.524571 402540 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml.template"
I1212 13:18:56.524882 402540 loader.go:354] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.10.yaml"
I1212 13:18:56.524928 402540 tree_walker.go:98] visit "cloudup/resources/addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml.template"
I1212 13:18:56.525099 402540 loader.go:354] loading (templated) resource "addons/node-authorizer.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:56.525125 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io"
I1212 13:18:56.525155 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.12.yaml"
I1212 13:18:56.525369 402540 loader.go:362] loading resource "addons/authentication.kope.io/k8s-1.12.yaml"
I1212 13:18:56.525393 402540 tree_walker.go:98] visit "cloudup/resources/addons/authentication.kope.io/k8s-1.8.yaml"
I1212 13:18:56.525787 402540 loader.go:362] loading resource "addons/authentication.kope.io/k8s-1.8.yaml"
I1212 13:18:56.525814 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni"
I1212 13:18:56.525848 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml.template"
I1212 13:18:56.525986 402540 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.10.yaml"
I1212 13:18:56.526011 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml.template"
I1212 13:18:56.526149 402540 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.12.yaml"
I1212 13:18:56.526179 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml.template"
I1212 13:18:56.526450 402540 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.7.yaml"
I1212 13:18:56.526481 402540 tree_walker.go:98] visit "cloudup/resources/addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml.template"
I1212 13:18:56.526886 402540 loader.go:354] loading (templated) resource "addons/networking.amazon-vpc-routed-eni/k8s-1.8.yaml"
I1212 13:18:56.527439 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: v1
kind: Namespace
metadata:
name: kube-system
I1212 13:18:56.527469 402540 bootstrapchannelbuilder.go:79] hash 3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90
I1212 13:18:56.537030 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0"
I1212 13:18:56.537891 402540 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000
I1212 13:18:56.537931 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000
I1212 13:18:56.537946 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000
I1212 13:18:56.537957 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000
I1212 13:18:56.537971 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000
I1212 13:18:56.537981 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000
I1212 13:18:56.537990 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.538007 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/kubedns-amd64:1.9"
I1212 13:18:56.538024 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.538035 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 8080.000000
I1212 13:18:56.538043 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.538050 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.538058 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.538099 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10"
I1212 13:18:56.538112 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.538121 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 8080.000000
I1212 13:18:56.538176 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.538189 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.538198 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.538215 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000
I1212 13:18:56.538226 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000
I1212 13:18:56.538237 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.538245 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.538253 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.538261 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.538270 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:56.538281 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000
I1212 13:18:56.538294 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/dnsmasq-metrics-amd64:1.0"
I1212 13:18:56.538314 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/exechealthz-amd64:1.2"
I1212 13:18:56.538328 402540 visitor.go:40] float64 value at spec.template.spec.containers.[3].ports.[0].containerPort: 8080.000000
I1212 13:18:56.540980 402540 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000
I1212 13:18:56.541020 402540 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000
I1212 13:18:56.541559 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns-autoscaler
kubernetes.io/cluster-service: "true"
name: kube-dns-autoscaler
namespace: kube-system
spec:
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly",
"operator":"Exists"}]'
labels:
k8s-app: kube-dns-autoscaler
spec:
containers:
- command:
- /cluster-proportional-autoscaler
- --namespace=kube-system
- --configmap=kube-dns-autoscaler
- --mode=linear
- --target=Deployment/kube-dns
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"min":2}}
- --logtostderr=true
- --v=2
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0
name: autoscaler
resources:
requests:
cpu: 20m
memory: 10Mi
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
name: kube-dns
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns
strategy:
rollingUpdate:
maxSurge: 10%
maxUnavailable: 0
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly",
"operator":"Exists"}]'
labels:
k8s-app: kube-dns
spec:
containers:
- args:
- --domain=cluster.local.
- --dns-port=10053
- --config-map=kube-dns
- --v=2
env:
- name: PROMETHEUS_PORT
value: "10055"
image: k8s.gcr.io/kubedns-amd64:1.9
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthz-kubedns
port: 8080
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: kubedns
ports:
- containerPort: 10053
name: dns-local
protocol: UDP
- containerPort: 10053
name: dns-tcp-local
protocol: TCP
- containerPort: 10055
name: metrics
protocol: TCP
readinessProbe:
httpGet:
path: /readiness
port: 8081
scheme: HTTP
initialDelaySeconds: 3
timeoutSeconds: 5
resources:
limits:
memory: 170Mi
requests:
cpu: 100m
memory: 70Mi
- args:
- --cache-size=1000
- --dns-forward-max=150
- --no-resolv
- --server=127.0.0.1#10053
- --log-facility=-
- --min-port=1024
image: k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthz-dnsmasq
port: 8080
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: dnsmasq
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
resources:
requests:
cpu: 150m
memory: 10Mi
- args:
- --v=2
- --logtostderr
image: k8s.gcr.io/dnsmasq-metrics-amd64:1.0
livenessProbe:
failureThreshold: 5
httpGet:
path: /metrics
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: dnsmasq-metrics
ports:
- containerPort: 10054
name: metrics
protocol: TCP
resources:
requests:
memory: 10Mi
- args:
- --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 >/dev/null
- --url=/healthz-dnsmasq
- --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1:10053 >/dev/null
- --url=/healthz-kubedns
- --port=8080
- --quiet
image: k8s.gcr.io/exechealthz-amd64:1.2
name: healthz
ports:
- containerPort: 8080
protocol: TCP
resources:
limits:
memory: 50Mi
requests:
cpu: 10m
memory: 50Mi
dnsPolicy: Default
---
apiVersion: v1
kind: Service
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: KubeDNS
name: kube-dns
namespace: kube-system
spec:
clusterIP: 100.64.0.10
ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
selector:
k8s-app: kube-dns
I1212 13:18:56.541631 402540 bootstrapchannelbuilder.go:79] hash 895c961cb9365cbedb22edd20a7648182ae7ed3f
I1212 13:18:56.545237 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2"
I1212 13:18:56.546069 402540 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000
I1212 13:18:56.546104 402540 visitor.go:35] string value at spec.template.spec.volumes.[0].configMap.optional: true
I1212 13:18:56.546120 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000
I1212 13:18:56.546131 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000
I1212 13:18:56.546228 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000
I1212 13:18:56.546244 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000
I1212 13:18:56.546254 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000
I1212 13:18:56.546263 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.546279 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10"
I1212 13:18:56.546297 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.546309 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:56.546317 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.546326 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.546335 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.546348 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.546357 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:56.546367 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.546375 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.546383 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.546393 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000
I1212 13:18:56.546403 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000
I1212 13:18:56.546427 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10"
I1212 13:18:56.546457 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:56.546468 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.546478 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.546487 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.546513 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.546527 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000
I1212 13:18:56.546542 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10"
I1212 13:18:56.550840 402540 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000
I1212 13:18:56.550888 402540 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000
I1212 13:18:56.553941 402540 bootstrapchannelbuilder.go:76] Manifest {}
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns-autoscaler
kubernetes.io/cluster-service: "true"
name: kube-dns-autoscaler
namespace: kube-system
spec:
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly",
"operator":"Exists"}]'
labels:
k8s-app: kube-dns-autoscaler
spec:
containers:
- command:
- /cluster-proportional-autoscaler
- --namespace=kube-system
- --configmap=kube-dns-autoscaler
- --target=Deployment/kube-dns
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}
- --logtostderr=true
- --v=2
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2
name: autoscaler
resources:
requests:
cpu: 20m
memory: 10Mi
serviceAccountName: kube-dns-autoscaler
tolerations:
- key: CriticalAddonsOnly
operator: Exists
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
name: kube-dns
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns
strategy:
rollingUpdate:
maxSurge: 10%
maxUnavailable: 0
template:
metadata:
annotations:
prometheus.io/port: "10055"
prometheus.io/scrape: "true"
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly",
"operator":"Exists"}]'
labels:
k8s-app: kube-dns
spec:
containers:
- args:
- --config-dir=/kube-dns-config
- --dns-port=10053
- --domain=cluster.local.
- --v=2
env:
- name: PROMETHEUS_PORT
value: "10055"
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthcheck/kubedns
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: kubedns
ports:
- containerPort: 10053
name: dns-local
protocol: UDP
- containerPort: 10053
name: dns-tcp-local
protocol: TCP
- containerPort: 10055
name: metrics
protocol: TCP
readinessProbe:
httpGet:
path: /readiness
port: 8081
scheme: HTTP
initialDelaySeconds: 3
timeoutSeconds: 5
resources:
limits:
memory: 170Mi
requests:
cpu: 100m
memory: 70Mi
volumeMounts:
- mountPath: /kube-dns-config
name: kube-dns-config
- args:
- -v=2
- -logtostderr
- -configDir=/etc/k8s/dns/dnsmasq-nanny
- -restartDnsmasq=true
- --
- -k
- --cache-size=1000
- --dns-forward-max=150
- --no-negcache
- --log-facility=-
- --server=/cluster.local/127.0.0.1#10053
- --server=/in-addr.arpa/127.0.0.1#10053
- --server=/in6.arpa/127.0.0.1#10053
- --min-port=1024
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthcheck/dnsmasq
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: dnsmasq
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
resources:
requests:
cpu: 150m
memory: 20Mi
volumeMounts:
- mountPath: /etc/k8s/dns/dnsmasq-nanny
name: kube-dns-config
- args:
- --v=2
- --logtostderr
- --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A
- --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10
livenessProbe:
failureThreshold: 5
httpGet:
path: /metrics
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: sidecar
ports:
- containerPort: 10054
name: metrics
protocol: TCP
resources:
requests:
cpu: 10m
memory: 20Mi
dnsPolicy: Default
serviceAccountName: kube-dns
volumes:
- configMap:
name: kube-dns
optional: true
name: kube-dns-config
---
apiVersion: v1
kind: Service
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: KubeDNS
name: kube-dns
namespace: kube-system
spec:
clusterIP: 100.64.0.10
ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
selector:
k8s-app: kube-dns
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
- apiGroups:
- ""
resources:
- replicationcontrollers/scale
verbs:
- get
- update
- apiGroups:
- extensions
resources:
- deployments/scale
- replicasets/scale
verbs:
- get
- update
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- create
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kube-dns-autoscaler
subjects:
- kind: ServiceAccount
name: kube-dns-autoscaler
namespace: kube-system
I1212 13:18:56.554053 402540 bootstrapchannelbuilder.go:79] hash 191685ca6fe009302e55512b0eefc5a676433f10
I1212 13:18:56.563594 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0"
I1212 13:18:56.564907 402540 visitor.go:40] float64 value at spec.strategy.rollingUpdate.maxUnavailable: 0.000000
I1212 13:18:56.564955 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.564968 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:56.564979 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.564988 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.565007 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.565019 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.httpGet.port: 8081.000000
I1212 13:18:56.565029 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.initialDelaySeconds: 3.000000
I1212 13:18:56.565038 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].readinessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.565112 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13"
I1212 13:18:56.565138 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[0].containerPort: 10053.000000
I1212 13:18:56.565160 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[1].containerPort: 10053.000000
I1212 13:18:56.565170 402540 visitor.go:40] float64 value at spec.template.spec.containers.[0].ports.[2].containerPort: 10055.000000
I1212 13:18:56.565206 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[0].containerPort: 53.000000
I1212 13:18:56.565234 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].ports.[1].containerPort: 53.000000
I1212 13:18:56.565272 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13"
I1212 13:18:56.565294 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.565303 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.565312 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.565321 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.565331 402540 visitor.go:40] float64 value at spec.template.spec.containers.[1].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:56.565354 402540 images.go:59] Consider image for re-mapping: "k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13"
I1212 13:18:56.565368 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.initialDelaySeconds: 60.000000
I1212 13:18:56.565377 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.successThreshold: 1.000000
I1212 13:18:56.565385 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.timeoutSeconds: 5.000000
I1212 13:18:56.565402 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.failureThreshold: 5.000000
I1212 13:18:56.565411 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].livenessProbe.httpGet.port: 10054.000000
I1212 13:18:56.565423 402540 visitor.go:40] float64 value at spec.template.spec.containers.[2].ports.[0].containerPort: 10054.000000
I1212 13:18:56.565449 402540 visitor.go:35] string value at spec.template.spec.volumes.[0].configMap.optional: true
I1212 13:18:56.565480 402540 visitor.go:40] float64 value at spec.template.spec.affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution.[0].weight: 1.000000
I1212 13:18:56.573455 402540 visitor.go:40] float64 value at spec.ports.[0].port: 53.000000
I1212 13:18:56.573542 402540 visitor.go:40] float64 value at spec.ports.[1].port: 53.000000
I1212 13:18:56.576064 402540 visitor.go:40] float64 value at spec.minAvailable: 1.000000
I1212 13:18:56.576413 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: apps/v1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns-autoscaler
kubernetes.io/cluster-service: "true"
name: kube-dns-autoscaler
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns-autoscaler
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
labels:
k8s-app: kube-dns-autoscaler
spec:
containers:
- command:
- /cluster-proportional-autoscaler
- --namespace=kube-system
- --configmap=kube-dns-autoscaler
- --target=Deployment/kube-dns
- --default-params={"linear":{"coresPerReplica":256,"nodesPerReplica":16,"preventSinglePointFailure":true}}
- --logtostderr=true
- --v=2
image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0
name: autoscaler
resources:
requests:
cpu: 20m
memory: 10Mi
serviceAccountName: kube-dns-autoscaler
tolerations:
- key: CriticalAddonsOnly
operator: Exists
---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
name: kube-dns
namespace: kube-system
spec:
selector:
matchLabels:
k8s-app: kube-dns
strategy:
rollingUpdate:
maxSurge: 10%
maxUnavailable: 0
template:
metadata:
annotations:
prometheus.io/port: "10055"
prometheus.io/scrape: "true"
scheduler.alpha.kubernetes.io/critical-pod: ""
labels:
k8s-app: kube-dns
spec:
affinity:
podAntiAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: k8s-app
operator: In
values:
- kube-dns
topologyKey: kubernetes.io/hostname
weight: 1
containers:
- args:
- --config-dir=/kube-dns-config
- --dns-port=10053
- --domain=cluster.local.
- --v=2
env:
- name: PROMETHEUS_PORT
value: "10055"
image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthcheck/kubedns
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: kubedns
ports:
- containerPort: 10053
name: dns-local
protocol: UDP
- containerPort: 10053
name: dns-tcp-local
protocol: TCP
- containerPort: 10055
name: metrics
protocol: TCP
readinessProbe:
httpGet:
path: /readiness
port: 8081
scheme: HTTP
initialDelaySeconds: 3
timeoutSeconds: 5
resources:
limits:
memory: 170Mi
requests:
cpu: 100m
memory: 70Mi
volumeMounts:
- mountPath: /kube-dns-config
name: kube-dns-config
- args:
- -v=2
- -logtostderr
- -configDir=/etc/k8s/dns/dnsmasq-nanny
- -restartDnsmasq=true
- --
- -k
- --cache-size=1000
- --dns-forward-max=150
- --no-negcache
- --log-facility=-
- --server=/cluster.local/127.0.0.1#10053
- --server=/in-addr.arpa/127.0.0.1#10053
- --server=/in6.arpa/127.0.0.1#10053
- --min-port=1024
image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13
livenessProbe:
failureThreshold: 5
httpGet:
path: /healthcheck/dnsmasq
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: dnsmasq
ports:
- containerPort: 53
name: dns
protocol: UDP
- containerPort: 53
name: dns-tcp
protocol: TCP
resources:
requests:
cpu: 150m
memory: 20Mi
volumeMounts:
- mountPath: /etc/k8s/dns/dnsmasq-nanny
name: kube-dns-config
- args:
- --v=2
- --logtostderr
- --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A
- --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A
image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13
livenessProbe:
failureThreshold: 5
httpGet:
path: /metrics
port: 10054
scheme: HTTP
initialDelaySeconds: 60
successThreshold: 1
timeoutSeconds: 5
name: sidecar
ports:
- containerPort: 10054
name: metrics
protocol: TCP
resources:
requests:
cpu: 10m
memory: 20Mi
dnsPolicy: Default
serviceAccountName: kube-dns
volumes:
- configMap:
name: kube-dns
optional: true
name: kube-dns-config
---
apiVersion: v1
kind: Service
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
k8s-app: kube-dns
kubernetes.io/cluster-service: "true"
kubernetes.io/name: KubeDNS
name: kube-dns
namespace: kube-system
spec:
clusterIP: 100.64.0.10
ports:
- name: dns
port: 53
protocol: UDP
- name: dns-tcp
port: 53
protocol: TCP
selector:
k8s-app: kube-dns
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- replicationcontrollers/scale
verbs:
- get
- update
- apiGroups:
- extensions
- apps
resources:
- deployments/scale
- replicasets/scale
verbs:
- get
- update
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- create
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: kube-dns.addons.k8s.io
name: kube-dns-autoscaler
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kube-dns-autoscaler
subjects:
- kind: ServiceAccount
name: kube-dns-autoscaler
namespace: kube-system
---
apiVersion: policy/v1beta1
kind: PodDisruptionBudget
metadata:
name: kube-dns
namespace: kube-system
spec:
minAvailable: 1
selector:
matchLabels:
k8s-app: kube-dns
I1212 13:18:56.576569 402540 bootstrapchannelbuilder.go:79] hash b4dff071aa340fd71650c96f213fdf4b4f799c71
I1212 13:18:56.577539 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
addonmanager.kubernetes.io/mode: Reconcile
k8s-addon: rbac.addons.k8s.io
kubernetes.io/cluster-service: "true"
name: kubelet-cluster-admin
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:node
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: kubelet
I1212 13:18:56.577629 402540 bootstrapchannelbuilder.go:79] hash 5d53ce7b920cd1e8d65d2306d80a041420711914
I1212 13:18:56.578452 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: kops:system:kubelet-api-admin
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:kubelet-api-admin
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: kubelet-api
I1212 13:18:56.578483 402540 bootstrapchannelbuilder.go:79] hash e1508d77cb4e527d7a2939babe36dc350dd83745
I1212 13:18:56.578947 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: v1
kind: LimitRange
metadata:
name: limits
namespace: default
spec:
limits:
- defaultRequest:
cpu: 100m
type: Container
I1212 13:18:56.578967 402540 bootstrapchannelbuilder.go:79] hash 2ea50e23f1a5aa41df3724630ac25173738cc90c
I1212 13:18:56.581922 402540 template_functions.go:190] watch-ingress=false set on dns-controller
I1212 13:18:56.582258 402540 visitor.go:40] float64 value at spec.replicas: 1.000000
I1212 13:18:56.582313 402540 visitor.go:35] string value at spec.template.spec.hostNetwork: true
I1212 13:18:56.582327 402540 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0"
I1212 13:18:56.582798 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
name: dns-controller
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
k8s-app: dns-controller
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key": "dedicated", "value":
"master"}]'
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
spec:
containers:
- command:
- /usr/bin/dns-controller
- --watch-ingress=false
- --dns=aws-route53
- --zone=*/Z237FHI0B4E3ZX
- --zone=*/*
- -v=2
image: kope/dns-controller:1.15.0
name: dns-controller
resources:
requests:
cpu: 50m
memory: 50Mi
dnsPolicy: Default
hostNetwork: true
nodeSelector:
kubernetes.io/role: master
I1212 13:18:56.582838 402540 bootstrapchannelbuilder.go:79] hash 41097765274e5bd95292ae88bd6e26268c5e8c59
I1212 13:18:56.583035 402540 template_functions.go:190] watch-ingress=false set on dns-controller
I1212 13:18:56.583730 402540 visitor.go:40] float64 value at spec.replicas: 1.000000
I1212 13:18:56.583761 402540 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0"
I1212 13:18:56.583777 402540 visitor.go:35] string value at spec.template.spec.hostNetwork: true
I1212 13:18:56.584893 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
name: dns-controller
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
k8s-app: dns-controller
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
scheduler.alpha.kubernetes.io/tolerations: '[{"key": "dedicated", "value":
"master"}]'
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
spec:
containers:
- command:
- /usr/bin/dns-controller
- --watch-ingress=false
- --dns=aws-route53
- --zone=*/Z237FHI0B4E3ZX
- --zone=*/*
- -v=2
image: kope/dns-controller:1.15.0
name: dns-controller
resources:
requests:
cpu: 50m
memory: 50Mi
dnsPolicy: Default
hostNetwork: true
nodeSelector:
node-role.kubernetes.io/master: ""
serviceAccount: dns-controller
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: dns-controller
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
rules:
- apiGroups:
- ""
resources:
- endpoints
- services
- pods
- ingress
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kops:dns-controller
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: system:serviceaccount:kube-system:dns-controller
I1212 13:18:56.584922 402540 bootstrapchannelbuilder.go:79] hash 079663bb21f764bd016174115a00ad1e4d92e07d
I1212 13:18:56.585057 402540 template_functions.go:190] watch-ingress=false set on dns-controller
I1212 13:18:56.585862 402540 images.go:59] Consider image for re-mapping: "kope/dns-controller:1.15.0"
I1212 13:18:56.585889 402540 visitor.go:35] string value at spec.template.spec.hostNetwork: true
I1212 13:18:56.585895 402540 visitor.go:40] float64 value at spec.replicas: 1.000000
I1212 13:18:56.586987 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: apps/v1
kind: Deployment
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
name: dns-controller
namespace: kube-system
spec:
replicas: 1
selector:
matchLabels:
k8s-app: dns-controller
template:
metadata:
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ""
labels:
k8s-addon: dns-controller.addons.k8s.io
k8s-app: dns-controller
version: v1.15.0
spec:
containers:
- command:
- /usr/bin/dns-controller
- --watch-ingress=false
- --dns=aws-route53
- --zone=*/Z237FHI0B4E3ZX
- --zone=*/*
- -v=2
image: kope/dns-controller:1.15.0
name: dns-controller
resources:
requests:
cpu: 50m
memory: 50Mi
dnsPolicy: Default
hostNetwork: true
nodeSelector:
node-role.kubernetes.io/master: ""
serviceAccount: dns-controller
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: dns-controller
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
rules:
- apiGroups:
- ""
resources:
- endpoints
- services
- pods
- ingress
- nodes
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: dns-controller.addons.k8s.io
name: kops:dns-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kops:dns-controller
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: User
name: system:serviceaccount:kube-system:dns-controller
I1212 13:18:56.587045 402540 bootstrapchannelbuilder.go:79] hash 767f8242c35ba32b19b13234cedf26ac5f554dab
I1212 13:18:56.588286 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: default
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.beta.kubernetes.io/is-default-class: "true"
labels:
k8s-addon: storage-aws.addons.k8s.io
name: gp2
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: system:aws-cloud-provider
rules:
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
- list
- patch
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- update
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: system:aws-cloud-provider
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:aws-cloud-provider
subjects:
- kind: ServiceAccount
name: aws-cloud-provider
namespace: kube-system
I1212 13:18:56.588308 402540 bootstrapchannelbuilder.go:79] hash 23459f7be52d7c818dc060a8bcf5e3565bd87a7b
I1212 13:18:56.588840 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: default
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
annotations:
storageclass.beta.kubernetes.io/is-default-class: "true"
labels:
k8s-addon: storage-aws.addons.k8s.io
name: gp2
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
I1212 13:18:56.588861 402540 bootstrapchannelbuilder.go:79] hash 62705a596142e6cc283280e8aa973e51536994c5
I1212 13:18:56.589218 402540 bootstrapchannelbuilder.go:76] Manifest apiVersion: storage.k8s.io/v1beta1
kind: StorageClass
metadata:
labels:
k8s-addon: storage-aws.addons.k8s.io
name: default
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
---
apiVersion: storage.k8s.io/v1beta1
kind: StorageClass
metadata:
annotations:
storageclass.beta.kubernetes.io/is-default-class: "true"
labels:
k8s-addon: storage-aws.addons.k8s.io
name: gp2
parameters:
type: gp2
provisioner: kubernetes.io/aws-ebs
I1212 13:18:56.589233 402540 bootstrapchannelbuilder.go:79] hash 7de4b2eb0521d669172038759c521418711d8266
I1212 13:18:56.590610 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590636 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590654 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590660 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590666 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590671 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590678 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590684 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590690 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590695 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590701 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590712 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.590720 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590736 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590743 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590749 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590756 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590762 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590767 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590772 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590777 402540 task.go:103] testing task "Secret"
I1212 13:18:56.590793 402540 task.go:103] testing task "MirrorSecrets"
I1212 13:18:56.590802 402540 task.go:103] testing task "MirrorKeystore"
I1212 13:18:56.598236 402540 build_flags.go:50] ignoring non-field:
I1212 13:18:56.598282 402540 build_flags.go:50] ignoring non-field:
I1212 13:18:56.598341 402540 proxy.go:30] proxies is == nil, returning empty list
I1212 13:18:56.607582 402540 task.go:103] testing task "ManagedFile"
I1212 13:18:56.607734 402540 task.go:103] testing task "ManagedFile"
I1212 13:18:56.607751 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.607759 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.607766 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.608529 402540 build_flags.go:50] ignoring non-field:
I1212 13:18:56.608554 402540 build_flags.go:50] ignoring non-field:
I1212 13:18:56.608638 402540 proxy.go:30] proxies is == nil, returning empty list
I1212 13:18:56.610223 402540 task.go:103] testing task "ManagedFile"
I1212 13:18:56.610253 402540 task.go:103] testing task "ManagedFile"
I1212 13:18:56.610262 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.610269 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.610282 402540 task.go:103] testing task "Keypair"
I1212 13:18:56.610297 402540 task.go:75] EnsureTask ignoring identical
I1212 13:18:56.610316 402540 task.go:103] testing task "EBSVolume"
I1212 13:18:56.610343 402540 task.go:103] testing task "EBSVolume"
I1212 13:18:56.610363 402540 task.go:103] testing task "DNSZone"
I1212 13:18:56.610403 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.610433 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.610460 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.610474 402540 task.go:103] testing task "SecurityGroup"
I1212 13:18:56.610519 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.610537 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.610571 402540 task.go:103] testing task "SecurityGroup"
I1212 13:18:56.610586 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.610609 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.610620 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.611760 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.611783 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.611791 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.611798 402540 task.go:103] testing task "SecurityGroupRule"
I1212 13:18:56.611854 402540 task.go:103] testing task "SSHKey"
I1212 13:18:56.611873 402540 task.go:103] testing task "VPC"
I1212 13:18:56.611883 402540 task.go:103] testing task "DHCPOptions"
I1212 13:18:56.611905 402540 task.go:103] testing task "VPCDHCPOptionsAssociation"
I1212 13:18:56.611923 402540 task.go:103] testing task "InternetGateway"
I1212 13:18:56.611941 402540 task.go:103] testing task "RouteTable"
I1212 13:18:56.611996 402540 task.go:103] testing task "Route"
I1212 13:18:56.612039 402540 network.go:202] applying subnet tags
I1212 13:18:56.612053 402540 task.go:103] testing task "Subnet"
I1212 13:18:56.612063 402540 task.go:103] testing task "RouteTableAssociation"
I1212 13:18:56.616949 402540 task.go:103] testing task "IAMRole"
I1212 13:18:56.617005 402540 task.go:103] testing task "IAMRolePolicy"
I1212 13:18:56.617018 402540 task.go:103] testing task "IAMInstanceProfile"
I1212 13:18:56.617033 402540 task.go:103] testing task "IAMInstanceProfileRole"
I1212 13:18:56.617042 402540 task.go:103] testing task "IAMRolePolicy"
I1212 13:18:56.617083 402540 task.go:103] testing task "IAMRole"
I1212 13:18:56.617096 402540 task.go:103] testing task "IAMRolePolicy"
I1212 13:18:56.617103 402540 task.go:103] testing task "IAMInstanceProfile"
I1212 13:18:56.617109 402540 task.go:103] testing task "IAMInstanceProfileRole"
I1212 13:18:56.617116 402540 task.go:103] testing task "IAMRolePolicy"
I1212 13:18:56.617332 402540 task.go:103] testing task "LaunchConfiguration"
I1212 13:18:56.617359 402540 task.go:103] testing task "AutoscalingGroup"
I1212 13:18:56.617487 402540 task.go:103] testing task "LaunchConfiguration"
I1212 13:18:56.617531 402540 task.go:103] testing task "AutoscalingGroup"
I1212 13:18:56.621755 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/cluster.spec"
I1212 13:18:56.621785 402540 s3context.go:238] Checking default bucket encryption for "kops-domain-com-state-store"
I1212 13:18:56.621793 402540 s3context.go:243] Calling S3 GetBucketEncryption Bucket="kops-domain-com-state-store"
I1212 13:18:56.705802 402540 s3context.go:263] bucket "kops-domain-com-state-store" has default encryption set to true
I1212 13:18:56.705938 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:56.705962 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/cluster.spec" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:56.823898 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a"
I1212 13:18:56.915089 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a"
I1212 13:18:57.005633 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a"
I1212 13:18:57.005695 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:57.005703 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/master-us-west-1a" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:57.144410 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/master-us-west-1a"
I1212 13:18:57.144455 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:57.144462 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/master-us-west-1a" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:57.247333 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes"
I1212 13:18:57.341430 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes"
I1212 13:18:57.436044 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes"
I1212 13:18:57.436130 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:57.436188 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/nodes" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:57.625832 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/instancegroup/nodes"
I1212 13:18:57.625946 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:57.625969 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/instancegroup/nodes" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:57.756938 402540 topological_sort.go:64] Dependencies:
I1212 13:18:57.756961 402540 topological_sort.go:66] Keypair/apiserver-proxy-client: [Keypair/ca]
I1212 13:18:57.756974 402540 topological_sort.go:66] SecurityGroupRule/https-external-to-master-0.0.0.0/0: [SecurityGroup/masters.kops.domain.com]
I1212 13:18:57.756984 402540 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0: []
I1212 13:18:57.756992 402540 topological_sort.go:66] LaunchConfiguration/nodes.kops.domain.com: [IAMInstanceProfile/nodes.kops.domain.com SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 SecurityGroup/nodes.kops.domain.com]
I1212 13:18:57.757022 402540 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12: []
I1212 13:18:57.757033 402540 topological_sort.go:66] SecurityGroupRule/ssh-external-to-master-0.0.0.0/0: [SecurityGroup/masters.kops.domain.com]
I1212 13:18:57.757041 402540 topological_sort.go:66] AutoscalingGroup/nodes.kops.domain.com: [LaunchConfiguration/nodes.kops.domain.com Subnet/us-west-1a.kops.domain.com]
I1212 13:18:57.757049 402540 topological_sort.go:66] EBSVolume/a.etcd-main.kops.domain.com: []
I1212 13:18:57.757058 402540 topological_sort.go:66] Keypair/kubecfg: [Keypair/ca]
I1212 13:18:57.757066 402540 topological_sort.go:66] Keypair/etcd-peers-ca-events: []
I1212 13:18:57.757074 402540 topological_sort.go:66] Keypair/apiserver-aggregator: [Keypair/apiserver-aggregator-ca]
I1212 13:18:57.757101 402540 topological_sort.go:66] SecurityGroup/nodes.kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:57.757108 402540 topological_sort.go:66] VPC/kops.domain.com: []
I1212 13:18:57.757112 402540 topological_sort.go:66] Keypair/kubelet-api: [Keypair/ca]
I1212 13:18:57.757117 402540 topological_sort.go:66] kops.domain.com-addons-limit-range.addons.k8s.io: []
I1212 13:18:57.757122 402540 topological_sort.go:66] IAMRole/masters.kops.domain.com: []
I1212 13:18:57.757127 402540 topological_sort.go:66] kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8: []
I1212 13:18:57.757131 402540 topological_sort.go:66] Keypair/etcd-manager-ca-main: []
I1212 13:18:57.757142 402540 topological_sort.go:66] ManagedFile/manifests-etcdmanager-main: []
I1212 13:18:57.757147 402540 topological_sort.go:66] kops.domain.com-addons-bootstrap: []
I1212 13:18:57.757151 402540 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6: []
I1212 13:18:57.757156 402540 topological_sort.go:66] Keypair/etcd-peers-ca-main: []
I1212 13:18:57.757160 402540 topological_sort.go:66] SecurityGroupRule/master-egress: [SecurityGroup/masters.kops.domain.com]
I1212 13:18:57.757179 402540 topological_sort.go:66] kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9: []
I1212 13:18:57.757185 402540 topological_sort.go:66] DNSZone/Z237FHI0B4E3ZX: []
I1212 13:18:57.757189 402540 topological_sort.go:66] Secret/kubelet: []
I1212 13:18:57.757194 402540 topological_sort.go:66] Keypair/master: [Keypair/ca]
I1212 13:18:57.757199 402540 topological_sort.go:66] InternetGateway/kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:57.757215 402540 topological_sort.go:66] MirrorKeystore/mirror-keystore: [Secret/system:scheduler Secret/system:monitoring Secret/system:controller_manager Secret/kubelet Secret/kube Secret/system:dns Secret/system:logging Secret/admin Secret/kube-proxy]
I1212 13:18:57.757223 402540 topological_sort.go:66] Secret/system:scheduler: []
I1212 13:18:57.757229 402540 topological_sort.go:66] SecurityGroupRule/node-to-master-udp-1-65535: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:57.757235 402540 topological_sort.go:66] Secret/system:dns: []
I1212 13:18:57.757239 402540 topological_sort.go:66] IAMInstanceProfileRole/nodes.kops.domain.com: [IAMInstanceProfile/nodes.kops.domain.com IAMRole/nodes.kops.domain.com]
I1212 13:18:57.757258 402540 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6: []
I1212 13:18:57.757264 402540 topological_sort.go:66] Secret/system:logging: []
I1212 13:18:57.757269 402540 topological_sort.go:66] IAMRolePolicy/additional.masters.kops.domain.com: [IAMRole/masters.kops.domain.com]
I1212 13:18:57.757274 402540 topological_sort.go:66] Keypair/etcd-manager-ca-events: []
I1212 13:18:57.757278 402540 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-2382-4000: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:57.757283 402540 topological_sort.go:66] DHCPOptions/kops.domain.com: []
I1212 13:18:57.757288 402540 topological_sort.go:66] VPCDHCPOptionsAssociation/kops.domain.com: [VPC/kops.domain.com DHCPOptions/kops.domain.com]
I1212 13:18:57.757293 402540 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-4003-65535: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:57.757298 402540 topological_sort.go:66] ManagedFile/etcd-cluster-spec-events: []
I1212 13:18:57.757302 402540 topological_sort.go:66] ManagedFile/manifests-etcdmanager-events: []
I1212 13:18:57.757307 402540 topological_sort.go:66] SecurityGroupRule/ssh-external-to-node-0.0.0.0/0: [SecurityGroup/nodes.kops.domain.com]
I1212 13:18:57.757312 402540 topological_sort.go:66] RouteTableAssociation/us-west-1a.kops.domain.com: [RouteTable/kops.domain.com Subnet/us-west-1a.kops.domain.com]
I1212 13:18:57.757317 402540 topological_sort.go:66] kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12: []
I1212 13:18:57.757321 402540 topological_sort.go:66] IAMInstanceProfile/masters.kops.domain.com: []
I1212 13:18:57.757339 402540 topological_sort.go:66] Keypair/kops: [Keypair/ca]
I1212 13:18:57.757345 402540 topological_sort.go:66] Secret/system:controller_manager: []
I1212 13:18:57.757349 402540 topological_sort.go:66] kops.domain.com-addons-core.addons.k8s.io: []
I1212 13:18:57.757354 402540 topological_sort.go:66] IAMRole/nodes.kops.domain.com: []
I1212 13:18:57.757358 402540 topological_sort.go:66] SecurityGroup/masters.kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:57.757363 402540 topological_sort.go:66] SecurityGroupRule/node-to-master-tcp-1-2379: [SecurityGroup/masters.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:57.757368 402540 topological_sort.go:66] SecurityGroupRule/all-master-to-node: [SecurityGroup/nodes.kops.domain.com SecurityGroup/masters.kops.domain.com]
I1212 13:18:57.757372 402540 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0: []
I1212 13:18:57.757377 402540 topological_sort.go:66] Subnet/us-west-1a.kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:57.757382 402540 topological_sort.go:66] IAMRolePolicy/additional.nodes.kops.domain.com: [IAMRole/nodes.kops.domain.com]
I1212 13:18:57.757387 402540 topological_sort.go:66] RouteTable/kops.domain.com: [VPC/kops.domain.com]
I1212 13:18:57.757396 402540 topological_sort.go:66] AutoscalingGroup/master-us-west-1a.masters.kops.domain.com: [LaunchConfiguration/master-us-west-1a.masters.kops.domain.com Subnet/us-west-1a.kops.domain.com]
I1212 13:18:57.757401 402540 topological_sort.go:66] Keypair/kube-controller-manager: [Keypair/ca]
I1212 13:18:57.757422 402540 topological_sort.go:66] Route/0.0.0.0/0: [RouteTable/kops.domain.com InternetGateway/kops.domain.com]
I1212 13:18:57.757428 402540 topological_sort.go:66] SecurityGroupRule/node-egress: [SecurityGroup/nodes.kops.domain.com]
I1212 13:18:57.757433 402540 topological_sort.go:66] Keypair/kubelet: [Keypair/ca]
I1212 13:18:57.757438 402540 topological_sort.go:66] Keypair/kube-proxy: [Keypair/ca]
I1212 13:18:57.757446 402540 topological_sort.go:66] MirrorSecrets/mirror-secrets: [Secret/system:scheduler Secret/system:monitoring Secret/system:controller_manager Secret/kubelet Secret/system:dns Secret/kube Secret/system:logging Secret/admin Secret/kube-proxy]
I1212 13:18:57.757453 402540 topological_sort.go:66] SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2: []
I1212 13:18:57.757459 402540 topological_sort.go:66] IAMInstanceProfileRole/masters.kops.domain.com: [IAMInstanceProfile/masters.kops.domain.com IAMRole/masters.kops.domain.com]
I1212 13:18:57.757464 402540 topological_sort.go:66] EBSVolume/a.etcd-events.kops.domain.com: []
I1212 13:18:57.757468 402540 topological_sort.go:66] SecurityGroupRule/all-master-to-master: [SecurityGroup/masters.kops.domain.com SecurityGroup/masters.kops.domain.com]
I1212 13:18:57.757473 402540 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6: []
I1212 13:18:57.757478 402540 topological_sort.go:66] kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6: []
I1212 13:18:57.757482 402540 topological_sort.go:66] Keypair/apiserver-aggregator-ca: []
I1212 13:18:57.757510 402540 topological_sort.go:66] LaunchConfiguration/master-us-west-1a.masters.kops.domain.com: [IAMInstanceProfile/masters.kops.domain.com SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2 SecurityGroup/masters.kops.domain.com]
I1212 13:18:57.757520 402540 topological_sort.go:66] Keypair/etcd-clients-ca: []
I1212 13:18:57.757526 402540 topological_sort.go:66] IAMRolePolicy/nodes.kops.domain.com: [IAMRole/nodes.kops.domain.com DNSZone/Z237FHI0B4E3ZX]
I1212 13:18:57.757531 402540 topological_sort.go:66] kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0: []
I1212 13:18:57.757536 402540 topological_sort.go:66] Secret/kube: []
I1212 13:18:57.757540 402540 topological_sort.go:66] IAMInstanceProfile/nodes.kops.domain.com: []
I1212 13:18:57.757545 402540 topological_sort.go:66] Secret/admin: []
I1212 13:18:57.757549 402540 topological_sort.go:66] Keypair/ca: []
I1212 13:18:57.757553 402540 topological_sort.go:66] Secret/system:monitoring: []
I1212 13:18:57.757558 402540 topological_sort.go:66] ManagedFile/etcd-cluster-spec-main: []
I1212 13:18:57.757562 402540 topological_sort.go:66] SecurityGroupRule/all-node-to-node: [SecurityGroup/nodes.kops.domain.com SecurityGroup/nodes.kops.domain.com]
I1212 13:18:57.757567 402540 topological_sort.go:66] Secret/kube-proxy: []
I1212 13:18:57.757572 402540 topological_sort.go:66] IAMRolePolicy/masters.kops.domain.com: [IAMRole/masters.kops.domain.com DNSZone/Z237FHI0B4E3ZX]
I1212 13:18:57.757590 402540 topological_sort.go:66] Keypair/kube-scheduler: [Keypair/ca]
I1212 13:18:57.757687 402540 executor.go:103] Tasks: 0 done / 86 total; 44 can run
I1212 13:18:57.757778 402540 executor.go:178] Executing task "Keypair/ca": *fitasks.Keypair {"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"}
I1212 13:18:57.758018 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:18:57.758369 402540 executor.go:178] Executing task "Secret/kubelet": *fitasks.Secret {"Name":"kubelet","Lifecycle":"Sync"}
I1212 13:18:57.758534 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet"
I1212 13:18:57.758985 402540 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\": \"dedicated\", \"value\":\n \"master\"}]'\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n kubernetes.io/role: master"}}
I1212 13:18:57.759222 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:57.759432 402540 executor.go:178] Executing task "kops.domain.com-addons-core.addons.k8s.io": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-core.addons.k8s.io","Lifecycle":"Sync","Location":"addons/core.addons.k8s.io/v1.4.0.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Namespace\nmetadata:\n name: kube-system"}}
I1212 13:18:57.759608 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:57.759816 402540 executor.go:178] Executing task "EBSVolume/a.etcd-main.kops.domain.com": *awstasks.EBSVolume {"Name":"a.etcd-main.kops.domain.com","Lifecycle":"Sync","AvailabilityZone":"us-west-1a","Encrypted":false,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/main":"a/a","k8s.io/role/master":"1","kubernetes.io/cluster/kops.domain.com":"owned"},"VolumeIops":null,"VolumeType":"gp2"}
I1212 13:18:57.760093 402540 request_logger.go:45] AWS request: ec2/DescribeVolumes
I1212 13:18:57.760254 402540 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.6.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.6.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1beta1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1beta1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs"}}
I1212 13:18:57.760373 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:57.760662 402540 executor.go:178] Executing task "Keypair/apiserver-aggregator-ca": *fitasks.Keypair {"Name":"apiserver-aggregator-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","type":"ca","format":"v1alpha2"}
I1212 13:18:57.760722 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml"
I1212 13:18:57.760918 402540 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\": \"dedicated\", \"value\":\n \"master\"}]'\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n node-role.kubernetes.io/master: \"\"\n serviceAccount: dns-controller\n tolerations:\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - extensions\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller"}}
I1212 13:18:57.761036 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:57.761211 402540 executor.go:178] Executing task "Secret/system:scheduler": *fitasks.Secret {"Name":"system:scheduler","Lifecycle":"Sync"}
I1212 13:18:57.761253 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler"
I1212 13:18:57.761390 402540 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.15.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.15.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - list\n - patch\n- apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - update\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: system:aws-cloud-provider\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:aws-cloud-provider\nsubjects:\n- kind: ServiceAccount\n name: aws-cloud-provider\n namespace: kube-system"}}
I1212 13:18:57.761466 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:57.761636 402540 executor.go:178] Executing task "DNSZone/Z237FHI0B4E3ZX": *awstasks.DNSZone {"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":null,"ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}
I1212 13:18:57.761935 402540 request_logger.go:45] AWS request: route53/GetHostedZone
I1212 13:18:57.762038 402540 executor.go:178] Executing task "Secret/kube": *fitasks.Secret {"Name":"kube","Lifecycle":"Sync"}
I1212 13:18:57.762108 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube"
I1212 13:18:57.762259 402540 executor.go:178] Executing task "Keypair/etcd-clients-ca": *fitasks.Keypair {"Name":"etcd-clients-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-clients-ca","type":"ca","format":"v1alpha2"}
I1212 13:18:57.762300 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml"
I1212 13:18:57.762461 402540 executor.go:178] Executing task "kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-dns-controller.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Location":"addons/dns-controller.addons.k8s.io/k8s-1.12.yaml","Contents":{"Name":"","Resource":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n name: dns-controller\n namespace: kube-system\nspec:\n replicas: 1\n selector:\n matchLabels:\n k8s-app: dns-controller\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n k8s-app: dns-controller\n version: v1.15.0\n spec:\n containers:\n - command:\n - /usr/bin/dns-controller\n - --watch-ingress=false\n - --dns=aws-route53\n - --zone=*/Z237FHI0B4E3ZX\n - --zone=*/*\n - -v=2\n image: kope/dns-controller:1.15.0\n name: dns-controller\n resources:\n requests:\n cpu: 50m\n memory: 50Mi\n dnsPolicy: Default\n hostNetwork: true\n nodeSelector:\n node-role.kubernetes.io/master: \"\"\n serviceAccount: dns-controller\n tolerations:\n - effect: NoSchedule\n key: node-role.kubernetes.io/master\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: dns-controller\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - ingress\n - nodes\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - extensions\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: dns-controller.addons.k8s.io\n name: kops:dns-controller\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kops:dns-controller\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: system:serviceaccount:kube-system:dns-controller"}}
I1212 13:18:57.762606 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:57.762819 402540 executor.go:178] Executing task "IAMRole/nodes.kops.domain.com": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}
I1212 13:18:57.763034 402540 request_logger.go:45] AWS request: iam/GetRole
I1212 13:18:57.763260 402540 executor.go:178] Executing task "IAMRole/masters.kops.domain.com": *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}
I1212 13:18:57.763393 402540 request_logger.go:45] AWS request: iam/GetRole
I1212 13:18:57.763454 402540 executor.go:178] Executing task "SSHKey/kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2": *awstasks.SSHKey {"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":null}
I1212 13:18:57.763599 402540 sshkey.go:109] Computed SSH key fingerprint as "7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"
I1212 13:18:57.763703 402540 request_logger.go:45] AWS request: ec2/DescribeKeyPairs
I1212 13:18:57.763950 402540 executor.go:178] Executing task "Secret/admin": *fitasks.Secret {"Name":"admin","Lifecycle":"Sync"}
I1212 13:18:57.764018 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin"
I1212 13:18:57.764176 402540 executor.go:178] Executing task "Secret/system:controller_manager": *fitasks.Secret {"Name":"system:controller_manager","Lifecycle":"Sync"}
I1212 13:18:57.764212 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager"
I1212 13:18:57.764345 402540 executor.go:178] Executing task "Keypair/etcd-manager-ca-main": *fitasks.Keypair {"Name":"etcd-manager-ca-main","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-manager-ca-main","type":"ca","format":"v1alpha2"}
I1212 13:18:57.764388 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml"
I1212 13:18:57.764564 402540 executor.go:178] Executing task "kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-rbac.addons.k8s.io-k8s-1.8","Lifecycle":"Sync","Location":"addons/rbac.addons.k8s.io/k8s-1.8.yaml","Contents":{"Name":"","Resource":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n addonmanager.kubernetes.io/mode: Reconcile\n k8s-addon: rbac.addons.k8s.io\n kubernetes.io/cluster-service: \"true\"\n name: kubelet-cluster-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:node\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet"}}
I1212 13:18:57.764639 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:57.764771 402540 executor.go:178] Executing task "DHCPOptions/kops.domain.com": *awstasks.DHCPOptions {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"DomainName":"us-west-1.compute.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:18:57.765011 402540 request_logger.go:45] AWS request: ec2/DescribeDhcpOptions
I1212 13:18:57.765081 402540 executor.go:178] Executing task "kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-storage-aws.addons.k8s.io-v1.7.0","Lifecycle":"Sync","Location":"addons/storage-aws.addons.k8s.io/v1.7.0.yaml","Contents":{"Name":"","Resource":"apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: default\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs\n\n---\n\napiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n annotations:\n storageclass.beta.kubernetes.io/is-default-class: \"true\"\n labels:\n k8s-addon: storage-aws.addons.k8s.io\n name: gp2\nparameters:\n type: gp2\nprovisioner: kubernetes.io/aws-ebs"}}
I1212 13:18:57.765138 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:57.765287 402540 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-pre-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml","Contents":{"Name":"","Resource":"apiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --mode=linear\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"min\":2}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.0.0\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns\n spec:\n containers:\n - args:\n - --domain=cluster.local.\n - --dns-port=10053\n - --config-map=kube-dns\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/kubedns-amd64:1.9\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz-kubedns\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n - args:\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-resolv\n - --server=127.0.0.1#10053\n - --log-facility=-\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthz-dnsmasq\n port: 8080\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 10Mi\n - args:\n - --v=2\n - --logtostderr\n image: k8s.gcr.io/dnsmasq-metrics-amd64:1.0\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq-metrics\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n memory: 10Mi\n - args:\n - --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1 \u003e/dev/null\n - --url=/healthz-dnsmasq\n - --cmd=nslookup kubernetes.default.svc.cluster.local 127.0.0.1:10053 \u003e/dev/null\n - --url=/healthz-kubedns\n - --port=8080\n - --quiet\n image: k8s.gcr.io/exechealthz-amd64:1.2\n name: healthz\n ports:\n - containerPort: 8080\n protocol: TCP\n resources:\n limits:\n memory: 50Mi\n requests:\n cpu: 10m\n memory: 50Mi\n dnsPolicy: Default\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns"}}
I1212 13:18:57.765451 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:57.765636 402540 executor.go:178] Executing task "IAMInstanceProfile/masters.kops.domain.com": *awstasks.IAMInstanceProfile {"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false}
I1212 13:18:57.765784 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1212 13:18:57.765834 402540 executor.go:178] Executing task "kops.domain.com-addons-limit-range.addons.k8s.io": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-limit-range.addons.k8s.io","Lifecycle":"Sync","Location":"addons/limit-range.addons.k8s.io/v1.5.0.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: LimitRange\nmetadata:\n name: limits\n namespace: default\nspec:\n limits:\n - defaultRequest:\n cpu: 100m\n type: Container"}}
I1212 13:18:57.765886 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:57.766102 402540 executor.go:178] Executing task "Secret/system:dns": *fitasks.Secret {"Name":"system:dns","Lifecycle":"Sync"}
I1212 13:18:57.766144 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns"
I1212 13:18:57.766277 402540 executor.go:178] Executing task "Keypair/etcd-manager-ca-events": *fitasks.Keypair {"Name":"etcd-manager-ca-events","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-manager-ca-events","type":"ca","format":"v1alpha2"}
I1212 13:18:57.766321 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml"
I1212 13:18:57.766479 402540 executor.go:178] Executing task "kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kubelet-api.rbac.addons.k8s.io-k8s-1.9","Lifecycle":"Sync","Location":"addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml","Contents":{"Name":"","Resource":"apiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: kops:system:kubelet-api-admin\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:kubelet-api-admin\nsubjects:\n- apiGroup: rbac.authorization.k8s.io\n kind: User\n name: kubelet-api"}}
I1212 13:18:57.766554 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:57.766686 402540 executor.go:178] Executing task "ManagedFile/manifests-etcdmanager-events": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-events","Lifecycle":"Sync","Location":"manifests/etcd/events.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Pod\nmetadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-events\n name: etcd-manager-events\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events\n --client-urls=https://__name__:4002 --cluster-name=etcd-events --containerized=true\n --dns-suffix=.internal.kops.domain.com --etcd-insecure=false --grpc-port=3997\n --insecure=false --peer-urls=https://__name__:2381 --quarantine-client-urls=https://__name__:3995\n --v=6 --volume-name-tag=k8s.io/etcd/events --volume-provider=aws --volume-tag=k8s.io/etcd/events\n --volume-tag=k8s.io/role/master=1 --volume-tag=kubernetes.io/cluster/kops.domain.com=owned\n \u003e /tmp/pipe 2\u003e\u00261\n image: kopeio/etcd-manager:3.0.20190930\n name: etcd-manager\n resources:\n requests:\n cpu: 100m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /etc/hosts\n name: hosts\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /etc/hosts\n type: File\n name: hosts\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-events\n type: DirectoryOrCreate\n name: pki\n - hostPath:\n path: /var/log/etcd-events.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n"}}
I1212 13:18:57.766777 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/events.yaml"
I1212 13:18:57.766916 402540 executor.go:178] Executing task "ManagedFile/manifests-etcdmanager-main": *fitasks.ManagedFile {"Name":"manifests-etcdmanager-main","Lifecycle":"Sync","Location":"manifests/etcd/main.yaml","Contents":{"Name":"","Resource":"apiVersion: v1\nkind: Pod\nmetadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n creationTimestamp: null\n labels:\n k8s-app: etcd-manager-main\n name: etcd-manager-main\n namespace: kube-system\nspec:\n containers:\n - command:\n - /bin/sh\n - -c\n - mkfifo /tmp/pipe; (tee -a /var/log/etcd.log \u003c /tmp/pipe \u0026 ) ; exec /etcd-manager\n --backup-store=s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main\n --client-urls=https://__name__:4001 --cluster-name=etcd --containerized=true\n --dns-suffix=.internal.kops.domain.com --etcd-insecure=false --grpc-port=3996\n --insecure=false --peer-urls=https://__name__:2380 --quarantine-client-urls=https://__name__:3994\n --v=6 --volume-name-tag=k8s.io/etcd/main --volume-provider=aws --volume-tag=k8s.io/etcd/main\n --volume-tag=k8s.io/role/master=1 --volume-tag=kubernetes.io/cluster/kops.domain.com=owned\n \u003e /tmp/pipe 2\u003e\u00261\n image: kopeio/etcd-manager:3.0.20190930\n name: etcd-manager\n resources:\n requests:\n cpu: 200m\n memory: 100Mi\n securityContext:\n privileged: true\n volumeMounts:\n - mountPath: /rootfs\n name: rootfs\n - mountPath: /etc/hosts\n name: hosts\n - mountPath: /etc/kubernetes/pki/etcd-manager\n name: pki\n - mountPath: /var/log/etcd.log\n name: varlogetcd\n hostNetwork: true\n hostPID: true\n priorityClassName: system-cluster-critical\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n volumes:\n - hostPath:\n path: /\n type: Directory\n name: rootfs\n - hostPath:\n path: /etc/hosts\n type: File\n name: hosts\n - hostPath:\n path: /etc/kubernetes/pki/etcd-manager-main\n type: DirectoryOrCreate\n name: pki\n - hostPath:\n path: /var/log/etcd.log\n type: FileOrCreate\n name: varlogetcd\nstatus: {}\n"}}
I1212 13:18:57.766992 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/main.yaml"
I1212 13:18:57.767189 402540 executor.go:178] Executing task "IAMInstanceProfile/nodes.kops.domain.com": *awstasks.IAMInstanceProfile {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Shared":false}
I1212 13:18:57.767286 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1212 13:18:57.767334 402540 executor.go:178] Executing task "kops.domain.com-addons-bootstrap": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-bootstrap","Lifecycle":"Sync","Location":"addons/bootstrap-channel.yaml","Contents":{"Name":"","Resource":"kind: Addons\nmetadata:\n creationTimestamp: null\n name: bootstrap\nspec:\n addons:\n - manifest: core.addons.k8s.io/v1.4.0.yaml\n manifestHash: 3ffe9ac576f9eec72e2bdfbd2ea17d56d9b17b90\n name: core.addons.k8s.io\n selector:\n k8s-addon: core.addons.k8s.io\n version: 1.4.0\n - id: pre-k8s-1.6\n kubernetesVersion: \u003c1.6.0\n manifest: kube-dns.addons.k8s.io/pre-k8s-1.6.yaml\n manifestHash: 895c961cb9365cbedb22edd20a7648182ae7ed3f\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.6\n kubernetesVersion: '\u003e=1.6.0 \u003c1.12.0'\n manifest: kube-dns.addons.k8s.io/k8s-1.6.yaml\n manifestHash: 191685ca6fe009302e55512b0eefc5a676433f10\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.12\n kubernetesVersion: '\u003e=1.12.0'\n manifest: kube-dns.addons.k8s.io/k8s-1.12.yaml\n manifestHash: b4dff071aa340fd71650c96f213fdf4b4f799c71\n name: kube-dns.addons.k8s.io\n selector:\n k8s-addon: kube-dns.addons.k8s.io\n version: 1.14.13-kops.1\n - id: k8s-1.8\n kubernetesVersion: '\u003e=1.8.0'\n manifest: rbac.addons.k8s.io/k8s-1.8.yaml\n manifestHash: 5d53ce7b920cd1e8d65d2306d80a041420711914\n name: rbac.addons.k8s.io\n selector:\n k8s-addon: rbac.addons.k8s.io\n version: 1.8.0\n - id: k8s-1.9\n kubernetesVersion: '\u003e=1.9.0'\n manifest: kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml\n manifestHash: e1508d77cb4e527d7a2939babe36dc350dd83745\n name: kubelet-api.rbac.addons.k8s.io\n selector:\n k8s-addon: kubelet-api.rbac.addons.k8s.io\n version: v0.0.1\n - manifest: limit-range.addons.k8s.io/v1.5.0.yaml\n manifestHash: 2ea50e23f1a5aa41df3724630ac25173738cc90c\n name: limit-range.addons.k8s.io\n selector:\n k8s-addon: limit-range.addons.k8s.io\n version: 1.5.0\n - id: pre-k8s-1.6\n kubernetesVersion: \u003c1.6.0\n manifest: dns-controller.addons.k8s.io/pre-k8s-1.6.yaml\n manifestHash: 41097765274e5bd95292ae88bd6e26268c5e8c59\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: k8s-1.6\n kubernetesVersion: '\u003e=1.6.0 \u003c1.12.0'\n manifest: dns-controller.addons.k8s.io/k8s-1.6.yaml\n manifestHash: 079663bb21f764bd016174115a00ad1e4d92e07d\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: k8s-1.12\n kubernetesVersion: '\u003e=1.12.0'\n manifest: dns-controller.addons.k8s.io/k8s-1.12.yaml\n manifestHash: 767f8242c35ba32b19b13234cedf26ac5f554dab\n name: dns-controller.addons.k8s.io\n selector:\n k8s-addon: dns-controller.addons.k8s.io\n version: 1.15.0\n - id: v1.15.0\n kubernetesVersion: '\u003e=1.15.0'\n manifest: storage-aws.addons.k8s.io/v1.15.0.yaml\n manifestHash: 23459f7be52d7c818dc060a8bcf5e3565bd87a7b\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n - id: v1.7.0\n kubernetesVersion: '\u003e=1.7.0 \u003c1.15.0'\n manifest: storage-aws.addons.k8s.io/v1.7.0.yaml\n manifestHash: 62705a596142e6cc283280e8aa973e51536994c5\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n - id: v1.6.0\n kubernetesVersion: \u003c1.7.0\n manifest: storage-aws.addons.k8s.io/v1.6.0.yaml\n manifestHash: 7de4b2eb0521d669172038759c521418711d8266\n name: storage-aws.addons.k8s.io\n selector:\n k8s-addon: storage-aws.addons.k8s.io\n version: 1.15.0\n"}}
I1212 13:18:57.767472 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/bootstrap-channel.yaml"
I1212 13:18:57.767627 402540 executor.go:178] Executing task "EBSVolume/a.etcd-events.kops.domain.com": *awstasks.EBSVolume {"Name":"a.etcd-events.kops.domain.com","Lifecycle":"Sync","AvailabilityZone":"us-west-1a","Encrypted":false,"ID":null,"KmsKeyId":null,"SizeGB":20,"Tags":{"k8s.io/etcd/events":"a/a","k8s.io/role/master":"1","kubernetes.io/cluster/kops.domain.com":"owned"},"VolumeIops":null,"VolumeType":"gp2"}
I1212 13:18:57.767752 402540 request_logger.go:45] AWS request: ec2/DescribeVolumes
I1212 13:18:57.767808 402540 executor.go:178] Executing task "Keypair/etcd-peers-ca-main": *fitasks.Keypair {"Name":"etcd-peers-ca-main","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-peers-ca-main","type":"ca","format":"v1alpha2"}
I1212 13:18:57.767854 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml"
I1212 13:18:57.768005 402540 executor.go:178] Executing task "Secret/system:monitoring": *fitasks.Secret {"Name":"system:monitoring","Lifecycle":"Sync"}
I1212 13:18:57.768040 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring"
I1212 13:18:57.768229 402540 executor.go:178] Executing task "ManagedFile/etcd-cluster-spec-events": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-events","Lifecycle":"Sync","Location":"backups/etcd/events/control/etcd-cluster-spec","Contents":{"Name":"","Resource":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.3.10\"\n}"}}
I1212 13:18:57.768282 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events/control/etcd-cluster-spec"
I1212 13:18:57.768424 402540 executor.go:178] Executing task "Secret/system:logging": *fitasks.Secret {"Name":"system:logging","Lifecycle":"Sync"}
I1212 13:18:57.768458 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging"
I1212 13:18:57.768610 402540 executor.go:178] Executing task "Secret/kube-proxy": *fitasks.Secret {"Name":"kube-proxy","Lifecycle":"Sync"}
I1212 13:18:57.768644 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy"
I1212 13:18:57.768767 402540 executor.go:178] Executing task "Keypair/etcd-peers-ca-events": *fitasks.Keypair {"Name":"etcd-peers-ca-events","alternateNames":null,"alternateNameTasks":null,"Lifecycle":null,"Signer":null,"subject":"cn=etcd-peers-ca-events","type":"ca","format":"v1alpha2"}
I1212 13:18:57.768805 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml"
I1212 13:18:57.768941 402540 executor.go:178] Executing task "ManagedFile/etcd-cluster-spec-main": *fitasks.ManagedFile {"Name":"etcd-cluster-spec-main","Lifecycle":"Sync","Location":"backups/etcd/main/control/etcd-cluster-spec","Contents":{"Name":"","Resource":"{\n \"memberCount\": 1,\n \"etcdVersion\": \"3.3.10\"\n}"}}
I1212 13:18:57.768985 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main/control/etcd-cluster-spec"
I1212 13:18:57.769109 402540 executor.go:178] Executing task "VPC/kops.domain.com": *awstasks.VPC {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:18:57.769398 402540 request_logger.go:45] AWS request: ec2/DescribeVpcs
I1212 13:18:57.769465 402540 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.12","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.12.yaml","Contents":{"Name":"","Resource":"apiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns-autoscaler\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.4.0\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n\n---\n\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n prometheus.io/port: \"10055\"\n prometheus.io/scrape: \"true\"\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n labels:\n k8s-app: kube-dns\n spec:\n affinity:\n podAntiAffinity:\n preferredDuringSchedulingIgnoredDuringExecution:\n - podAffinityTerm:\n labelSelector:\n matchExpressions:\n - key: k8s-app\n operator: In\n values:\n - kube-dns\n topologyKey: kubernetes.io/hostname\n weight: 1\n containers:\n - args:\n - --config-dir=/kube-dns-config\n - --dns-port=10053\n - --domain=cluster.local.\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/kubedns\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n volumeMounts:\n - mountPath: /kube-dns-config\n name: kube-dns-config\n - args:\n - -v=2\n - -logtostderr\n - -configDir=/etc/k8s/dns/dnsmasq-nanny\n - -restartDnsmasq=true\n - --\n - -k\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-negcache\n - --log-facility=-\n - --server=/cluster.local/127.0.0.1#10053\n - --server=/in-addr.arpa/127.0.0.1#10053\n - --server=/in6.arpa/127.0.0.1#10053\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/dnsmasq\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 20Mi\n volumeMounts:\n - mountPath: /etc/k8s/dns/dnsmasq-nanny\n name: kube-dns-config\n - args:\n - --v=2\n - --logtostderr\n - --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A\n - --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A\n image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.13\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: sidecar\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 10m\n memory: 20Mi\n dnsPolicy: Default\n serviceAccountName: kube-dns\n volumes:\n - configMap:\n name: kube-dns\n optional: true\n name: kube-dns-config\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n - apps\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kube-dns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: policy/v1beta1\nkind: PodDisruptionBudget\nmetadata:\n name: kube-dns\n namespace: kube-system\nspec:\n minAvailable: 1\n selector:\n matchLabels:\n k8s-app: kube-dns"}}
I1212 13:18:57.769675 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:57.769816 402540 executor.go:178] Executing task "kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6": *fitasks.ManagedFile {"Name":"kops.domain.com-addons-kube-dns.addons.k8s.io-k8s-1.6","Lifecycle":"Sync","Location":"addons/kube-dns.addons.k8s.io/k8s-1.6.yaml","Contents":{"Name":"","Resource":"{}\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns-autoscaler\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns-autoscaler\n namespace: kube-system\nspec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n containers:\n - command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n - --default-params={\"linear\":{\"coresPerReplica\":256,\"nodesPerReplica\":16,\"preventSinglePointFailure\":true}}\n - --logtostderr=true\n - --v=2\n image: k8s.gcr.io/cluster-proportional-autoscaler-amd64:1.1.2-r2\n name: autoscaler\n resources:\n requests:\n cpu: 20m\n memory: 10Mi\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - key: CriticalAddonsOnly\n operator: Exists\n\n---\n\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n name: kube-dns\n namespace: kube-system\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns\n strategy:\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n template:\n metadata:\n annotations:\n prometheus.io/port: \"10055\"\n prometheus.io/scrape: \"true\"\n scheduler.alpha.kubernetes.io/critical-pod: \"\"\n scheduler.alpha.kubernetes.io/tolerations: '[{\"key\":\"CriticalAddonsOnly\",\n \"operator\":\"Exists\"}]'\n labels:\n k8s-app: kube-dns\n spec:\n containers:\n - args:\n - --config-dir=/kube-dns-config\n - --dns-port=10053\n - --domain=cluster.local.\n - --v=2\n env:\n - name: PROMETHEUS_PORT\n value: \"10055\"\n image: k8s.gcr.io/k8s-dns-kube-dns-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/kubedns\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: kubedns\n ports:\n - containerPort: 10053\n name: dns-local\n protocol: UDP\n - containerPort: 10053\n name: dns-tcp-local\n protocol: TCP\n - containerPort: 10055\n name: metrics\n protocol: TCP\n readinessProbe:\n httpGet:\n path: /readiness\n port: 8081\n scheme: HTTP\n initialDelaySeconds: 3\n timeoutSeconds: 5\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n volumeMounts:\n - mountPath: /kube-dns-config\n name: kube-dns-config\n - args:\n - -v=2\n - -logtostderr\n - -configDir=/etc/k8s/dns/dnsmasq-nanny\n - -restartDnsmasq=true\n - --\n - -k\n - --cache-size=1000\n - --dns-forward-max=150\n - --no-negcache\n - --log-facility=-\n - --server=/cluster.local/127.0.0.1#10053\n - --server=/in-addr.arpa/127.0.0.1#10053\n - --server=/in6.arpa/127.0.0.1#10053\n - --min-port=1024\n image: k8s.gcr.io/k8s-dns-dnsmasq-nanny-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /healthcheck/dnsmasq\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: dnsmasq\n ports:\n - containerPort: 53\n name: dns\n protocol: UDP\n - containerPort: 53\n name: dns-tcp\n protocol: TCP\n resources:\n requests:\n cpu: 150m\n memory: 20Mi\n volumeMounts:\n - mountPath: /etc/k8s/dns/dnsmasq-nanny\n name: kube-dns-config\n - args:\n - --v=2\n - --logtostderr\n - --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,A\n - --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,A\n image: k8s.gcr.io/k8s-dns-sidecar-amd64:1.14.10\n livenessProbe:\n failureThreshold: 5\n httpGet:\n path: /metrics\n port: 10054\n scheme: HTTP\n initialDelaySeconds: 60\n successThreshold: 1\n timeoutSeconds: 5\n name: sidecar\n ports:\n - containerPort: 10054\n name: metrics\n protocol: TCP\n resources:\n requests:\n cpu: 10m\n memory: 20Mi\n dnsPolicy: Default\n serviceAccountName: kube-dns\n volumes:\n - configMap:\n name: kube-dns\n optional: true\n name: kube-dns-config\n\n---\n\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n kubernetes.io/name: KubeDNS\n name: kube-dns\n namespace: kube-system\nspec:\n clusterIP: 100.64.0.10\n ports:\n - name: dns\n port: 53\n protocol: UDP\n - name: dns-tcp\n port: 53\n protocol: TCP\n selector:\n k8s-app: kube-dns\n\n---\n\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\n namespace: kube-system\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nrules:\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n- apiGroups:\n - \"\"\n resources:\n - replicationcontrollers/scale\n verbs:\n - get\n - update\n- apiGroups:\n - extensions\n resources:\n - deployments/scale\n - replicasets/scale\n verbs:\n - get\n - update\n- apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - get\n - create\n\n---\n\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-addon: kube-dns.addons.k8s.io\n name: kube-dns-autoscaler\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: kube-dns-autoscaler\nsubjects:\n- kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system"}}
I1212 13:18:57.769988 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:57.841411 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method
I1212 13:18:57.841469 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/"
I1212 13:18:57.928318 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet"
I1212 13:18:57.943663 402540 ebsvolume.go:140] Creating PersistentVolume with Name:"a.etcd-main.kops.domain.com"
I1212 13:18:57.944141 402540 request_logger.go:45] AWS request: ec2/CreateVolume
I1212 13:18:58.084373 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:58.084438 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.084456 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/dns-controller.addons.k8s.io/pre-k8s-1.6.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.126028 402540 sshkey.go:135] Creating SSHKey with Name:"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2"
I1212 13:18:58.126764 402540 request_logger.go:45] AWS request: ec2/ImportKeyPair
I1212 13:18:58.172720 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/core.addons.k8s.io/v1.4.0.yaml"
I1212 13:18:58.172827 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.172890 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/core.addons.k8s.io/v1.4.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.184645 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.184773 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator-ca/"
I1212 13:18:58.186741 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.6.0.yaml"
I1212 13:18:58.186873 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.186899 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/storage-aws.addons.k8s.io/v1.6.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.189016 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin"
I1212 13:18:58.190650 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/rbac.addons.k8s.io/k8s-1.8.yaml"
I1212 13:18:58.190705 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.190771 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/rbac.addons.k8s.io/k8s-1.8.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.192165 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/main.yaml"
I1212 13:18:58.192216 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.192238 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/manifests/etcd/main.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.193630 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging"
I1212 13:18:58.198414 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:58.198480 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-events/"
I1212 13:18:58.200445 402540 iamrole.go:144] Creating IAMRole with Name:"nodes.kops.domain.com"
I1212 13:18:58.200940 402540 request_logger.go:45] AWS request: iam/CreateRole
I1212 13:18:58.207568 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:58.207635 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.207657 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.6.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.215685 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy"
I1212 13:18:58.224538 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager"
I1212 13:18:58.225656 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.225756 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-clients-ca/"
I1212 13:18:58.227068 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main/control/etcd-cluster-spec"
I1212 13:18:58.227124 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.227145 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/backups/etcd/main/control/etcd-cluster-spec" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.228929 402540 iaminstanceprofile.go:114] Creating IAMInstanceProfile with Name:"masters.kops.domain.com"
I1212 13:18:58.229259 402540 request_logger.go:45] AWS request: iam/CreateInstanceProfile
I1212 13:18:58.229950 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:58.229999 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-main/"
I1212 13:18:58.231461 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml"
I1212 13:18:58.231543 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.231569 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/kube-dns.addons.k8s.io/pre-k8s-1.6.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.233104 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.7.0.yaml"
I1212 13:18:58.233159 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.233182 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/storage-aws.addons.k8s.io/v1.7.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.234470 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml"
I1212 13:18:58.234632 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.234655 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/kubelet-api.rbac.addons.k8s.io/k8s-1.9.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.235181 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring"
I1212 13:18:58.235705 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler"
I1212 13:18:58.236104 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:58.236126 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-events/"
I1212 13:18:58.236588 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube"
I1212 13:18:58.237034 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/bootstrap-channel.yaml"
I1212 13:18:58.237059 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.237065 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/bootstrap-channel.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.237569 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml"
I1212 13:18:58.237623 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.237630 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.6.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.238123 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns"
I1212 13:18:58.238571 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/manifests/etcd/events.yaml"
I1212 13:18:58.238613 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.238623 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/manifests/etcd/events.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.239148 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: []
I1212 13:18:58.239171 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:18:58.239599 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:58.239621 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.239627 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/dns-controller.addons.k8s.io/k8s-1.12.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.240178 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml"
I1212 13:18:58.240200 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.240206 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/kube-dns.addons.k8s.io/k8s-1.12.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.244022 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet"
I1212 13:18:58.248513 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml"
I1212 13:18:58.248541 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.248548 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/storage-aws.addons.k8s.io/v1.15.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.255532 402540 iamrole.go:144] Creating IAMRole with Name:"masters.kops.domain.com"
I1212 13:18:58.255743 402540 request_logger.go:45] AWS request: iam/CreateRole
I1212 13:18:58.257071 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:58.257098 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-main/"
I1212 13:18:58.268719 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events/control/etcd-cluster-spec"
I1212 13:18:58.268782 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.268791 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/backups/etcd/events/control/etcd-cluster-spec" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.273350 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca: []
I1212 13:18:58.273390 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml"
I1212 13:18:58.275095 402540 iaminstanceprofile.go:114] Creating IAMInstanceProfile with Name:"nodes.kops.domain.com"
I1212 13:18:58.275206 402540 request_logger.go:45] AWS request: iam/CreateInstanceProfile
I1212 13:18:58.286720 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml"
I1212 13:18:58.286780 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.286804 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/addons/limit-range.addons.k8s.io/v1.5.0.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.290236 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events: []
I1212 13:18:58.290270 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml"
I1212 13:18:58.320677 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.320773 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/"
I1212 13:18:58.325888 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet"
I1212 13:18:58.325952 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.325965 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/kubelet" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.338621 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1212 13:18:58.339690 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main: []
I1212 13:18:58.339730 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml"
I1212 13:18:58.340683 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events: []
I1212 13:18:58.340757 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml"
I1212 13:18:58.350629 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca: []
I1212 13:18:58.350664 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml"
I1212 13:18:58.354558 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.354615 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator-ca/"
I1212 13:18:58.372939 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main: []
I1212 13:18:58.373000 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml"
I1212 13:18:58.375645 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:58.375688 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-events/"
I1212 13:18:58.385968 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1212 13:18:58.424197 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:58.424254 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-events/"
I1212 13:18:58.427666 402540 dhcp_options.go:142] Creating DHCPOptions with Name:"kops.domain.com"
I1212 13:18:58.428025 402540 request_logger.go:45] AWS request: ec2/CreateDhcpOptions
I1212 13:18:58.429439 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:58.429475 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-main/"
I1212 13:18:58.432877 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.432927 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-clients-ca/"
I1212 13:18:58.433658 402540 iaminstanceprofile.go:144] Found IAM instance profile "masters.kops.domain.com"
I1212 13:18:58.442554 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: []
I1212 13:18:58.443024 402540 keypair.go:181] creating brand new certificate
I1212 13:18:58.443045 402540 keypair.go:201] Creating PKI keypair "ca"
I1212 13:18:58.443091 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:18:58.445154 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca: []
I1212 13:18:58.445273 402540 keypair.go:181] creating brand new certificate
I1212 13:18:58.445311 402540 keypair.go:201] Creating PKI keypair "apiserver-aggregator-ca"
I1212 13:18:58.445330 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml"
I1212 13:18:58.446732 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kubelet"
I1212 13:18:58.447109 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin"
I1212 13:18:58.467125 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events: []
I1212 13:18:58.467325 402540 keypair.go:181] creating brand new certificate
I1212 13:18:58.467365 402540 keypair.go:201] Creating PKI keypair "etcd-peers-ca-events"
I1212 13:18:58.467390 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml"
I1212 13:18:58.479615 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:58.479659 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-main/"
I1212 13:18:58.502123 402540 iaminstanceprofile.go:144] Found IAM instance profile "nodes.kops.domain.com"
I1212 13:18:58.515119 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events: []
I1212 13:18:58.515262 402540 keypair.go:181] creating brand new certificate
I1212 13:18:58.515272 402540 keypair.go:201] Creating PKI keypair "etcd-manager-ca-events"
I1212 13:18:58.515290 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml"
I1212 13:18:58.521640 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main: []
I1212 13:18:58.521814 402540 keypair.go:181] creating brand new certificate
I1212 13:18:58.521858 402540 keypair.go:201] Creating PKI keypair "etcd-manager-ca-main"
I1212 13:18:58.521879 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml"
I1212 13:18:58.522530 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca: []
I1212 13:18:58.522621 402540 keypair.go:181] creating brand new certificate
I1212 13:18:58.522632 402540 keypair.go:201] Creating PKI keypair "etcd-clients-ca"
I1212 13:18:58.522643 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml"
I1212 13:18:58.526816 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.526865 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator-ca/"
I1212 13:18:58.528779 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.528802 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/"
I1212 13:18:58.544120 402540 vpc.go:155] Creating VPC with CIDR: "172.20.0.0/16"
I1212 13:18:58.544281 402540 request_logger.go:45] AWS request: ec2/CreateVpc
I1212 13:18:58.548361 402540 ebsvolume.go:140] Creating PersistentVolume with Name:"a.etcd-events.kops.domain.com"
I1212 13:18:58.548658 402540 request_logger.go:45] AWS request: ec2/CreateVolume
I1212 13:18:58.552021 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:58.552060 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-events/"
I1212 13:18:58.571362 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin"
I1212 13:18:58.571404 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.571411 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/admin" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.583943 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main: []
I1212 13:18:58.584079 402540 keypair.go:181] creating brand new certificate
I1212 13:18:58.584090 402540 keypair.go:201] Creating PKI keypair "etcd-peers-ca-main"
I1212 13:18:58.584107 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml"
I1212 13:18:58.600125 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:58.600166 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-events/"
I1212 13:18:58.602646 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:58.602687 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-main/"
I1212 13:18:58.605622 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.605659 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-clients-ca/"
I1212 13:18:58.615839 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca: []
I1212 13:18:58.615898 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml"
I1212 13:18:58.619197 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: []
I1212 13:18:58.619236 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:18:58.641646 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events: []
I1212 13:18:58.641710 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml"
I1212 13:18:58.691334 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main: []
I1212 13:18:58.691435 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml"
I1212 13:18:58.695534 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events: []
I1212 13:18:58.695575 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml"
I1212 13:18:58.696274 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.696296 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator-ca/"
I1212 13:18:58.696659 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca: []
I1212 13:18:58.696698 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml"
I1212 13:18:58.703537 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.703580 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/"
I1212 13:18:58.718264 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:58.718303 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-main/"
I1212 13:18:58.719901 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/admin"
I1212 13:18:58.720211 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging"
I1212 13:18:58.723875 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:58.723923 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-events/"
I1212 13:18:58.750253 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:18:58.764958 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:18:58.780949 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml", falling back to directory-list method
I1212 13:18:58.781026 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-clients-ca/"
I1212 13:18:58.781620 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml", falling back to directory-list method
I1212 13:18:58.781641 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-events/"
I1212 13:18:58.786783 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca: []
I1212 13:18:58.786847 402540 keypair.go:212] Creating privateKey "apiserver-aggregator-ca"
I1212 13:18:58.796907 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: []
I1212 13:18:58.796963 402540 keypair.go:212] Creating privateKey "ca"
I1212 13:18:58.882355 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging"
I1212 13:18:58.882402 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:58.882409 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:logging" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:58.882917 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:58.882941 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-main/"
I1212 13:18:58.883175 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main: []
I1212 13:18:58.883196 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml"
I1212 13:18:58.883638 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events: []
I1212 13:18:58.883657 402540 keypair.go:212] Creating privateKey "etcd-peers-ca-events"
I1212 13:18:58.903230 402540 request_logger.go:45] AWS request: ec2/ModifyVpcAttribute
I1212 13:18:58.922814 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events: []
I1212 13:18:58.922854 402540 keypair.go:212] Creating privateKey "etcd-manager-ca-events"
I1212 13:18:58.943003 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca: []
I1212 13:18:58.943042 402540 keypair.go:212] Creating privateKey "etcd-clients-ca"
I1212 13:18:59.084843 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:logging"
I1212 13:18:59.105234 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:18:59.105565 402540 aws_cloud.go:885] adding tags to "dopt-01319dcd27f03a4e7": map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned]
I1212 13:18:59.105698 402540 request_logger.go:45] AWS request: ec2/CreateTags
I1212 13:18:59.106235 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy"
I1212 13:18:59.185717 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml", falling back to directory-list method
I1212 13:18:59.185759 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-main/"
I1212 13:18:59.266291 402540 request_logger.go:45] AWS request: ec2/ModifyVpcAttribute
I1212 13:18:59.286370 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy"
I1212 13:18:59.286411 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:59.286418 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/kube-proxy" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:18:59.286935 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main: []
I1212 13:18:59.286989 402540 keypair.go:212] Creating privateKey "etcd-manager-ca-main"
I1212 13:18:59.468053 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main: []
I1212 13:18:59.468143 402540 keypair.go:212] Creating privateKey "etcd-peers-ca-main"
I1212 13:18:59.629194 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube-proxy"
I1212 13:18:59.629773 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager"
I1212 13:18:59.770219 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:18:59.851011 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager"
I1212 13:18:59.851051 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:18:59.851058 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:controller_manager" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:00.092462 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:controller_manager"
I1212 13:19:00.092972 402540 aws_cloud.go:885] adding tags to "vpc-00d891ddc03f86a0d": map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned]
I1212 13:19:00.093563 402540 request_logger.go:45] AWS request: ec2/CreateTags
I1212 13:19:00.223209 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring"
I1212 13:19:00.337152 402540 vfs_castore.go:729] Issuing new certificate: "ca"
I1212 13:19:00.340089 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/ca/"
I1212 13:19:00.435021 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring"
I1212 13:19:00.435063 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:00.435070 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:monitoring" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:00.535684 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca: []
I1212 13:19:00.537368 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca/keyset.yaml"
I1212 13:19:00.537397 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:00.537403 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:00.558531 402540 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-events"
I1212 13:19:00.561623 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-events/"
I1212 13:19:00.565913 402540 vfs_castore.go:729] Issuing new certificate: "etcd-peers-ca-main"
I1212 13:19:00.569302 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-peers-ca-main/"
I1212 13:19:00.695190 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:monitoring"
I1212 13:19:00.727099 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca/6769541653117930842419943971.key"
I1212 13:19:00.727156 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:00.727163 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/ca/6769541653117930842419943971.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:00.747351 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube"
I1212 13:19:00.908608 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main: []
I1212 13:19:00.909439 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml"
I1212 13:19:00.909467 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:00.909474 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-peers-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:00.910135 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events: []
I1212 13:19:00.910755 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml"
I1212 13:19:00.910779 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:00.910785 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-peers-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:00.947628 402540 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator-ca"
I1212 13:19:01.012047 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator-ca/"
I1212 13:19:01.041532 402540 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-main"
I1212 13:19:01.044531 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-main/"
I1212 13:19:01.160139 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/ca/"
I1212 13:19:01.220654 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube"
I1212 13:19:01.220696 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.220704 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/kube" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.240829 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-events/6769541654068767872896778382.key"
I1212 13:19:01.240925 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.240933 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-peers-ca-events/6769541654068767872896778382.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.271165 402540 vfs_castore.go:729] Issuing new certificate: "etcd-manager-ca-events"
I1212 13:19:01.274194 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-manager-ca-events/"
I1212 13:19:01.291030 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-peers-ca-main/6769541654100469646585949542.key"
I1212 13:19:01.291121 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.291134 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-peers-ca-main/6769541654100469646585949542.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.311274 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca: []
I1212 13:19:01.312619 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml"
I1212 13:19:01.312665 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.312678 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.351472 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca: []
I1212 13:19:01.351984 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:19:01.352014 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.352020 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.352634 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main: []
I1212 13:19:01.353300 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml"
I1212 13:19:01.353324 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.353330 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-manager-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.391687 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events: []
I1212 13:19:01.392399 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml"
I1212 13:19:01.392426 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.392433 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-manager-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.405372 402540 vfs_castore.go:729] Issuing new certificate: "etcd-clients-ca"
I1212 13:19:01.408483 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/etcd-clients-ca/"
I1212 13:19:01.408967 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube"
I1212 13:19:01.409373 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-events/"
I1212 13:19:01.409796 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-peers-ca-main/"
I1212 13:19:01.410025 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler"
I1212 13:19:01.433578 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/6769541655739911076839554713.key"
I1212 13:19:01.433667 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.433706 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-aggregator-ca/6769541655739911076839554713.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.454511 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/6769541653117930842419943971.crt"
I1212 13:19:01.454593 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.454605 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/ca/6769541653117930842419943971.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.501119 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main: []
I1212 13:19:01.501777 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml"
I1212 13:19:01.501808 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.501815 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-peers-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.502259 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca: []
I1212 13:19:01.503217 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml"
I1212 13:19:01.503243 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.503250 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-clients-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.503848 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events: []
I1212 13:19:01.504248 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml"
I1212 13:19:01.504269 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.504275 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-peers-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.516695 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler"
I1212 13:19:01.516736 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.516743 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:scheduler" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.555625 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-events/6769541657129516105216232352.key"
I1212 13:19:01.555708 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.555723 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-manager-ca-events/6769541657129516105216232352.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.558994 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator-ca/"
I1212 13:19:01.576643 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-manager-ca-main/6769541656143224891204151388.key"
I1212 13:19:01.576730 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.576747 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-manager-ca-main/6769541656143224891204151388.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.593736 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/6769541653117930842419943971.crt"
I1212 13:19:01.604696 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/etcd-clients-ca/6769541657705913373071748751.key"
I1212 13:19:01.604738 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.604745 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/etcd-clients-ca/6769541657705913373071748751.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.656877 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca: []
I1212 13:19:01.657892 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml"
I1212 13:19:01.657932 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.657967 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.678664 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:scheduler"
I1212 13:19:01.679088 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns"
I1212 13:19:01.681167 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:01.681274 402540 keypair.go:230] created certificate with cn=kubernetes
I1212 13:19:01.691634 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-main/"
I1212 13:19:01.692192 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-manager-ca-events/"
I1212 13:19:01.698660 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/6769541654068767872896778382.crt"
I1212 13:19:01.698774 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.698816 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-peers-ca-events/6769541654068767872896778382.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.699756 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/6769541654100469646585949542.crt"
I1212 13:19:01.699828 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.699844 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-peers-ca-main/6769541654100469646585949542.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.729572 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/etcd-clients-ca/"
I1212 13:19:01.764603 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns"
I1212 13:19:01.764691 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.764710 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/secrets/system:dns" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.784339 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events: []
I1212 13:19:01.785320 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml"
I1212 13:19:01.785360 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.785372 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-manager-ca-events/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.786340 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main: []
I1212 13:19:01.787146 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml"
I1212 13:19:01.787181 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.787214 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-manager-ca-main/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.804514 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-main/6769541654100469646585949542.crt"
I1212 13:19:01.825082 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca: []
I1212 13:19:01.826032 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml"
I1212 13:19:01.826071 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.826082 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-clients-ca/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.891245 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:01.891430 402540 keypair.go:230] created certificate with cn=etcd-peers-ca-main
I1212 13:19:01.894593 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/6769541655739911076839554713.crt"
I1212 13:19:01.894672 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.894701 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-aggregator-ca/6769541655739911076839554713.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.895253 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-peers-ca-events/6769541654068767872896778382.crt"
I1212 13:19:01.895627 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/6769541657129516105216232352.crt"
I1212 13:19:01.895648 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.895672 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-manager-ca-events/6769541657129516105216232352.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.897319 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/system:dns"
I1212 13:19:01.935530 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/6769541656143224891204151388.crt"
I1212 13:19:01.935616 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.935630 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-manager-ca-main/6769541656143224891204151388.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.938966 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/6769541657705913373071748751.crt"
I1212 13:19:01.939003 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:01.939014 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/etcd-clients-ca/6769541657705913373071748751.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:01.983260 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:01.983514 402540 keypair.go:230] created certificate with cn=etcd-peers-ca-events
I1212 13:19:02.012805 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-events/6769541657129516105216232352.crt"
I1212 13:19:02.036724 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-manager-ca-main/6769541656143224891204151388.crt"
I1212 13:19:02.041866 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/etcd-clients-ca/6769541657705913373071748751.crt"
I1212 13:19:02.044222 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/6769541655739911076839554713.crt"
I1212 13:19:02.100371 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:02.100836 402540 keypair.go:230] created certificate with cn=etcd-manager-ca-events
I1212 13:19:02.126421 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:02.126729 402540 keypair.go:230] created certificate with cn=etcd-manager-ca-main
I1212 13:19:02.129050 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:02.129184 402540 keypair.go:230] created certificate with cn=apiserver-aggregator-ca
I1212 13:19:02.130014 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:02.130135 402540 keypair.go:230] created certificate with cn=etcd-clients-ca
I1212 13:19:02.130187 402540 executor.go:103] Tasks: 44 done / 86 total; 24 can run
I1212 13:19:02.130263 402540 executor.go:178] Executing task "Keypair/kubelet": *fitasks.Keypair {"Name":"kubelet","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:nodes,cn=kubelet","type":"client","format":"v1alpha2"}
I1212 13:19:02.130456 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml"
I1212 13:19:02.131009 402540 executor.go:178] Executing task "SecurityGroup/nodes.kops.domain.com": *awstasks.SecurityGroup {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:19:02.131546 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:02.131855 402540 executor.go:178] Executing task "Keypair/kube-scheduler": *fitasks.Keypair {"Name":"kube-scheduler","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-scheduler","type":"client","format":"v1alpha2"}
I1212 13:19:02.131957 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml"
I1212 13:19:02.132368 402540 executor.go:178] Executing task "MirrorKeystore/mirror-keystore": *fitasks.MirrorKeystore {"Name":"mirror-keystore","Lifecycle":null,"MirrorPath":{}}
I1212 13:19:02.132589 402540 executor.go:178] Executing task "Keypair/kube-controller-manager": *fitasks.Keypair {"Name":"kube-controller-manager","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-controller-manager","type":"client","format":"v1alpha2"}
I1212 13:19:02.132708 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml"
I1212 13:19:02.133524 402540 executor.go:178] Executing task "IAMRolePolicy/masters.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"masters.kops.domain.com","Role":{"ID":"AROASIGZOYE6FSORTVHV4","Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"kops.domain.com","creationTimestamp":"2019-12-12T13:18:38Z"},"spec":{"channel":"stable","configBase":"s3://kops-domain-com-state-store/kops.domain.com","cloudProvider":"aws","kubernetesVersion":"1.15.5","subnets":[{"name":"us-west-1a","cidr":"172.20.32.0/19","zone":"us-west-1a","type":"Public"}],"masterPublicName":"api.kops.domain.com","masterInternalName":"api.internal.kops.domain.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://kops-domain-com-state-store/kops.domain.com/secrets","keyStore":"s3://kops-domain-com-state-store/kops.domain.com/pki","configStore":"s3://kops-domain-com-state-store/kops.domain.com","dnsZone":"Z237FHI0B4E3ZX","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"100m"}],"docker":{"ipMasq":false,"ipTables":false,"logDriver":"json-file","logLevel":"warn","logOpt":["max-size=10m","max-file=5"],"storage":"overlay2,overlay,aufs","version":"18.06.3"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.15.5","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"bindAddress":"0.0.0.0","insecureBindAddress":"127.0.0.1","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.15.5","cloudProvider":"aws","clusterName":"kops.domain.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.15.5","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.15.5","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-west-1","ResourceARN":null,"Role":"Master"},"DNSZone":{"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":"kops.domain.com","ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}}}
I1212 13:19:02.134553 402540 request_logger.go:45] AWS request: iam/GetRolePolicy
I1212 13:19:02.134814 402540 executor.go:178] Executing task "Subnet/us-west-1a.kops.domain.com": *awstasks.Subnet {"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}
I1212 13:19:02.135854 402540 request_logger.go:45] AWS request: ec2/DescribeSubnets
I1212 13:19:02.136088 402540 executor.go:178] Executing task "Keypair/kubecfg": *fitasks.Keypair {"Name":"kubecfg","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:masters,cn=kubecfg","type":"client","format":"v1alpha2"}
I1212 13:19:02.136197 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml"
I1212 13:19:02.136615 402540 executor.go:178] Executing task "Keypair/kubelet-api": *fitasks.Keypair {"Name":"kubelet-api","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=kubelet-api","type":"client","format":"v1alpha2"}
I1212 13:19:02.136687 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml"
I1212 13:19:02.136955 402540 executor.go:178] Executing task "IAMInstanceProfileRole/masters.kops.domain.com": *awstasks.IAMInstanceProfileRole {"Name":"masters.kops.domain.com","Lifecycle":"Sync","InstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6MELARRFSZ","Shared":false},"Role":{"ID":"AROASIGZOYE6FSORTVHV4","Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"}}
I1212 13:19:02.137813 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1212 13:19:02.137981 402540 executor.go:178] Executing task "SecurityGroup/masters.kops.domain.com": *awstasks.SecurityGroup {"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":null,"Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:19:02.138250 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:02.138829 402540 executor.go:178] Executing task "IAMRolePolicy/additional.nodes.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.nodes.kops.domain.com","Role":{"ID":"AROASIGZOYE6EQAA42QHP","Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Name":"","Resource":""}}
I1212 13:19:02.139181 402540 request_logger.go:45] AWS request: iam/GetRolePolicy
I1212 13:19:02.139633 402540 executor.go:178] Executing task "VPCDHCPOptionsAssociation/kops.domain.com": *awstasks.VPCDHCPOptionsAssociation {"Name":"kops.domain.com","Lifecycle":"Sync","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"DHCPOptions":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"dopt-01319dcd27f03a4e7","DomainName":"us-west-1.compute.internal","DomainNameServers":"AmazonProvidedDNS","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}}
I1212 13:19:02.139871 402540 aws_cloud.go:1141] Calling DescribeVPC for VPC "vpc-00d891ddc03f86a0d"
I1212 13:19:02.140010 402540 request_logger.go:45] AWS request: ec2/DescribeVpcs
I1212 13:19:02.140131 402540 executor.go:178] Executing task "Keypair/kube-proxy": *fitasks.Keypair {"Name":"kube-proxy","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=system:kube-proxy","type":"client","format":"v1alpha2"}
I1212 13:19:02.140217 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml"
I1212 13:19:02.140749 402540 executor.go:178] Executing task "IAMInstanceProfileRole/nodes.kops.domain.com": *awstasks.IAMInstanceProfileRole {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","InstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6M4L7A7DKZ","Shared":false},"Role":{"ID":"AROASIGZOYE6EQAA42QHP","Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"}}
I1212 13:19:02.141020 402540 request_logger.go:45] AWS request: iam/GetInstanceProfile
I1212 13:19:02.141142 402540 executor.go:178] Executing task "Keypair/master": *fitasks.Keypair {"Name":"master","alternateNames":["kubernetes","kubernetes.default","kubernetes.default.svc","kubernetes.default.svc.cluster.local","api.kops.domain.com","api.internal.kops.domain.com","100.64.0.1","127.0.0.1"],"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=kubernetes-master","type":"server","format":"v1alpha2"}
I1212 13:19:02.141233 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml"
I1212 13:19:02.141689 402540 executor.go:178] Executing task "MirrorSecrets/mirror-secrets": *fitasks.MirrorSecrets {"Name":"mirror-secrets","Lifecycle":null,"MirrorPath":{}}
I1212 13:19:02.141894 402540 executor.go:178] Executing task "InternetGateway/kops.domain.com": *awstasks.InternetGateway {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}
I1212 13:19:02.142273 402540 request_logger.go:45] AWS request: ec2/DescribeInternetGateways
I1212 13:19:02.142394 402540 executor.go:178] Executing task "IAMRolePolicy/nodes.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"nodes.kops.domain.com","Role":{"ID":"AROASIGZOYE6EQAA42QHP","Lifecycle":"Sync","Name":"nodes.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"kops.domain.com","creationTimestamp":"2019-12-12T13:18:38Z"},"spec":{"channel":"stable","configBase":"s3://kops-domain-com-state-store/kops.domain.com","cloudProvider":"aws","kubernetesVersion":"1.15.5","subnets":[{"name":"us-west-1a","cidr":"172.20.32.0/19","zone":"us-west-1a","type":"Public"}],"masterPublicName":"api.kops.domain.com","masterInternalName":"api.internal.kops.domain.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"s3://kops-domain-com-state-store/kops.domain.com/secrets","keyStore":"s3://kops-domain-com-state-store/kops.domain.com/pki","configStore":"s3://kops-domain-com-state-store/kops.domain.com","dnsZone":"Z237FHI0B4E3ZX","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/main"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"200m"},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-west-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.3.10","backups":{"backupStore":"s3://kops-domain-com-state-store/kops.domain.com/backups/etcd/events"},"manager":{},"memoryRequest":"100Mi","cpuRequest":"100m"}],"docker":{"ipMasq":false,"ipTables":false,"logDriver":"json-file","logLevel":"warn","logOpt":["max-size=10m","max-file=5"],"storage":"overlay2,overlay,aufs","version":"18.06.3"},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi"},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.15.5","logLevel":2,"cloudProvider":"aws","securePort":443,"insecurePort":8080,"bindAddress":"0.0.0.0","insecureBindAddress":"127.0.0.1","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["http://127.0.0.1:4001"],"etcdServersOverrides":["/events#http://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"RBAC","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.15.5","cloudProvider":"aws","clusterName":"kops.domain.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":true,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.15.5","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.15.5","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","podInfraContainerImage":"k8s.gcr.io/pause-amd64:3.0","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"kubenet","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","networkPluginMTU":9001,"evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","featureGates":{"ExperimentalCriticalPodAnnotation":"true"}},"networking":{"kubenet":{}},"api":{"dns":{}},"authorization":{"rbac":{}},"iam":{"legacy":false,"allowContainerRegistry":true}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-west-1","ResourceARN":null,"Role":"Node"},"DNSZone":{"Name":"Z237FHI0B4E3ZX","Lifecycle":"Sync","DNSName":"kops.domain.com","ZoneID":"Z237FHI0B4E3ZX","Private":null,"PrivateVPC":null}}}
I1212 13:19:02.143049 402540 request_logger.go:45] AWS request: iam/GetRolePolicy
I1212 13:19:02.143170 402540 executor.go:178] Executing task "RouteTable/kops.domain.com": *awstasks.RouteTable {"Name":"kops.domain.com","Lifecycle":"Sync","ID":null,"VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}}
I1212 13:19:02.143490 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1212 13:19:02.143627 402540 executor.go:178] Executing task "Keypair/apiserver-aggregator": *fitasks.Keypair {"Name":"apiserver-aggregator","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"apiserver-aggregator-ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=apiserver-aggregator-ca","type":"ca","format":"v1alpha2"},"subject":"cn=aggregator","type":"client","format":"v1alpha2"}
I1212 13:19:02.143749 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml"
I1212 13:19:02.144238 402540 executor.go:178] Executing task "IAMRolePolicy/additional.masters.kops.domain.com": *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"additional.masters.kops.domain.com","Role":{"ID":"AROASIGZOYE6FSORTVHV4","Lifecycle":"Sync","Name":"masters.kops.domain.com","RolePolicyDocument":{"Name":"","Resource":{}},"ExportWithID":"masters"},"PolicyDocument":{"Name":"","Resource":""}}
I1212 13:19:02.144432 402540 request_logger.go:45] AWS request: iam/GetRolePolicy
I1212 13:19:02.144591 402540 executor.go:178] Executing task "Keypair/kops": *fitasks.Keypair {"Name":"kops","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"o=system:masters,cn=kops","type":"client","format":"v1alpha2"}
I1212 13:19:02.144672 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml"
I1212 13:19:02.145204 402540 executor.go:178] Executing task "Keypair/apiserver-proxy-client": *fitasks.Keypair {"Name":"apiserver-proxy-client","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":{"Name":"ca","alternateNames":null,"alternateNameTasks":null,"Lifecycle":"Sync","Signer":null,"subject":"cn=kubernetes","type":"ca","format":"v1alpha2"},"subject":"cn=apiserver-proxy-client","type":"client","format":"v1alpha2"}
I1212 13:19:02.145298 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml"
I1212 13:19:02.215124 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml", falling back to directory-list method
I1212 13:19:02.215181 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-scheduler/"
I1212 13:19:02.217176 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml", falling back to directory-list method
I1212 13:19:02.217215 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet/"
I1212 13:19:02.242115 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.242164 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.242205 402540 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.242806 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.242826 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.242881 402540 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.243206 402540 iamrolepolicy.go:147] Creating IAMRolePolicy
I1212 13:19:02.243220 402540 iamrolepolicy.go:175] PutRolePolicy RoleName=masters.kops.domain.com PolicyName=masters.kops.domain.com: {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:DescribeAccountAttributes",
"ec2:DescribeInstances",
"ec2:DescribeInternetGateways",
"ec2:DescribeRegions",
"ec2:DescribeRouteTables",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVolumes"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"ec2:CreateSecurityGroup",
"ec2:CreateTags",
"ec2:CreateVolume",
"ec2:DescribeVolumesModifications",
"ec2:ModifyInstanceAttribute",
"ec2:ModifyVolume"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"ec2:AttachVolume",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:CreateRoute",
"ec2:DeleteRoute",
"ec2:DeleteSecurityGroup",
"ec2:DeleteVolume",
"ec2:DetachVolume",
"ec2:RevokeSecurityGroupIngress"
],
"Resource": [
"*"
],
"Condition": {
"StringEquals": {
"ec2:ResourceTag/KubernetesCluster": "kops.domain.com"
}
}
},
{
"Effect": "Allow",
"Action": [
"autoscaling:DescribeAutoScalingGroups",
"autoscaling:DescribeLaunchConfigurations",
"autoscaling:DescribeTags",
"ec2:DescribeLaunchTemplateVersions"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"autoscaling:SetDesiredCapacity",
"autoscaling:TerminateInstanceInAutoScalingGroup",
"autoscaling:UpdateAutoScalingGroup"
],
"Resource": [
"*"
],
"Condition": {
"StringEquals": {
"autoscaling:ResourceTag/KubernetesCluster": "kops.domain.com"
}
}
},
{
"Effect": "Allow",
"Action": [
"elasticloadbalancing:AddTags",
"elasticloadbalancing:AttachLoadBalancerToSubnets",
"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer",
"elasticloadbalancing:CreateLoadBalancer",
"elasticloadbalancing:CreateLoadBalancerPolicy",
"elasticloadbalancing:CreateLoadBalancerListeners",
"elasticloadbalancing:ConfigureHealthCheck",
"elasticloadbalancing:DeleteLoadBalancer",
"elasticloadbalancing:DeleteLoadBalancerListeners",
"elasticloadbalancing:DescribeLoadBalancers",
"elasticloadbalancing:DescribeLoadBalancerAttributes",
"elasticloadbalancing:DetachLoadBalancerFromSubnets",
"elasticloadbalancing:DeregisterInstancesFromLoadBalancer",
"elasticloadbalancing:ModifyLoadBalancerAttributes",
"elasticloadbalancing:RegisterInstancesWithLoadBalancer",
"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"ec2:DescribeVpcs",
"elasticloadbalancing:AddTags",
"elasticloadbalancing:CreateListener",
"elasticloadbalancing:CreateTargetGroup",
"elasticloadbalancing:DeleteListener",
"elasticloadbalancing:DeleteTargetGroup",
"elasticloadbalancing:DeregisterTargets",
"elasticloadbalancing:DescribeListeners",
"elasticloadbalancing:DescribeLoadBalancerPolicies",
"elasticloadbalancing:DescribeTargetGroups",
"elasticloadbalancing:DescribeTargetHealth",
"elasticloadbalancing:ModifyListener",
"elasticloadbalancing:ModifyTargetGroup",
"elasticloadbalancing:RegisterTargets",
"elasticloadbalancing:SetLoadBalancerPoliciesOfListener"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"iam:ListServerCertificates",
"iam:GetServerCertificate"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:GetBucketLocation",
"s3:GetEncryptionConfiguration",
"s3:ListBucket"
],
"Resource": [
"arn:aws:s3:::kops-domain-com-state-store"
]
},
{
"Effect": "Allow",
"Action": [
"s3:Get*"
],
"Resource": "arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/*"
},
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:DeleteObject",
"s3:PutObject"
],
"Resource": "arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/backups/etcd/main/*"
},
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:DeleteObject",
"s3:PutObject"
],
"Resource": "arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/backups/etcd/events/*"
},
{
"Effect": "Allow",
"Action": [
"route53:ChangeResourceRecordSets",
"route53:ListResourceRecordSets",
"route53:GetHostedZone"
],
"Resource": [
"arn:aws:route53:::hostedzone/Z237FHI0B4E3ZX"
]
},
{
"Effect": "Allow",
"Action": [
"route53:GetChange"
],
"Resource": [
"arn:aws:route53:::change/*"
]
},
{
"Effect": "Allow",
"Action": [
"route53:ListHostedZones"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"ecr:GetAuthorizationToken",
"ecr:BatchCheckLayerAvailability",
"ecr:GetDownloadUrlForLayer",
"ecr:GetRepositoryPolicy",
"ecr:DescribeRepositories",
"ecr:ListImages",
"ecr:BatchGetImage"
],
"Resource": [
"*"
]
}
]
}
I1212 13:19:02.243623 402540 request_logger.go:45] AWS request: iam/PutRolePolicy
I1212 13:19:02.262235 402540 request_logger.go:45] AWS request: iam/AddRoleToInstanceProfile
I1212 13:19:02.301161 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml", falling back to directory-list method
I1212 13:19:02.301281 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-controller-manager/"
I1212 13:19:02.302999 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml", falling back to directory-list method
I1212 13:19:02.303033 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubecfg/"
I1212 13:19:02.373226 402540 request_logger.go:45] AWS request: iam/AddRoleToInstanceProfile
I1212 13:19:02.384229 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml", falling back to directory-list method
I1212 13:19:02.384319 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet-api/"
I1212 13:19:02.387830 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml", falling back to directory-list method
I1212 13:19:02.387858 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-proxy/"
I1212 13:19:02.404448 402540 securitygroup.go:166] Creating SecurityGroup with Name:"nodes.kops.domain.com" VPC:"vpc-00d891ddc03f86a0d"
I1212 13:19:02.404656 402540 request_logger.go:45] AWS request: ec2/CreateSecurityGroup
I1212 13:19:02.429182 402540 subnet.go:181] Creating Subnet with CIDR: "172.20.32.0/19"
I1212 13:19:02.429367 402540 request_logger.go:45] AWS request: ec2/CreateSubnet
I1212 13:19:02.462828 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.462872 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.462948 402540 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.463296 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/pki/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.463344 402540 iam_builder.go:302] Ignoring location "s3://kops-domain-com-state-store/kops.domain.com/secrets/" because found parent "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.463402 402540 iam_builder.go:307] Found root location "s3://kops-domain-com-state-store/kops.domain.com/"
I1212 13:19:02.463706 402540 iamrolepolicy.go:147] Creating IAMRolePolicy
I1212 13:19:02.463730 402540 iamrolepolicy.go:175] PutRolePolicy RoleName=nodes.kops.domain.com PolicyName=nodes.kops.domain.com: {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:DescribeInstances",
"ec2:DescribeRegions"
],
"Resource": [
"*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:GetBucketLocation",
"s3:GetEncryptionConfiguration",
"s3:ListBucket"
],
"Resource": [
"arn:aws:s3:::kops-domain-com-state-store"
]
},
{
"Effect": "Allow",
"Action": [
"s3:Get*"
],
"Resource": [
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/addons/*",
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/cluster.spec",
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/config",
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/instancegroup/*",
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/pki/issued/*",
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/*",
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/*",
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/pki/ssh/*",
"arn:aws:s3:::kops-domain-com-state-store/kops.domain.com/secrets/dockerconfig"
]
},
{
"Effect": "Allow",
"Action": [
"ecr:GetAuthorizationToken",
"ecr:BatchCheckLayerAvailability",
"ecr:GetDownloadUrlForLayer",
"ecr:GetRepositoryPolicy",
"ecr:DescribeRepositories",
"ecr:ListImages",
"ecr:BatchGetImage"
],
"Resource": [
"*"
]
}
]
}
I1212 13:19:02.464190 402540 request_logger.go:45] AWS request: iam/PutRolePolicy
I1212 13:19:02.466969 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml", falling back to directory-list method
I1212 13:19:02.467033 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-proxy-client/"
I1212 13:19:02.467830 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml", falling back to directory-list method
I1212 13:19:02.467877 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/master/"
I1212 13:19:02.472363 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml", falling back to directory-list method
I1212 13:19:02.472420 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kops/"
I1212 13:19:02.473168 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml", falling back to directory-list method
I1212 13:19:02.473223 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator/"
I1212 13:19:02.480657 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler: []
I1212 13:19:02.480735 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml"
I1212 13:19:02.487440 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet: []
I1212 13:19:02.487550 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml"
I1212 13:19:02.490887 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager: []
I1212 13:19:02.490933 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml"
I1212 13:19:02.509203 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg: []
I1212 13:19:02.509349 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml"
I1212 13:19:02.531649 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api: []
I1212 13:19:02.531710 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml"
I1212 13:19:02.543940 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy: []
I1212 13:19:02.544079 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml"
I1212 13:19:02.558721 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master: []
I1212 13:19:02.558821 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml"
I1212 13:19:02.564586 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml", falling back to directory-list method
I1212 13:19:02.564666 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-scheduler/"
I1212 13:19:02.565634 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops: []
I1212 13:19:02.565678 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml"
I1212 13:19:02.567453 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator: []
I1212 13:19:02.567519 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml"
I1212 13:19:02.569680 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client: []
I1212 13:19:02.569755 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml"
I1212 13:19:02.572658 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml", falling back to directory-list method
I1212 13:19:02.572710 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet/"
I1212 13:19:02.575143 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml", falling back to directory-list method
I1212 13:19:02.575223 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-controller-manager/"
I1212 13:19:02.594713 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml", falling back to directory-list method
I1212 13:19:02.594812 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubecfg/"
I1212 13:19:02.597841 402540 securitygroup.go:166] Creating SecurityGroup with Name:"masters.kops.domain.com" VPC:"vpc-00d891ddc03f86a0d"
I1212 13:19:02.598161 402540 request_logger.go:45] AWS request: ec2/CreateSecurityGroup
I1212 13:19:02.616546 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml", falling back to directory-list method
I1212 13:19:02.616682 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet-api/"
I1212 13:19:02.641251 402540 changes.go:81] Field changed "DHCPOptions" actual="{<nil> <nil> 0xc0007edd08 <nil> <nil> <nil> map[]}" expected="{0xc000f3a3e0 0xc00070f1b0 0xc000e70688 0xc000f3a400 0xc000f3a3f0 0xc0000140ad map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned]}"
I1212 13:19:02.641853 402540 vpc_dhcpoptions_association.go:89] calling EC2 AssociateDhcpOptions
I1212 13:19:02.642547 402540 request_logger.go:45] AWS request: ec2/AssociateDhcpOptions
I1212 13:19:02.645042 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml", falling back to directory-list method
I1212 13:19:02.645098 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/master/"
I1212 13:19:02.648713 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml", falling back to directory-list method
I1212 13:19:02.648838 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kops/"
I1212 13:19:02.652734 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml", falling back to directory-list method
I1212 13:19:02.652814 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator/"
I1212 13:19:02.655345 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler: []
I1212 13:19:02.655667 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.655727 402540 keypair.go:201] Creating PKI keypair "kube-scheduler"
I1212 13:19:02.655759 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml"
I1212 13:19:02.660939 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml", falling back to directory-list method
I1212 13:19:02.660985 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-proxy-client/"
I1212 13:19:02.666634 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet: []
I1212 13:19:02.666861 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.666876 402540 keypair.go:201] Creating PKI keypair "kubelet"
I1212 13:19:02.666923 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml"
I1212 13:19:02.667745 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager: []
I1212 13:19:02.667873 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.667888 402540 keypair.go:201] Creating PKI keypair "kube-controller-manager"
I1212 13:19:02.667904 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml"
I1212 13:19:02.708563 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api: []
I1212 13:19:02.709050 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.709074 402540 keypair.go:201] Creating PKI keypair "kubelet-api"
I1212 13:19:02.709130 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml"
I1212 13:19:02.736302 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops: []
I1212 13:19:02.736645 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.736668 402540 keypair.go:201] Creating PKI keypair "kops"
I1212 13:19:02.736730 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml"
I1212 13:19:02.738097 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml", falling back to directory-list method
I1212 13:19:02.738149 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-scheduler/"
I1212 13:19:02.745001 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator: []
I1212 13:19:02.745428 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.745459 402540 keypair.go:201] Creating PKI keypair "apiserver-aggregator"
I1212 13:19:02.745546 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml"
I1212 13:19:02.747846 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml", falling back to directory-list method
I1212 13:19:02.747885 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-proxy/"
I1212 13:19:02.755243 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml", falling back to directory-list method
I1212 13:19:02.755314 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-controller-manager/"
I1212 13:19:02.756379 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml", falling back to directory-list method
I1212 13:19:02.756431 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet/"
I1212 13:19:02.757267 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/master: []
I1212 13:19:02.757551 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.757584 402540 keypair.go:201] Creating PKI keypair "master"
I1212 13:19:02.757618 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml"
I1212 13:19:02.758603 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg: []
I1212 13:19:02.758763 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.758789 402540 keypair.go:201] Creating PKI keypair "kubecfg"
I1212 13:19:02.758820 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml"
I1212 13:19:02.759775 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client: []
I1212 13:19:02.759924 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.759971 402540 keypair.go:201] Creating PKI keypair "apiserver-proxy-client"
I1212 13:19:02.760004 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml"
I1212 13:19:02.781057 402540 internetgateway.go:150] Creating InternetGateway
I1212 13:19:02.781338 402540 request_logger.go:45] AWS request: ec2/CreateInternetGateway
I1212 13:19:02.799638 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1212 13:19:02.809005 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml", falling back to directory-list method
I1212 13:19:02.809094 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet-api/"
I1212 13:19:02.819537 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml", falling back to directory-list method
I1212 13:19:02.819578 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kops/"
I1212 13:19:02.828040 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler: []
I1212 13:19:02.828087 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml"
I1212 13:19:02.830931 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml", falling back to directory-list method
I1212 13:19:02.831001 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator/"
I1212 13:19:02.832513 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:19:02.844707 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml", falling back to directory-list method
I1212 13:19:02.844819 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-proxy-client/"
I1212 13:19:02.846434 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml", falling back to directory-list method
I1212 13:19:02.846601 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubecfg/"
I1212 13:19:02.848106 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager: []
I1212 13:19:02.848174 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml"
I1212 13:19:02.849191 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet: []
I1212 13:19:02.849225 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml"
I1212 13:19:02.855070 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy: []
I1212 13:19:02.855213 402540 keypair.go:181] creating brand new certificate
I1212 13:19:02.855224 402540 keypair.go:201] Creating PKI keypair "kube-proxy"
I1212 13:19:02.855242 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml"
I1212 13:19:02.859252 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml", falling back to directory-list method
I1212 13:19:02.859344 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/master/"
I1212 13:19:02.908937 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml", falling back to directory-list method
I1212 13:19:02.908991 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-scheduler/"
I1212 13:19:02.910270 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops: []
I1212 13:19:02.910297 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml"
I1212 13:19:02.917480 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api: []
I1212 13:19:02.917704 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml"
I1212 13:19:02.932069 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:19:02.934421 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml", falling back to directory-list method
I1212 13:19:02.934591 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet/"
I1212 13:19:02.940164 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg: []
I1212 13:19:02.940244 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml"
I1212 13:19:02.943542 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client: []
I1212 13:19:02.943587 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml"
I1212 13:19:02.949654 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml", falling back to directory-list method
I1212 13:19:02.949720 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-controller-manager/"
I1212 13:19:02.955070 402540 vfs_castore.go:377] no certificate bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml", falling back to directory-list method
I1212 13:19:02.955132 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-proxy/"
I1212 13:19:02.958794 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:19:02.959896 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator: []
I1212 13:19:02.959998 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml"
I1212 13:19:02.969242 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master: []
I1212 13:19:02.969344 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml"
I1212 13:19:02.975871 402540 internetgateway.go:163] Creating InternetGatewayAttachment
I1212 13:19:02.976156 402540 request_logger.go:45] AWS request: ec2/AttachInternetGateway
I1212 13:19:02.997448 402540 routetable.go:174] Creating RouteTable with VPC: "vpc-00d891ddc03f86a0d"
I1212 13:19:02.997771 402540 request_logger.go:45] AWS request: ec2/CreateRouteTable
I1212 13:19:03.000833 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml", falling back to directory-list method
I1212 13:19:03.000865 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kops/"
I1212 13:19:03.010294 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler: []
I1212 13:19:03.010332 402540 keypair.go:212] Creating privateKey "kube-scheduler"
I1212 13:19:03.025533 402540 aws_cloud.go:885] adding tags to "sg-09a4e42acee69cf69": map[KubernetesCluster:kops.domain.com Name:nodes.kops.domain.com kubernetes.io/cluster/kops.domain.com:owned]
I1212 13:19:03.025695 402540 request_logger.go:45] AWS request: ec2/CreateTags
I1212 13:19:03.045601 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml", falling back to directory-list method
I1212 13:19:03.045647 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet-api/"
I1212 13:19:03.046232 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml", falling back to directory-list method
I1212 13:19:03.046262 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-proxy-client/"
I1212 13:19:03.046722 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet: []
I1212 13:19:03.046753 402540 keypair.go:212] Creating privateKey "kubelet"
I1212 13:19:03.085872 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml", falling back to directory-list method
I1212 13:19:03.085923 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubecfg/"
I1212 13:19:03.086449 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager: []
I1212 13:19:03.086474 402540 keypair.go:212] Creating privateKey "kube-controller-manager"
I1212 13:19:03.110339 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml", falling back to directory-list method
I1212 13:19:03.110383 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator/"
I1212 13:19:03.133392 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml", falling back to directory-list method
I1212 13:19:03.133435 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/master/"
I1212 13:19:03.134023 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy: []
I1212 13:19:03.134051 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml"
I1212 13:19:03.134636 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops: []
I1212 13:19:03.134670 402540 keypair.go:212] Creating privateKey "kops"
I1212 13:19:03.267542 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api: []
I1212 13:19:03.267617 402540 keypair.go:212] Creating privateKey "kubelet-api"
I1212 13:19:03.287619 402540 aws_cloud.go:885] adding tags to "sg-0bcdeb6125f89caf9": map[KubernetesCluster:kops.domain.com Name:masters.kops.domain.com kubernetes.io/cluster/kops.domain.com:owned]
I1212 13:19:03.287814 402540 request_logger.go:45] AWS request: ec2/CreateTags
I1212 13:19:03.288131 402540 aws_cloud.go:885] adding tags to "subnet-0983b865b14b444b8": map[KubernetesCluster:kops.domain.com Name:us-west-1a.kops.domain.com SubnetType:Public kubernetes.io/cluster/kops.domain.com:owned kubernetes.io/role/elb:1]
I1212 13:19:03.288290 402540 request_logger.go:45] AWS request: ec2/CreateTags
I1212 13:19:03.288545 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client: []
I1212 13:19:03.288573 402540 keypair.go:212] Creating privateKey "apiserver-proxy-client"
I1212 13:19:03.307785 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg: []
I1212 13:19:03.307832 402540 keypair.go:212] Creating privateKey "kubecfg"
I1212 13:19:03.328153 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:19:03.368795 402540 request_logger.go:45] AWS request: ec2/DescribeTags
I1212 13:19:03.369155 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:03.469034 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator: []
I1212 13:19:03.469100 402540 keypair.go:212] Creating privateKey "apiserver-aggregator"
I1212 13:19:03.489121 402540 vfs_castore.go:831] no private key bundle "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml", falling back to directory-list method
I1212 13:19:03.489168 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-proxy/"
I1212 13:19:03.489538 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/master: []
I1212 13:19:03.489560 402540 keypair.go:212] Creating privateKey "master"
I1212 13:19:03.690963 402540 aws_cloud.go:885] adding tags to "igw-07bae7926bd7529c8": map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned]
I1212 13:19:03.691228 402540 request_logger.go:45] AWS request: ec2/CreateTags
I1212 13:19:03.691733 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:03.751592 402540 aws_cloud.go:885] adding tags to "rtb-0e6dbc1103ce3e440": map[KubernetesCluster:kops.domain.com Name:kops.domain.com kubernetes.io/cluster/kops.domain.com:owned kubernetes.io/kops/role:public]
I1212 13:19:03.751991 402540 request_logger.go:45] AWS request: ec2/CreateTags
I1212 13:19:03.771858 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy: []
I1212 13:19:03.771965 402540 keypair.go:212] Creating privateKey "kube-proxy"
I1212 13:19:04.143669 402540 vfs_castore.go:729] Issuing new certificate: "kubelet"
I1212 13:19:04.143757 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:19:04.398338 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:04.398480 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca/keyset.yaml"
I1212 13:19:04.660302 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:04.660432 402540 privatekey.go:176] Parsing pem block: "RSA PRIVATE KEY"
I1212 13:19:04.664210 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet/"
I1212 13:19:04.717655 402540 vfs_castore.go:729] Issuing new certificate: "kops"
I1212 13:19:04.756752 402540 vfs_castore.go:729] Issuing new certificate: "kube-controller-manager"
I1212 13:19:04.827626 402540 vfs_castore.go:729] Issuing new certificate: "apiserver-aggregator"
I1212 13:19:04.827716 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator-ca/keyset.yaml"
I1212 13:19:04.861980 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kops/"
I1212 13:19:04.882488 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-controller-manager/"
I1212 13:19:04.883281 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet: []
I1212 13:19:04.886377 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/keyset.yaml"
I1212 13:19:04.886429 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:04.886460 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubelet/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.023518 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:05.023743 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator-ca/keyset.yaml"
I1212 13:19:05.163519 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops: []
I1212 13:19:05.164264 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/keyset.yaml"
I1212 13:19:05.164292 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.164298 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kops/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.284298 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager: []
I1212 13:19:05.285692 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/keyset.yaml"
I1212 13:19:05.285727 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.285734 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-controller-manager/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.405841 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet/6769541669466771258327439188.key"
I1212 13:19:05.405902 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.405913 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubelet/6769541669466771258327439188.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.465941 402540 vfs_castore.go:729] Issuing new certificate: "kube-scheduler"
I1212 13:19:05.527185 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:05.527315 402540 privatekey.go:176] Parsing pem block: "RSA PRIVATE KEY"
I1212 13:19:05.530278 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-aggregator/"
I1212 13:19:05.569953 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-scheduler/"
I1212 13:19:05.608127 402540 vfs_castore.go:729] Issuing new certificate: "apiserver-proxy-client"
I1212 13:19:05.612271 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/apiserver-proxy-client/"
I1212 13:19:05.655477 402540 vfs_castore.go:729] Issuing new certificate: "kube-proxy"
I1212 13:19:05.658541 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kube-proxy/"
I1212 13:19:05.677894 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kops/6769541671932010421461147177.key"
I1212 13:19:05.677957 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.677969 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kops/6769541671932010421461147177.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.691173 402540 vfs_castore.go:729] Issuing new certificate: "kubecfg"
I1212 13:19:05.696018 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubecfg/"
I1212 13:19:05.749826 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-controller-manager/6769541672099937720780501164.key"
I1212 13:19:05.749878 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.749890 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-controller-manager/6769541672099937720780501164.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.829136 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler: []
I1212 13:19:05.830317 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/keyset.yaml"
I1212 13:19:05.830352 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.830359 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-scheduler/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.850326 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator: []
I1212 13:19:05.851075 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml"
I1212 13:19:05.851107 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.851113 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-aggregator/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.869068 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet/"
I1212 13:19:05.889161 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client: []
I1212 13:19:05.889910 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml"
I1212 13:19:05.889940 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.889946 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-proxy-client/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.890606 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy: []
I1212 13:19:05.891237 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/keyset.yaml"
I1212 13:19:05.891261 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.891267 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-proxy/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:05.909192 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kops/"
I1212 13:19:05.910886 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg: []
I1212 13:19:05.911654 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml"
I1212 13:19:05.911680 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:05.911687 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubecfg/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.040868 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-controller-manager/"
I1212 13:19:06.041353 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet: []
I1212 13:19:06.041804 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/keyset.yaml"
I1212 13:19:06.041829 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.041836 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubelet/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.042234 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-scheduler/6769541675145900126169095292.key"
I1212 13:19:06.042257 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.042264 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-scheduler/6769541675145900126169095292.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.042778 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-aggregator/6769541672404374377566517953.key"
I1212 13:19:06.042802 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.042808 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-aggregator/6769541672404374377566517953.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.044546 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/apiserver-proxy-client/6769541675756591883495708598.key"
I1212 13:19:06.044572 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.044606 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/apiserver-proxy-client/6769541675756591883495708598.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.044927 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops: []
I1212 13:19:06.045372 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/keyset.yaml"
I1212 13:19:06.045405 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.045412 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kops/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.061576 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kube-proxy/6769541675959971151074991162.key"
I1212 13:19:06.061619 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.061654 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kube-proxy/6769541675959971151074991162.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.062256 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/6769541676113238367628490963.key"
I1212 13:19:06.062289 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.062299 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubecfg/6769541676113238367628490963.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.144231 402540 vfs_castore.go:729] Issuing new certificate: "master"
I1212 13:19:06.147484 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/master/"
I1212 13:19:06.148098 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager: []
I1212 13:19:06.148549 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml"
I1212 13:19:06.148603 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.148612 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-controller-manager/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.161802 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/6769541669466771258327439188.crt"
I1212 13:19:06.161845 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.161852 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubelet/6769541669466771258327439188.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.202267 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-proxy-client/"
I1212 13:19:06.203454 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubecfg/"
I1212 13:19:06.203963 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/apiserver-aggregator/"
I1212 13:19:06.222235 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-scheduler/"
I1212 13:19:06.242374 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kube-proxy/"
I1212 13:19:06.242806 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/6769541671932010421461147177.crt"
I1212 13:19:06.242832 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.242838 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kops/6769541671932010421461147177.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.243305 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/master: []
I1212 13:19:06.244108 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/keyset.yaml"
I1212 13:19:06.244133 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.244139 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/master/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.262641 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/6769541672099937720780501164.crt"
I1212 13:19:06.262688 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.262695 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-controller-manager/6769541672099937720780501164.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.277015 402540 vfs_castore.go:729] Issuing new certificate: "kubelet-api"
I1212 13:19:06.280307 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/private/kubelet-api/"
I1212 13:19:06.296570 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg: []
I1212 13:19:06.297133 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml"
I1212 13:19:06.297159 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.297165 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubecfg/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.297842 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client: []
I1212 13:19:06.298286 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml"
I1212 13:19:06.298324 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.298332 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-proxy-client/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.298824 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet/6769541669466771258327439188.crt"
I1212 13:19:06.325278 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler: []
I1212 13:19:06.327539 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/keyset.yaml"
I1212 13:19:06.327642 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.327665 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-scheduler/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.334649 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy: []
I1212 13:19:06.336652 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/keyset.yaml"
I1212 13:19:06.336732 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.336750 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-proxy/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.340768 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator: []
I1212 13:19:06.342752 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml"
I1212 13:19:06.342828 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.342866 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-aggregator/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.374139 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api: []
I1212 13:19:06.378198 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/keyset.yaml"
I1212 13:19:06.378290 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.378308 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubelet-api/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.379188 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kops/6769541671932010421461147177.crt"
I1212 13:19:06.389714 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/master/6769541678059162718412253036.key"
I1212 13:19:06.389804 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.389822 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/master/6769541678059162718412253036.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.394629 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.395034 402540 keypair.go:230] created certificate with cn=kubelet
I1212 13:19:06.402910 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-controller-manager/6769541672099937720780501164.crt"
I1212 13:19:06.424554 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/6769541676113238367628490963.crt"
I1212 13:19:06.424733 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.424758 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubecfg/6769541676113238367628490963.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.435134 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/6769541675145900126169095292.crt"
I1212 13:19:06.435225 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.435242 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-scheduler/6769541675145900126169095292.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.444396 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/6769541675959971151074991162.crt"
I1212 13:19:06.444460 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.444467 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kube-proxy/6769541675959971151074991162.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.454869 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/6769541675756591883495708598.crt"
I1212 13:19:06.454961 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.454978 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-proxy-client/6769541675756591883495708598.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.466875 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/6769541672404374377566517953.crt"
I1212 13:19:06.466986 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.467034 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/apiserver-aggregator/6769541672404374377566517953.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.469130 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.469368 402540 keypair.go:230] created certificate with cn=kops
I1212 13:19:06.488298 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubelet-api/6769541678629452970774058756.key"
I1212 13:19:06.488362 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.488379 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/private/kubelet-api/6769541678629452970774058756.key" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.496535 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.496940 402540 keypair.go:230] created certificate with cn=system:kube-controller-manager
I1212 13:19:06.550272 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/6769541676113238367628490963.crt"
I1212 13:19:06.555170 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-scheduler/6769541675145900126169095292.crt"
I1212 13:19:06.560798 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/master/"
I1212 13:19:06.561313 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-proxy-client/6769541675756591883495708598.crt"
I1212 13:19:06.602017 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/apiserver-aggregator/6769541672404374377566517953.crt"
I1212 13:19:06.639980 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kube-proxy/6769541675959971151074991162.crt"
I1212 13:19:06.642406 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.642650 402540 keypair.go:230] created certificate with cn=kubecfg
I1212 13:19:06.644000 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.644139 402540 keypair.go:230] created certificate with cn=system:kube-scheduler
I1212 13:19:06.644380 402540 s3fs.go:257] Listing objects in S3 bucket "kops-domain-com-state-store" with prefix "kops.domain.com/pki/issued/kubelet-api/"
I1212 13:19:06.650878 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.651040 402540 keypair.go:230] created certificate with cn=apiserver-proxy-client
I1212 13:19:06.653064 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master: []
I1212 13:19:06.653773 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/keyset.yaml"
I1212 13:19:06.653818 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.653839 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/master/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.694816 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.695270 402540 keypair.go:230] created certificate with cn=aggregator
I1212 13:19:06.732763 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.733115 402540 keypair.go:230] created certificate with cn=system:kube-proxy
I1212 13:19:06.749700 402540 s3fs.go:285] Listed files in s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api: []
I1212 13:19:06.751918 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/keyset.yaml"
I1212 13:19:06.752007 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.752025 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubelet-api/keyset.yaml" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.776922 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/6769541678059162718412253036.crt"
I1212 13:19:06.777030 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.777040 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/master/6769541678059162718412253036.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.885397 402540 s3fs.go:128] Writing file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/6769541678629452970774058756.crt"
I1212 13:19:06.885485 402540 s3fs.go:154] Using KOPS_STATE_S3_ACL=bucket-owner-full-control
I1212 13:19:06.885534 402540 s3fs.go:166] Calling S3 PutObject Bucket="kops-domain-com-state-store" Key="kops.domain.com/pki/issued/kubelet-api/6769541678629452970774058756.crt" SSE="DefaultBucketEncryption" ACL="bucket-owner-full-control"
I1212 13:19:06.905840 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/master/6769541678059162718412253036.crt"
I1212 13:19:06.996059 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:06.996248 402540 keypair.go:230] created certificate with cn=kubernetes-master
I1212 13:19:07.029865 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubelet-api/6769541678629452970774058756.crt"
I1212 13:19:07.117555 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:07.117743 402540 keypair.go:230] created certificate with cn=kubelet-api
I1212 13:19:07.117785 402540 executor.go:103] Tasks: 68 done / 86 total; 16 can run
I1212 13:19:07.117837 402540 executor.go:178] Executing task "Route/0.0.0.0/0": *awstasks.Route {"Name":"0.0.0.0/0","Lifecycle":"Sync","RouteTable":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"rtb-0e6dbc1103ce3e440","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}},"Instance":null,"CIDR":"0.0.0.0/0","InternetGateway":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"igw-07bae7926bd7529c8","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"NatGateway":null}
I1212 13:19:07.118287 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1212 13:19:07.118549 402540 executor.go:178] Executing task "SecurityGroupRule/all-node-to-node": *awstasks.SecurityGroupRule {"Name":"all-node-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:19:07.118799 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.118943 402540 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-1-2379": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-1-2379","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":1,"ToPort":2379,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:19:07.119142 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.119477 402540 executor.go:178] Executing task "LaunchConfiguration/master-us-west-1a.masters.kops.domain.com": *awstasks.LaunchConfiguration {"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6MELARRFSZ","Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"m3.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":64,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}}
I1212 13:19:07.119859 402540 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1212 13:19:07.120067 402540 executor.go:178] Executing task "SecurityGroupRule/node-egress": *awstasks.SecurityGroupRule {"Name":"node-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true}
I1212 13:19:07.120261 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.120321 402540 executor.go:178] Executing task "SecurityGroupRule/node-to-master-udp-1-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-udp-1-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"udp","FromPort":1,"ToPort":65535,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:19:07.120493 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.120930 402540 executor.go:178] Executing task "SecurityGroupRule/all-master-to-node": *awstasks.SecurityGroupRule {"Name":"all-master-to-node","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:19:07.121103 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.121173 402540 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-2382-4000": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-2382-4000","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":2382,"ToPort":4000,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:19:07.121315 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.121387 402540 executor.go:178] Executing task "RouteTableAssociation/us-west-1a.kops.domain.com": *awstasks.RouteTableAssociation {"Name":"us-west-1a.kops.domain.com","Lifecycle":"Sync","ID":null,"RouteTable":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"rtb-0e6dbc1103ce3e440","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/kops/role":"public"}},"Subnet":{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":"subnet-0983b865b14b444b8","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}}
I1212 13:19:07.121617 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1212 13:19:07.121690 402540 executor.go:178] Executing task "SecurityGroupRule/ssh-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null}
I1212 13:19:07.121819 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.121898 402540 executor.go:178] Executing task "SecurityGroupRule/all-master-to-master": *awstasks.SecurityGroupRule {"Name":"all-master-to-master","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:19:07.122040 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.122091 402540 executor.go:178] Executing task "SecurityGroupRule/ssh-external-to-node-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"ssh-external-to-node-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":22,"ToPort":22,"SourceGroup":null,"Egress":null}
I1212 13:19:07.122193 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.122399 402540 executor.go:178] Executing task "SecurityGroupRule/master-egress": *awstasks.SecurityGroupRule {"Name":"master-egress","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":null,"FromPort":null,"ToPort":null,"SourceGroup":null,"Egress":true}
I1212 13:19:07.122549 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.122614 402540 executor.go:178] Executing task "SecurityGroupRule/node-to-master-tcp-4003-65535": *awstasks.SecurityGroupRule {"Name":"node-to-master-tcp-4003-65535","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":null,"Protocol":"tcp","FromPort":4003,"ToPort":65535,"SourceGroup":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"Egress":null}
I1212 13:19:07.122772 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.122824 402540 executor.go:178] Executing task "SecurityGroupRule/https-external-to-master-0.0.0.0/0": *awstasks.SecurityGroupRule {"Name":"https-external-to-master-0.0.0.0/0","Lifecycle":"Sync","SecurityGroup":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"CIDR":"0.0.0.0/0","Protocol":"tcp","FromPort":443,"ToPort":443,"SourceGroup":null,"Egress":null}
I1212 13:19:07.122932 402540 request_logger.go:45] AWS request: ec2/DescribeSecurityGroups
I1212 13:19:07.122980 402540 executor.go:178] Executing task "LaunchConfiguration/nodes.kops.domain.com": *awstasks.LaunchConfiguration {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6M4L7A7DKZ","Shared":false},"ID":null,"ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"t2.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":128,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}}
I1212 13:19:07.123114 402540 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1212 13:19:07.319175 402540 route.go:174] Creating Route with RouteTable:"rtb-0e6dbc1103ce3e440" CIDR:"0.0.0.0/0"
I1212 13:19:07.319373 402540 request_logger.go:45] AWS request: ec2/CreateRoute
I1212 13:19:07.346236 402540 securitygrouprule.go:278] all-node-to-node: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-09a4e42acee69cf69)
I1212 13:19:07.346434 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.508897 402540 securitygrouprule.go:278] node-to-master-tcp-1-2379: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=1 toPort=2379 sourceGroup=sg-09a4e42acee69cf69)
I1212 13:19:07.509113 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.703832 402540 securitygrouprule.go:278] node-to-master-udp-1-65535: Calling EC2 AuthorizeSecurityGroupIngress (protocol=udp fromPort=1 toPort=65535 sourceGroup=sg-09a4e42acee69cf69)
I1212 13:19:07.704077 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.741945 402540 securitygrouprule.go:278] all-master-to-node: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-0bcdeb6125f89caf9)
I1212 13:19:07.742294 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.756263 402540 securitygrouprule.go:278] node-to-master-tcp-2382-4000: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=2382 toPort=4000 sourceGroup=sg-09a4e42acee69cf69)
I1212 13:19:07.756686 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.758113 402540 launchconfiguration.go:269] Creating AutoscalingLaunchConfiguration with Name:"master-us-west-1a.masters.kops.domain.com-20191212131907"
I1212 13:19:07.758170 402540 aws_cloud.go:1172] Calling DescribeImages to resolve name "kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26"
I1212 13:19:07.758380 402540 request_logger.go:45] AWS request: ec2/DescribeImages
I1212 13:19:07.769206 402540 securitygrouprule.go:278] ssh-external-to-node-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=22 toPort=22 cidr=0.0.0.0/0)
I1212 13:19:07.769544 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.772700 402540 securitygrouprule.go:278] all-master-to-master: Calling EC2 AuthorizeSecurityGroupIngress (sourceGroup=sg-0bcdeb6125f89caf9)
I1212 13:19:07.773129 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.784247 402540 routetableassociation.go:149] Checking for existing RouteTableAssociation to subnet
I1212 13:19:07.784626 402540 request_logger.go:45] AWS request: ec2/DescribeRouteTables
I1212 13:19:07.794697 402540 launchconfiguration.go:269] Creating AutoscalingLaunchConfiguration with Name:"nodes.kops.domain.com-20191212131907"
I1212 13:19:07.794735 402540 aws_cloud.go:1172] Calling DescribeImages to resolve name "kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26"
I1212 13:19:07.794897 402540 request_logger.go:45] AWS request: ec2/DescribeImages
I1212 13:19:07.799553 402540 securitygrouprule.go:278] ssh-external-to-master-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=22 toPort=22 cidr=0.0.0.0/0)
I1212 13:19:07.799938 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.803357 402540 securitygrouprule.go:278] node-to-master-tcp-4003-65535: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=4003 toPort=65535 sourceGroup=sg-09a4e42acee69cf69)
I1212 13:19:07.803646 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.919259 402540 securitygrouprule.go:278] https-external-to-master-0.0.0.0/0: Calling EC2 AuthorizeSecurityGroupIngress (protocol=tcp fromPort=443 toPort=443 cidr=0.0.0.0/0)
I1212 13:19:07.919538 402540 request_logger.go:45] AWS request: ec2/AuthorizeSecurityGroupIngress
I1212 13:19:07.957367 402540 aws_cloud.go:1224] Resolved image "ami-035e8621e8ff3b220"
I1212 13:19:07.957435 402540 aws_cloud.go:1172] Calling DescribeImages to resolve name "kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26"
I1212 13:19:07.957701 402540 request_logger.go:45] AWS request: ec2/DescribeImages
I1212 13:19:07.979926 402540 routetableassociation.go:172] Creating RouteTableAssociation
I1212 13:19:07.980147 402540 request_logger.go:45] AWS request: ec2/AssociateRouteTable
I1212 13:19:07.999273 402540 aws_cloud.go:1224] Resolved image "ami-035e8621e8ff3b220"
I1212 13:19:07.999308 402540 aws_cloud.go:1172] Calling DescribeImages to resolve name "kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26"
I1212 13:19:07.999463 402540 request_logger.go:45] AWS request: ec2/DescribeImages
I1212 13:19:08.165532 402540 aws_cloud.go:1224] Resolved image "ami-035e8621e8ff3b220"
I1212 13:19:08.172279 402540 tagbuilder.go:95] tags: [_aws _k8s_1_6]
I1212 13:19:08.172342 402540 urls.go:168] Using cached protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz"
I1212 13:19:08.173971 402540 launchconfiguration.go:351] AWS CreateLaunchConfiguration master-us-west-1a.masters.kops.domain.com-20191212131907
I1212 13:19:08.176267 402540 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration
I1212 13:19:08.210844 402540 aws_cloud.go:1224] Resolved image "ami-035e8621e8ff3b220"
I1212 13:19:08.213634 402540 tagbuilder.go:95] tags: [_aws _k8s_1_6]
I1212 13:19:08.213719 402540 urls.go:168] Using cached protokube location: "https://kubeupv2.s3.amazonaws.com/kops/1.15.0/images/protokube.tar.gz"
I1212 13:19:08.215166 402540 launchconfiguration.go:351] AWS CreateLaunchConfiguration nodes.kops.domain.com-20191212131907
I1212 13:19:08.216391 402540 request_logger.go:45] AWS request: autoscaling/CreateLaunchConfiguration
I1212 13:19:08.632871 402540 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1212 13:19:08.693846 402540 request_logger.go:45] AWS request: autoscaling/DescribeLaunchConfigurations
I1212 13:19:08.879941 402540 executor.go:103] Tasks: 84 done / 86 total; 2 can run
I1212 13:19:08.880018 402540 executor.go:178] Executing task "AutoscalingGroup/nodes.kops.domain.com": *awstasks.AutoscalingGroup {"Name":"nodes.kops.domain.com","Lifecycle":"Sync","Granularity":"1Minute","InstanceProtection":null,"LaunchConfiguration":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6M4L7A7DKZ","Shared":false},"ID":"nodes.kops.domain.com-20191212131907","ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"t2.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":128,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"nodes.kops.domain.com","Lifecycle":"Sync","ID":"sg-09a4e42acee69cf69","Description":"Security group for nodes","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"nodes.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}},"LaunchTemplate":null,"MaxSize":2,"Metrics":["GroupDesiredCapacity","GroupInServiceInstances","GroupMaxSize","GroupMinSize","GroupPendingInstances","GroupStandbyInstances","GroupTerminatingInstances","GroupTotalInstances"],"MinSize":2,"MixedInstanceOverrides":null,"MixedOnDemandAllocationStrategy":null,"MixedOnDemandBase":null,"MixedOnDemandAboveBase":null,"MixedSpotAllocationStrategy":null,"MixedSpotInstancePools":null,"MixedSpotMaxPrice":null,"Subnets":[{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":"subnet-0983b865b14b444b8","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}],"SuspendProcesses":[],"Tags":{"k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup":"nodes","k8s.io/role/node":"1","kops.k8s.io/instancegroup":"nodes"}}
I1212 13:19:08.880552 402540 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups
I1212 13:19:08.880768 402540 executor.go:178] Executing task "AutoscalingGroup/master-us-west-1a.masters.kops.domain.com": *awstasks.AutoscalingGroup {"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","Granularity":"1Minute","InstanceProtection":null,"LaunchConfiguration":{"Name":"master-us-west-1a.masters.kops.domain.com","Lifecycle":"Sync","AssociatePublicIP":true,"BlockDeviceMappings":null,"IAMInstanceProfile":{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"AIPASIGZOYE6MELARRFSZ","Shared":false},"ID":"master-us-west-1a.masters.kops.domain.com-20191212131907","ImageID":"kope.io/k8s-1.15-debian-stretch-amd64-hvm-ebs-2019-09-26","InstanceMonitoring":null,"InstanceType":"m3.medium","RootVolumeIops":null,"RootVolumeOptimization":null,"RootVolumeSize":64,"RootVolumeType":"gp2","SSHKey":{"Name":"kubernetes.kops.domain.com-4a:b2:1d:c3:59:bf:d9:a9:ba:93:72:03:05:e9:f4:c2","Lifecycle":"Sync","PublicKey":{"Name":"","Resource":"ssh-rsa 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 user@work.domain.com\n"},"KeyFingerprint":"7a:af:26:50:e2:e2:39:38:e2:f6:08:07:4f:b3:86:45"},"SecurityGroups":[{"Name":"masters.kops.domain.com","Lifecycle":"Sync","ID":"sg-0bcdeb6125f89caf9","Description":"Security group for masters","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"RemoveExtraRules":["port=22","port=443","port=2380","port=2381","port=4001","port=4002","port=4789","port=179"],"Shared":null,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"masters.kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}}],"SpotPrice":"","Tenancy":null,"UserData":{"Name":"","Resource":{}}},"LaunchTemplate":null,"MaxSize":1,"Metrics":["GroupDesiredCapacity","GroupInServiceInstances","GroupMaxSize","GroupMinSize","GroupPendingInstances","GroupStandbyInstances","GroupTerminatingInstances","GroupTotalInstances"],"MinSize":1,"MixedInstanceOverrides":null,"MixedOnDemandAllocationStrategy":null,"MixedOnDemandBase":null,"MixedOnDemandAboveBase":null,"MixedSpotAllocationStrategy":null,"MixedSpotInstancePools":null,"MixedSpotMaxPrice":null,"Subnets":[{"Name":"us-west-1a.kops.domain.com","ShortName":"us-west-1a","Lifecycle":"Sync","ID":"subnet-0983b865b14b444b8","VPC":{"Name":"kops.domain.com","Lifecycle":"Sync","ID":"vpc-00d891ddc03f86a0d","CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"kops.domain.com","kubernetes.io/cluster/kops.domain.com":"owned"}},"AvailabilityZone":"us-west-1a","CIDR":"172.20.32.0/19","Shared":false,"Tags":{"KubernetesCluster":"kops.domain.com","Name":"us-west-1a.kops.domain.com","SubnetType":"Public","kubernetes.io/cluster/kops.domain.com":"owned","kubernetes.io/role/elb":"1"}}],"SuspendProcesses":[],"Tags":{"k8s.io/cluster-autoscaler/node-template/label/kops.k8s.io/instancegroup":"master-us-west-1a","k8s.io/role/master":"1","kops.k8s.io/instancegroup":"master-us-west-1a"}}
I1212 13:19:08.880986 402540 request_logger.go:45] AWS request: autoscaling/DescribeAutoScalingGroups
I1212 13:19:09.086988 402540 autoscalinggroup.go:254] Creating autoscaling group with name: master-us-west-1a.masters.kops.domain.com
I1212 13:19:09.087606 402540 request_logger.go:45] AWS request: autoscaling/CreateAutoScalingGroup
I1212 13:19:09.100002 402540 autoscalinggroup.go:254] Creating autoscaling group with name: nodes.kops.domain.com
I1212 13:19:09.100589 402540 request_logger.go:45] AWS request: autoscaling/CreateAutoScalingGroup
I1212 13:19:09.548873 402540 request_logger.go:45] AWS request: autoscaling/EnableMetricsCollection
I1212 13:19:09.549238 402540 request_logger.go:45] AWS request: autoscaling/EnableMetricsCollection
I1212 13:19:09.841707 402540 executor.go:103] Tasks: 86 done / 86 total; 0 can run
I1212 13:19:09.841750 402540 dns.go:155] Pre-creating DNS records
I1212 13:19:09.841919 402540 route53.go:53] AWS request: route53 ListHostedZones
I1212 13:19:10.201553 402540 route53.go:53] AWS request: route53 ListResourceRecordSets
I1212 13:19:10.302300 402540 dns.go:231] Pre-creating DNS record api.kops.domain.com. => 203.0.113.123
I1212 13:19:10.302372 402540 dns.go:231] Pre-creating DNS record api.internal.kops.domain.com. => 203.0.113.123
I1212 13:19:10.302402 402540 rrchangeset.go:142] Route53 MaxBatchSize: 900
I1212 13:19:10.302416 402540 rrchangeset.go:143] Route53 Changeset:
CREATE A api.kops.domain.com.
CREATE A api.internal.kops.domain.com.
I1212 13:19:10.302886 402540 route53.go:53] AWS request: route53 ChangeResourceRecordSets
I1212 13:19:10.432980 402540 dns.go:247] Pre-created DNS names: [api.kops.domain.com. api.internal.kops.domain.com.]
I1212 13:19:10.433024 402540 context.go:91] deleting temp dir: "/tmp/deploy658868570"
I1212 13:19:10.433148 402540 kubectl.go:131] Running command: kubectl config view --output json
I1212 13:19:10.683295 402540 kubectl.go:83] config = "{\n \"kind\": \"Config\",\n \"apiVersion\": \"v1\",\n \"preferences\": {},\n \"clusters\": null,\n \"users\": null,\n \"contexts\": null,\n \"current-context\": \"\"\n}"
I1212 13:19:10.683696 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml"
I1212 13:19:10.772362 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:10.772491 402540 update_cluster.go:294] Exporting kubecfg for cluster
I1212 13:19:10.772540 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:19:10.859437 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:10.859876 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/ca/keyset.yaml"
I1212 13:19:10.948323 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:10.948648 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/ca/keyset.yaml"
I1212 13:19:11.039487 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:11.039677 402540 privatekey.go:176] Parsing pem block: "RSA PRIVATE KEY"
I1212 13:19:11.039826 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/issued/kubecfg/keyset.yaml"
I1212 13:19:11.130210 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:11.130382 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/pki/private/kubecfg/keyset.yaml"
I1212 13:19:11.220976 402540 certificate.go:103] Parsing pem block: "CERTIFICATE"
I1212 13:19:11.221401 402540 privatekey.go:176] Parsing pem block: "RSA PRIVATE KEY"
I1212 13:19:11.221785 402540 s3fs.go:220] Reading file "s3://kops-domain-com-state-store/kops.domain.com/secrets/kube"
I1212 13:19:11.314830 402540 loader.go:359] Config loaded from file: /home/user/.kube/config
I1212 13:19:11.315241 402540 loader.go:359] Config loaded from file: /home/user/.kube/config
I1212 13:19:11.315434 402540 loader.go:359] Config loaded from file: /home/user/.kube/config
I1212 13:19:11.315614 402540 loader.go:359] Config loaded from file: /home/user/.kube/config
I1212 13:19:11.316811 402540 loader.go:359] Config loaded from file: /home/user/.kube/config
I1212 13:19:11.318116 402540 loader.go:359] Config loaded from file: /home/user/.kube/config
I1212 13:19:11.319869 402540 loader.go:359] Config loaded from file: /home/user/.kube/config
I1212 13:19:11.322043 402540 loader.go:359] Config loaded from file: /home/user/.kube/config
kops has set your kubectl context to kops.domain.com
Cluster is starting. It should be ready in a few minutes.
Suggestions:
* validate cluster: kops validate cluster
* list nodes: kubectl get nodes --show-labels
* ssh to the master: ssh -i ~/.ssh/id_rsa admin@api.kops.domain.com
* the admin user is specific to Debian. If not using Debian please use the appropriate user based on your OS.
* read about installing addons at: https://github.com/kubernetes/kops/blob/master/docs/addons.md.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment