Skip to content

Instantly share code, notes, and snippets.

@php-coder
Created April 27, 2017 14:31
Show Gist options
  • Save php-coder/0eba2c926d31777389087c462ebdc64b to your computer and use it in GitHub Desktop.
Save php-coder/0eba2c926d31777389087c462ebdc64b to your computer and use it in GitHub Desktop.
vagrant/etcd/openshift panic
I0425 11:11:58.985791 27972 start_master.go:221] Generating master configuration
I0425 11:11:58.986444 27972 create_mastercerts.go:181] Creating all certs with: admin.CreateMasterCertsOptions{CertDir:"openshift.local.config/master", Sign
erName:"openshift-signer@1493118718", ExpireDays:730, SignerExpireDays:1825, APIServerCAFiles:[]string(nil), CABundleFile:"openshift.local.config/master/ca-bu
ndle.crt", Hostnames:[]string{"10.0.2.15", "127.0.0.1", "172.17.0.1", "172.30.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes.
default.svc.cluster.local", "localhost", "openshift", "openshift.default", "openshift.default.svc", "openshift.default.svc.cluster.local"}, APIServerURL:"http
s://10.0.2.15:8443", PublicAPIServerURL:"https://localhost:8443", Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)}
I0425 11:11:58.986531 27972 create_signercert.go:99] Creating a signer cert with: admin.CreateSignerCertOptions{CertFile:"openshift.local.config/master/ca.c
rt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", ExpireDays:1825, Name:"openshift-signer@1493118
718", Output:(*util.gLogWriter)(0xc4213f731c), Overwrite:false}
I0425 11:11:58.989169 27972 create_signercert.go:111] Keeping existing CA cert at openshift.local.config/master/ca.crt and key at openshift.local.config/mas
ter/ca.key
I0425 11:11:58.989533 27972 create_signercert.go:99] Creating a signer cert with: admin.CreateSignerCertOptions{CertFile:"openshift.local.config/master/serv
ice-signer.crt", KeyFile:"openshift.local.config/master/service-signer.key", SerialFile:"", ExpireDays:1825, Name:"openshift-service-serving-signer@1493118718
", Output:(*util.gLogWriter)(0xc4213f731c), Overwrite:false}
I0425 11:11:58.990352 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions)
(0xc42142d1c0), CertFile:"openshift.local.config/master/master.etcd-client.crt", KeyFile:"openshift.local.config/master/master.etcd-client.key", ExpireDays:73
0, User:"system:master", Groups:[]string{}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.SignerCertOptions{CertFile:"openshift.local.c
onfig/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", lock:sync.Mutex{state:0, sema:
0x0}, ca:(*crypto.CA)(nil)}
I0425 11:11:58.992722 27972 create_signercert.go:111] Keeping existing CA cert at openshift.local.config/master/service-signer.crt and key at openshift.loca
l.config/master/service-signer.key
I0425 11:11:58.993660 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions)
(0xc42142d1c0), CertFile:"openshift.local.config/master/master.kubelet-client.crt", KeyFile:"openshift.local.config/master/master.kubelet-client.key", ExpireD
ays:730, User:"system:openshift-node-admin", Groups:[]string{"system:node-admins"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.Signe
rCertOptions{CertFile:"openshift.local.config/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.ser
ial.txt", lock:sync.Mutex{state:0, sema:0x0}, ca:(*crypto.CA)(0xc4214ab480)}
I0425 11:11:58.994735 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/master.etcd-client.crt and key at openshi
ft.local.config/master/master.etcd-client.key
I0425 11:11:58.995939 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/master.kubelet-client.crt and key at open
shift.local.config/master/master.kubelet-client.key
I0425 11:11:58.996803 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions)
(0xc42142d1c0), CertFile:"openshift.local.config/master/master.proxy-client.crt", KeyFile:"openshift.local.config/master/master.proxy-client.key", ExpireDays:
730, User:"system:master-proxy", Groups:[]string{}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.SignerCertOptions{CertFile:"openshift
.local.config/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", lock:sync.Mutex{state:
0, sema:0x0}, ca:(*crypto.CA)(0xc4214ab480)}
I0425 11:11:58.997413 27972 create_servercert.go:119] Creating a server cert with: admin.CreateServerCertOptions{SignerCertOptions:(*admin.SignerCertOptions
)(0xc42142d1c0), CertFile:"openshift.local.config/master/master.server.crt", KeyFile:"openshift.local.config/master/master.server.key", ExpireDays:730, Hostna
mes:[]string{"10.0.2.15", "127.0.0.1", "172.17.0.1", "172.30.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes.default.svc.clust
er.local", "localhost", "openshift", "openshift.default", "openshift.default.svc", "openshift.default.svc.cluster.local"}, Overwrite:false, Output:(*util.gLog
Writer)(0xc4213f731c)}
I0425 11:11:58.998810 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/master.proxy-client.crt and key at openshift.local.config/master/master.proxy-client.key
I0425 11:11:58.998981 27972 create_keypair.go:91] Creating a key pair with: admin.CreateKeyPairOptions{PublicKeyFile:"openshift.local.config/master/serviceaccounts.public.key", PrivateKeyFile:"openshift.local.config/master/serviceaccounts.private.key", Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)}
I0425 11:11:58.999270 27972 create_keypair.go:95] Keeping existing private key file openshift.local.config/master/serviceaccounts.private.key
I0425 11:11:58.999415 27972 crypto.go:440] Found existing server certificate in openshift.local.config/master/master.server.crt
I0425 11:11:58.999428 27972 create_servercert.go:136] Keeping existing server certificate at openshift.local.config/master/master.server.crt, key at openshift.local.config/master/master.server.key
I0425 11:11:59.000296 27972 create_servercert.go:119] Creating a server cert with: admin.CreateServerCertOptions{SignerCertOptions:(*admin.SignerCertOptions)(0xc42142d1c0), CertFile:"openshift.local.config/master/master.server.crt", KeyFile:"openshift.local.config/master/master.server.key", ExpireDays:730, Hostnames:[]string{"10.0.2.15", "127.0.0.1", "172.17.0.1", "172.30.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes.default.svc.cluster.local", "localhost", "openshift", "openshift.default", "openshift.default.svc", "openshift.default.svc.cluster.local"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)}
I0425 11:11:59.000287 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions)(0xc42142d1c0), CertFile:"openshift.local.config/master/openshift-master.crt", KeyFile:"openshift.local.config/master/openshift-master.key", ExpireDays:730, User:"system:openshift-master", Groups:[]string{"system:masters"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.SignerCertOptions{CertFile:"openshift.local.config/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", lock:sync.Mutex{state:0, sema:0x0}, ca:(*crypto.CA)(0xc4214ab480)}
I0425 11:11:59.001898 27972 crypto.go:440] Found existing server certificate in openshift.local.config/master/master.server.crt
I0425 11:11:59.001912 27972 create_servercert.go:136] Keeping existing server certificate at openshift.local.config/master/master.server.crt, key at openshift.local.config/master/master.server.key
I0425 11:11:59.002131 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/openshift-master.crt and key at openshift.local.config/master/openshift-master.key
I0425 11:11:59.002862 27972 create_servercert.go:119] Creating a server cert with: admin.CreateServerCertOptions{SignerCertOptions:(*admin.SignerCertOptions)(0xc42142d1c0), CertFile:"openshift.local.config/master/etcd.server.crt", KeyFile:"openshift.local.config/master/etcd.server.key", ExpireDays:730, Hostnames:[]string{"10.0.2.15", "127.0.0.1", "172.17.0.1", "172.30.0.1", "kubernetes", "kubernetes.default", "kubernetes.default.svc", "kubernetes.default.svc.cluster.local", "localhost", "openshift", "openshift.default", "openshift.default.svc", "openshift.default.svc.cluster.local"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)}
I0425 11:11:59.003066 27972 create_kubeconfig.go:143] creating a .kubeconfig with: admin.CreateKubeConfigOptions{APIServerURL:"https://10.0.2.15:8443", PublicAPIServerURL:"https://localhost:8443", APIServerCAFiles:[]string{"openshift.local.config/master/ca.crt"}, CertFile:"openshift.local.config/master/openshift-master.crt", KeyFile:"openshift.local.config/master/openshift-master.key", ContextNamespace:"default", KubeConfigFile:"openshift.local.config/master/openshift-master.kubeconfig", Output:(*util.gLogWriter)(0xc4213f731c)}
I0425 11:11:59.004643 27972 crypto.go:440] Found existing server certificate in openshift.local.config/master/etcd.server.crt
I0425 11:11:59.004657 27972 create_servercert.go:136] Keeping existing server certificate at openshift.local.config/master/etcd.server.crt, key at openshift.local.config/master/etcd.server.key
I0425 11:11:59.006033 27972 create_kubeconfig.go:217] Generating 'system:openshift-master/10-0-2-15:8443' API client config as openshift.local.config/master/openshift-master.kubeconfig
I0425 11:11:59.012115 27972 create_clientcert.go:57] Creating a client cert with: admin.CreateClientCertOptions{SignerCertOptions:(*admin.SignerCertOptions)(0xc42142d1c0), CertFile:"openshift.local.config/master/admin.crt", KeyFile:"openshift.local.config/master/admin.key", ExpireDays:730, User:"system:admin", Groups:[]string{"system:cluster-admins"}, Overwrite:false, Output:(*util.gLogWriter)(0xc4213f731c)} and &admin.SignerCertOptions{CertFile:"openshift.local.config/master/ca.crt", KeyFile:"openshift.local.config/master/ca.key", SerialFile:"openshift.local.config/master/ca.serial.txt", lock:sync.Mutex{state:0, sema:0x0}, ca:(*crypto.CA)(0xc4214ab480)}
I0425 11:11:59.013385 27972 create_clientcert.go:75] Keeping existing client cert at openshift.local.config/master/admin.crt and key at openshift.local.config/master/admin.key
I0425 11:11:59.013791 27972 create_kubeconfig.go:143] creating a .kubeconfig with: admin.CreateKubeConfigOptions{APIServerURL:"https://10.0.2.15:8443", PublicAPIServerURL:"https://localhost:8443", APIServerCAFiles:[]string{"openshift.local.config/master/ca.crt"}, CertFile:"openshift.local.config/master/admin.crt", KeyFile:"openshift.local.config/master/admin.key", ContextNamespace:"default", KubeConfigFile:"openshift.local.config/master/admin.kubeconfig", Output:(*util.gLogWriter)(0xc4213f731c)}
I0425 11:11:59.015829 27972 create_kubeconfig.go:217] Generating 'system:admin/10-0-2-15:8443' API client config as openshift.local.config/master/admin.kubeconfig
W0425 11:11:59.054743 27972 start_master.go:291] Warning: assetConfig.loggingPublicURL: Invalid value: "": required to view aggregated container logs in the console, master start will continue.
W0425 11:11:59.054844 27972 start_master.go:291] Warning: assetConfig.metricsPublicURL: Invalid value: "": required to view cluster metrics in the console, master start will continue.
W0425 11:11:59.054856 27972 start_master.go:291] Warning: auditConfig.auditFilePath: Required value: audit can now be logged to a separate file, master start will continue.
I0425 11:11:59.067391 27972 storage_factory.go:241] storing {authorization.openshift.io clusterpolicies} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
I0425 11:11:59.070343 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.074343 27972 storage_factory.go:241] storing {authorization.openshift.io clusterpolicybindings} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
2017-04-25 11:11:59.075106 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.076569 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.076745 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
I0425 11:11:59.076989 27972 storage_factory.go:241] storing {authorization.openshift.io policies} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
I0425 11:11:59.077244 27972 reflector.go:234] Listing and watching *api.ClusterPolicy from pkg/storage/cacher.go:201
I0425 11:11:59.079009 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
2017-04-25 11:11:59.079005 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.079077 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
I0425 11:11:59.079087 27972 reflector.go:234] Listing and watching *api.ClusterPolicyBinding from pkg/storage/cacher.go:201
2017-04-25 11:11:59.079428 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.079634 27972 storage_factory.go:241] storing {authorization.openshift.io policybindings} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
I0425 11:11:59.079745 27972 reflector.go:234] Listing and watching *api.Policy from pkg/storage/cacher.go:201
I0425 11:11:59.081393 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.081479 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
2017-04-25 11:11:59.081699 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.081844 27972 storage_factory.go:241] storing {user.openshift.io groups} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
I0425 11:11:59.082018 27972 reflector.go:234] Listing and watching *api.PolicyBinding from pkg/storage/cacher.go:201
I0425 11:11:59.084082 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.084161 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
2017-04-25 11:11:59.084411 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.084757 27972 reflector.go:234] Listing and watching *api.Group from pkg/storage/cacher.go:201
I0425 11:11:59.087882 27972 admission.go:107] Admission plugin ProjectRequestLimit is not enabled. It will not be started.
I0425 11:11:59.087911 27972 admission.go:107] Admission plugin openshift.io/RestrictSubjectBindings is not enabled. It will not be started.
I0425 11:11:59.087920 27972 admission.go:107] Admission plugin PodNodeConstraints is not enabled. It will not be started.
I0425 11:11:59.087997 27972 admission.go:107] Admission plugin RunOnceDuration is not enabled. It will not be started.
I0425 11:11:59.088006 27972 admission.go:107] Admission plugin PodNodeConstraints is not enabled. It will not be started.
I0425 11:11:59.088015 27972 admission.go:107] Admission plugin ClusterResourceOverride is not enabled. It will not be started.
I0425 11:11:59.089900 27972 admission.go:107] Admission plugin ImagePolicyWebhook is not enabled. It will not be started.
I0425 11:11:59.090217 27972 reflector.go:196] Starting reflector *api.ServiceAccount (0s) from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:103
I0425 11:11:59.090321 27972 reflector.go:196] Starting reflector *api.Secret (0s) from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:119
I0425 11:11:59.090359 27972 reflector.go:234] Listing and watching *api.ServiceAccount from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:103
I0425 11:11:59.090485 27972 reflector.go:196] Starting reflector *storage.StorageClass (0s) from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/storageclass/default/admission.go:75
I0425 11:11:59.090501 27972 admission.go:107] Admission plugin AlwaysPullImages is not enabled. It will not be started.
I0425 11:11:59.090507 27972 admission.go:107] Admission plugin LimitPodHardAntiAffinityTopology is not enabled. It will not be started.
I0425 11:11:59.092116 27972 storage_factory.go:241] storing { serviceaccounts} in v1, reading as __internal from {etcd3 kubernetes.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
E0425 11:11:59.093747 27972 reflector.go:199] github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:103: Failed to list *api.ServiceAccount: Get https://10.0.2.15:8443/api/v1/serviceaccounts?resourceVersion=0: dial tcp 10.0.2.15:8443: getsockopt: connection refused
I0425 11:11:59.093812 27972 reflector.go:234] Listing and watching *storage.StorageClass from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/storageclass/default/admission.go:75
I0425 11:11:59.094199 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.094273 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
E0425 11:11:59.094506 27972 reflector.go:199] github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/storageclass/default/admission.go:75: Failed to list *storage.StorageClass: Get https://10.0.2.15:8443/apis/storage.k8s.io/v1beta1/storageclasses?resourceVersion=0: dial tcp 10.0.2.15:8443: getsockopt: connection refused
I0425 11:11:59.094561 27972 reflector.go:234] Listing and watching *api.Secret from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:119
E0425 11:11:59.095377 27972 reflector.go:199] github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount/admission.go:119: Failed to list *api.Secret: Get https://10.0.2.15:8443/api/v1/secrets?fieldSelector=type%3Dkubernetes.io%2Fservice-account-token&resourceVersion=0: dial tcp 10.0.2.15:8443: getsockopt: connection refused
I0425 11:11:59.095437 27972 reflector.go:196] Starting reflector *api.ResourceQuota (0s) from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/resourcequota/resource_access.go:83
I0425 11:11:59.095476 27972 reflector.go:234] Listing and watching *api.ResourceQuota from github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/resourcequota/resource_access.go:83
E0425 11:11:59.095936 27972 reflector.go:199] github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/resourcequota/resource_access.go:83: Failed to list *api.ResourceQuota: Get https://10.0.2.15:8443/api/v1/resourcequotas?resourceVersion=0: dial tcp 10.0.2.15:8443: getsockopt: connection refused
2017-04-25 11:11:59.096073 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.096690 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.096766 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
2017-04-25 11:11:59.097052 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.097514 27972 storage_factory.go:241] storing {oauth.openshift.io oauthaccesstokens} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
I0425 11:11:59.099501 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.099571 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
2017-04-25 11:11:59.099996 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.100016 27972 storage_factory.go:241] storing {user.openshift.io users} in v1, reading as __internal from {etcd3 openshift.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
I0425 11:11:59.100269 27972 reflector.go:234] Listing and watching *api.OAuthAccessToken from pkg/storage/cacher.go:201
I0425 11:11:59.102111 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.102203 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
2017-04-25 11:11:59.102455 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.102762 27972 reflector.go:234] Listing and watching *api.User from pkg/storage/cacher.go:201
I0425 11:11:59.103238 27972 plugins.go:94] No cloud provider specified.
I0425 11:11:59.108335 27972 services.go:51] Setting service IP to "172.30.0.1" (read-write).
I0425 11:11:59.108533 27972 master_config.go:386] Using the lease endpoint reconciler
I0425 11:11:59.108566 27972 storage_factory.go:241] storing { apiServerIPInfo} in v1, reading as __internal from {etcd3 kubernetes.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
I0425 11:11:59.110682 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
2017-04-25 11:11:59.111216 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.111319 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
I0425 11:11:59.111359 27972 storage_factory.go:241] storing { endpoints} in v1, reading as __internal from {etcd3 kubernetes.io [https://10.0.2.15:4001] openshift.local.config/master/master.etcd-client.key openshift.local.config/master/master.etcd-client.crt openshift.local.config/master/ca.crt false 0 <nil>}
I0425 11:11:59.113573 27972 logs.go:41] warning: ignoring ServerName for user-provided CA for backwards compatibility is deprecated
I0425 11:11:59.114006 27972 compact.go:55] compactor already exists for endpoints [https://10.0.2.15:4001]
2017-04-25 11:11:59.114133 I | etcdserver/api/v3rpc: grpc: addrConn.resetTransport failed to create client transport: connection error: desc = "transport: dial tcp 10.0.2.15:4001: getsockopt: connection refused"; Reconnecting to {10.0.2.15:4001 <nil>}
I0425 11:11:59.114250 27972 start_master.go:417] Starting master on 0.0.0.0:8443 (v3.6.0-alpha.1+decce00-130-dirty)
I0425 11:11:59.114262 27972 start_master.go:418] Public master address is https://localhost:8443
I0425 11:11:59.114330 27972 start_master.go:422] Using images from "openshift/origin-<component>:v3.6.0-alpha.1"
I0425 11:11:59.114330 27972 start_master.go:422] Using images from "openshift/origin-<component>:v3.6.0-alpha.1"
2017-04-25 11:11:59.114831 I | embed: peerTLS: cert = openshift.local.config/master/etcd.server.crt, key = openshift.local.config/master/etcd.server.key, ca = openshift.local.config/master/ca.crt, trusted-ca = , client-cert-auth = true
2017-04-25 11:11:59.118207 I | embed: listening for peers on https://0.0.0.0:7001
2017-04-25 11:11:59.118402 I | embed: listening for client requests on 0.0.0.0:4001
2017-04-25 11:11:59.121915 C | mvcc/backend: cannot open database at openshift.local.etcd/member/snap/db (invalid argument)
panic: cannot open database at openshift.local.etcd/member/snap/db (invalid argument)
goroutine 262 [running]:
panic(0x3a606e0, 0xc4215f0bf0)
/opt/go1.7/src/runtime/panic.go:500 +0x1a1
github.com/openshift/origin/vendor/github.com/coreos/pkg/capnslog.(*PackageLogger).Panicf(0xc420194a00, 0x43f1a9f, 0x1f, 0xc42001ff08, 0x2, 0x2)
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/pkg/capnslog/pkg_logger.go:75 +0x16a
github.com/openshift/origin/vendor/github.com/coreos/etcd/mvcc/backend.newBackend(0xc4215990e0, 0x23, 0x5f5e100, 0x2710, 0x0)
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/etcd/mvcc/backend/backend.go:106 +0x341
github.com/openshift/origin/vendor/github.com/coreos/etcd/mvcc/backend.NewDefaultBackend(0xc4215990e0, 0x23, 0x0, 0x0)
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/etcd/mvcc/backend/backend.go:100 +0x4d
github.com/openshift/origin/vendor/github.com/coreos/etcd/etcdserver.NewServer.func1(0xc4215f0b50, 0xc4215990e0, 0x23, 0xc4215a25a0)
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/etcd/etcdserver/server.go:272 +0x39
created by github.com/openshift/origin/vendor/github.com/coreos/etcd/etcdserver.NewServer
/home/coder/git/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/github.com/coreos/etcd/etcdserver/server.go:274 +0x345
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment