-
-
Save rezamt/ae239d8d6a02566159ac57167d15ac97 to your computer and use it in GitHub Desktop.
Gardner setup log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
landscape: | |
name: gardner-jupitercloud-dev # general Gardener landscape identifier, for example, `my-gardener` | |
domain: gardner.jupitercloud.dev # unique basis domain for DNS entries | |
cluster: # information about your base cluster | |
kubeconfig: ./kubeconfig | |
networks: # CIDR IP ranges of base cluster | |
pods: 10.20.0.0/14 | |
nodes: 10.132.0.0/20 | |
services: 10.85.0.0/20 | |
iaas: | |
- name: gcp | |
type: gcp | |
region: europe-west1 | |
zones: # remove zones block for Azure | |
- europe-west1-b | |
credentials: | |
serviceaccount.json: | | |
{ | |
REMOVED FOR SECURITY | |
} | |
etcd: # optional, default values based on `landscape.iaas` | |
backup: | |
type: gcs | |
resourceGroup: # Azure resource group you would like to use for your backup | |
region: europe-west1 | |
credentials: | |
serviceaccount.json: | | |
{ | |
REMOVED FOR SECURITY | |
} | |
dns: # optional, default values based on `landscape.iaas` | |
type: google-clouddns | |
credentials: | |
serviceaccount.json: | | |
{ | |
REMOVED FOR SECURITY | |
} | |
identity: | |
users: | |
- email: rezamt@gmail.com # email (used for Gardener dashboard login) | |
username: rezamt@gmail.com # username (displayed in Gardener dashboard) | |
password: password # clear-text password (used for Gardener dashboard login) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
~/projects/landscape ❯ sow order -A ⎈ gardner-cluster 21:43:00 | |
namespace | |
dns-controller | |
ingress-controller | |
cert-manager/controller | |
cert-manager/solver | |
cert-manager/cert | |
identity | |
etcd/backupinfra | |
etcd/cluster | |
kube-apiserver | |
gardener/virtual | |
gardener/runtime | |
gardener/extensions | |
gardencontent/profiles | |
gardencontent/coreproject | |
gardencontent/seeds/soils | |
dashboard | |
~/projects/landscape ❯ sow deploy -A 7s ⎈ gardner-cluster 21:53:11 | |
***************************** | |
*** sowing species namespace | |
no plugins found for action prepare | |
executing configured plugins for action deploy | |
using config from path kubectl | |
Plugin: kubectl[deploy] (/sow/plugins/kubectl/plugin) | |
manifest for Namespace(v1): garden | |
namespace/garden created | |
cluster https://35.190.221.204 | |
found deployed objects: 1 | |
found currect objects: 1 | |
generating exports | |
*** species namespace deployed | |
***************************** | |
*** sowing species dns-controller | |
executing configured plugins for action prepare | |
using config from path git | |
Plugin: git[prepare] (/sow/plugins/git/plugin) | |
Cloning repo https://github.com/gardener/external-dns-management.git (tag v0.7.6)... | |
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/dns-controller/git/repo/.git/ | |
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/dns-controller/git/repo/.git/ | |
remote: Enumerating objects: 4693, done. | |
remote: Counting objects: 100% (4693/4693), done. | |
remote: Compressing objects: 100% (3597/3597), done. | |
remote: Total 4693 (delta 1148), reused 3342 (delta 774), pack-reused 0 | |
Receiving objects: 100% (4693/4693), 7.65 MiB | 408.00 KiB/s, done. | |
Resolving deltas: 100% (1148/1148), done. | |
From https://github.com/gardener/external-dns-management | |
* tag v0.7.6 -> FETCH_HEAD | |
executing configured plugins for action deploy | |
Plugin: pinned[deploy] (builtin) | |
using config from path helm | |
Plugin: helm[deploy] (/sow/plugins/helm/plugin) | |
using /mounted/Users/reza/projects/landscape/./kubeconfig | |
Running helm template for garden-setup-dns-controller-manager ... | |
using config from path kubectl_apply | |
Plugin: kubectl[deploy]{kubectl_apply} (/sow/plugins/kubectl/plugin) | |
manifest for ServiceAccount(v1): kube-system/garden-setup-dns-controller-manager | |
serviceaccount/garden-setup-dns-controller-manager created | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): dnsowners.dns.gardener.cloud | |
customresourcedefinition.apiextensions.k8s.io/dnsowners.dns.gardener.cloud created | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): dnsproviders.dns.gardener.cloud | |
customresourcedefinition.apiextensions.k8s.io/dnsproviders.dns.gardener.cloud created | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): dnsentries.dns.gardener.cloud | |
customresourcedefinition.apiextensions.k8s.io/dnsentries.dns.gardener.cloud created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): garden-setup-dns-controller-manager | |
clusterrole.rbac.authorization.k8s.io/garden-setup-dns-controller-manager created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): garden-setup-dns-controller-manager | |
clusterrolebinding.rbac.authorization.k8s.io/garden-setup-dns-controller-manager created | |
manifest for Role(rbac.authorization.k8s.io/v1beta1): kube-system/garden-setup-dns-controller-manager | |
role.rbac.authorization.k8s.io/garden-setup-dns-controller-manager created | |
manifest for RoleBinding(rbac.authorization.k8s.io/v1beta1): kube-system/garden-setup-dns-controller-manager | |
rolebinding.rbac.authorization.k8s.io/garden-setup-dns-controller-manager created | |
manifest for Deployment(apps/v1): kube-system/garden-setup-dns-controller-manager | |
deployment.apps/garden-setup-dns-controller-manager created | |
cluster https://35.190.221.204 | |
found deployed objects: 9 | |
found currect objects: 9 | |
using config from path kubectl | |
Plugin: kubectl[deploy] (/sow/plugins/kubectl/plugin) | |
manifest for Secret(v1): kube-system/garden-setup-dns-controller-manager-google | |
secret/garden-setup-dns-controller-manager-google created | |
manifest for DNSProvider(dns.gardener.cloud/v1alpha1): kube-system/google | |
dnsprovider.dns.gardener.cloud/google created | |
cluster https://35.190.221.204 | |
found deployed objects: 2 | |
found currect objects: 2 | |
generating exports | |
*** species dns-controller deployed | |
***************************** | |
*** sowing species ingress-controller | |
no plugins found for action prepare | |
executing configured plugins for action deploy | |
Plugin: pinned[deploy] (builtin) | |
using config from path ingresscontroller | |
Plugin: helm[deploy]{ingresscontroller} (/sow/plugins/helm/plugin) | |
using /mounted/Users/reza/projects/landscape/./kubeconfig | |
Running helm template for nginx-ingress-controller ... | |
using config from path ingresscontroller | |
Plugin: kubectl[deploy]{ingresscontroller} (/sow/plugins/kubectl/plugin) | |
manifest for PodDisruptionBudget(policy/v1beta1): kube-system/nginx-ingress-controller | |
poddisruptionbudget.policy/nginx-ingress-controller created | |
manifest for ConfigMap(v1): kube-system/nginx-ingress-controller | |
configmap/nginx-ingress-controller created | |
manifest for ServiceAccount(v1): kube-system/nginx-ingress | |
serviceaccount/nginx-ingress created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1): nginx-ingress | |
clusterrole.rbac.authorization.k8s.io/nginx-ingress created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1): nginx-ingress | |
clusterrolebinding.rbac.authorization.k8s.io/nginx-ingress created | |
manifest for Role(rbac.authorization.k8s.io/v1): kube-system/nginx-ingress | |
role.rbac.authorization.k8s.io/nginx-ingress created | |
manifest for RoleBinding(rbac.authorization.k8s.io/v1): kube-system/nginx-ingress | |
rolebinding.rbac.authorization.k8s.io/nginx-ingress created | |
manifest for Service(v1): kube-system/nginx-ingress-controller | |
service/nginx-ingress-controller created | |
manifest for Service(v1): kube-system/nginx-ingress-k8s-backend | |
service/nginx-ingress-k8s-backend created | |
manifest for Deployment(apps/v1): kube-system/nginx-ingress-controller | |
deployment.apps/nginx-ingress-controller created | |
manifest for Deployment(apps/v1): kube-system/nginx-ingress-k8s-backend | |
deployment.apps/nginx-ingress-k8s-backend created | |
cluster https://35.190.221.204 | |
found deployed objects: 11 | |
found currect objects: 11 | |
generating exports | |
*** species ingress-controller deployed | |
***************************** | |
*** sowing species cert-manager/controller | |
executing configured plugins for action prepare | |
using config from path git | |
Plugin: git[prepare] (/sow/plugins/git/plugin) | |
Cloning repo https://github.com/jetstack/cert-manager.git (tag v0.9.1)... | |
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/cert-manager/controller/git/repo/.git/ | |
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/cert-manager/controller/git/repo/.git/ | |
remote: Enumerating objects: 6742, done. | |
remote: Counting objects: 100% (6742/6742), done. | |
remote: Compressing objects: 100% (5170/5170), done. | |
remote: Total 6742 (delta 2390), reused 3733 (delta 1391), pack-reused 0 | |
Receiving objects: 100% (6742/6742), 9.56 MiB | 1.38 MiB/s, done. | |
Resolving deltas: 100% (2390/2390), done. | |
From https://github.com/jetstack/cert-manager | |
* tag v0.9.1 -> FETCH_HEAD | |
using config from path chart-checkout | |
Plugin: chart-checkout[prepare] (/mounted/Users/reza/projects/landscape/crop/plugins/chart-checkout/plugin) | |
Downloading chart https://charts.jetstack.io/charts/cert-manager-v0.9.1.tgz | |
executing configured plugins for action deploy | |
using config from path namespace | |
Plugin: kubectl[deploy]{namespace} (/sow/plugins/kubectl/plugin) | |
manifest for Namespace(v1): cert-manager | |
namespace/cert-manager created | |
cluster https://35.190.221.204 | |
found deployed objects: 1 | |
found currect objects: 1 | |
using config from path crds | |
Plugin: kubectl[deploy]{crds} (/sow/plugins/kubectl/plugin) | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): certificates.certmanager.k8s.io | |
customresourcedefinition.apiextensions.k8s.io/certificates.certmanager.k8s.io created | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): certificaterequests.certmanager.k8s.io | |
customresourcedefinition.apiextensions.k8s.io/certificaterequests.certmanager.k8s.io created | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): challenges.certmanager.k8s.io | |
customresourcedefinition.apiextensions.k8s.io/challenges.certmanager.k8s.io created | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): clusterissuers.certmanager.k8s.io | |
customresourcedefinition.apiextensions.k8s.io/clusterissuers.certmanager.k8s.io created | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): issuers.certmanager.k8s.io | |
customresourcedefinition.apiextensions.k8s.io/issuers.certmanager.k8s.io created | |
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): orders.certmanager.k8s.io | |
customresourcedefinition.apiextensions.k8s.io/orders.certmanager.k8s.io created | |
cluster https://35.190.221.204 | |
found deployed objects: 6 | |
found currect objects: 6 | |
Plugin: pinned[deploy] (builtin) | |
using config from path helm | |
Plugin: helm[deploy] (/sow/plugins/helm/plugin) | |
using /mounted/Users/reza/projects/landscape/./kubeconfig | |
Running helm template for cert-manager ... | |
using config from path helm | |
Plugin: kubectl[deploy]{helm} (/sow/plugins/kubectl/plugin) | |
manifest for ServiceAccount(v1): cert-manager/cert-manager-cainjector | |
serviceaccount/cert-manager-cainjector created | |
manifest for ServiceAccount(v1): cert-manager/cert-manager-webhook | |
serviceaccount/cert-manager-webhook created | |
manifest for ServiceAccount(v1): cert-manager/cert-manager | |
serviceaccount/cert-manager created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-cainjector | |
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1): cert-manager-webhook:webhook-requester | |
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1): cert-manager-view | |
clusterrole.rbac.authorization.k8s.io/cert-manager-view created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1): cert-manager-edit | |
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-challenges | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-orders | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-clusterissuers | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-leaderelection | |
clusterrole.rbac.authorization.k8s.io/cert-manager-leaderelection created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-issuers | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-ingress-shim | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created | |
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-certificates | |
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-cainjector | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-webhook:auth-delegator | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-certificates | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-ingress-shim | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-clusterissuers | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-issuers | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-leaderelection | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-leaderelection created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-challenges | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-orders | |
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created | |
manifest for RoleBinding(rbac.authorization.k8s.io/v1beta1): kube-system/cert-manager-webhook:webhook-authentication-reader | |
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader created | |
manifest for Service(v1): cert-manager/cert-manager-webhook | |
service/cert-manager-webhook created | |
manifest for Deployment(apps/v1): cert-manager/cert-manager-cainjector | |
deployment.apps/cert-manager-cainjector created | |
manifest for Deployment(apps/v1): cert-manager/cert-manager-webhook | |
deployment.apps/cert-manager-webhook created | |
manifest for Deployment(apps/v1): cert-manager/cert-manager | |
deployment.apps/cert-manager created | |
manifest for APIService(apiregistration.k8s.io/v1beta1): v1beta1.admission.certmanager.k8s.io | |
apiservice.apiregistration.k8s.io/v1beta1.admission.certmanager.k8s.io created | |
manifest for Certificate(certmanager.k8s.io/v1alpha1): cert-manager/cert-manager-webhook-ca | |
certificate.certmanager.k8s.io/cert-manager-webhook-ca created | |
manifest for Certificate(certmanager.k8s.io/v1alpha1): cert-manager/cert-manager-webhook-webhook-tls | |
certificate.certmanager.k8s.io/cert-manager-webhook-webhook-tls created | |
manifest for Issuer(certmanager.k8s.io/v1alpha1): cert-manager/cert-manager-webhook-selfsign | |
issuer.certmanager.k8s.io/cert-manager-webhook-selfsign created | |
manifest for Issuer(certmanager.k8s.io/v1alpha1): cert-manager/cert-manager-webhook-ca | |
issuer.certmanager.k8s.io/cert-manager-webhook-ca created | |
manifest for ValidatingWebhookConfiguration(admissionregistration.k8s.io/v1beta1): cert-manager-webhook | |
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created | |
cluster https://35.190.221.204 | |
found deployed objects: 34 | |
found currect objects: 34 | |
Using self-signed CA | |
using config from path issuer | |
Plugin: kubectl[deploy]{issuer} (/sow/plugins/kubectl/plugin) | |
manifest for Secret(v1): cert-manager/self-signed-ca | |
secret/self-signed-ca created | |
manifest for ClusterIssuer(certmanager.k8s.io/v1alpha1): ca-issuer | |
Error from server (InternalError): error when creating "/mounted/Users/reza/projects/landscape/gen/cert-manager/controller/issuer/manifests/0-1-ClusterIssuer.ca-issuer.yaml": Internal error occurred: failed calling webhook "clusterissuers.admission.certmanager.k8s.io": the server is currently unable to handle the request | |
command failed, waiting for 15 seconds and trying again (4 times) | |
clusterissuer.certmanager.k8s.io/ca-issuer created | |
cluster https://35.190.221.204 | |
found deployed objects: 2 | |
found currect objects: 2 | |
generating exports | |
*** species cert-manager/controller deployed | |
***************************** | |
*** sowing species cert-manager/solver | |
executing configured plugins for action prepare | |
using config from path git | |
Plugin: git[prepare] (/sow/plugins/git/plugin) | |
Cloning repo https://github.com/gardener/certificate-dns-bridge.git (tag 1.0.1)... | |
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/cert-manager/solver/git/repo/.git/ | |
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/cert-manager/solver/git/repo/.git/ | |
remote: Enumerating objects: 29, done. | |
remote: Counting objects: 100% (29/29), done. | |
remote: Compressing objects: 100% (26/26), done. | |
remote: Total 29 (delta 6), reused 16 (delta 1), pack-reused 0 | |
Unpacking objects: 100% (29/29), done. | |
From https://github.com/gardener/certificate-dns-bridge | |
* tag 1.0.1 -> FETCH_HEAD | |
executing configured plugins for action deploy | |
Using self-signed certificates, no solver deployment necessary. | |
generating exports | |
*** species cert-manager/solver deployed | |
***************************** | |
*** sowing species cert-manager/cert | |
no plugins found for action prepare | |
executing configured plugins for action deploy | |
using config from path cert | |
Plugin: kubectl[deploy]{cert} (/sow/plugins/kubectl/plugin) | |
manifest for Certificate(certmanager.k8s.io/v1alpha1): garden/dashboard-identity-ingress | |
certificate.certmanager.k8s.io/dashboard-identity-ingress created | |
cluster https://35.190.221.204 | |
found deployed objects: 1 | |
found currect objects: 1 | |
The export generation waits for the certificate, which may take some time. | |
generating exports | |
*** species cert-manager/cert deployed | |
***************************** | |
*** sowing species identity | |
executing configured plugins for action prepare | |
using config from path git | |
Plugin: git[prepare] (/sow/plugins/git/plugin) | |
Cloning repo https://github.com/gardener/dashboard.git (tag 1.39.0)... | |
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/identity/git/repo/.git/ | |
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/identity/git/repo/.git/ | |
remote: Enumerating objects: 438, done. | |
remote: Counting objects: 100% (438/438), done. | |
remote: Compressing objects: 100% (404/404), done. | |
remote: Total 438 (delta 110), reused 149 (delta 17), pack-reused 0 | |
Receiving objects: 100% (438/438), 2.29 MiB | 1.21 MiB/s, done. | |
Resolving deltas: 100% (110/110), done. | |
From https://github.com/gardener/dashboard | |
* tag 1.39.0 -> FETCH_HEAD | |
executing configured plugins for action deploy | |
Plugin: pinned[deploy] (builtin) | |
using config from path identity | |
Plugin: helm[deploy]{identity} (/sow/plugins/helm/plugin) | |
using /mounted/Users/reza/projects/landscape/./kubeconfig | |
Running helm template for identity ... | |
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/identity/git/repo/charts/identity/templates/_versions.tpl resolves to /mounted/Users/reza/projects/landscape/gen/identity/git/repo/charts/_versions.tpl | |
using config from path identity | |
Plugin: kubectl[deploy]{identity} (/sow/plugins/kubectl/plugin) | |
manifest for ConfigMap(v1): garden/identity-configmap | |
configmap/identity-configmap created | |
manifest for ServiceAccount(v1): garden/identity | |
serviceaccount/identity created | |
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1): garden.sapcloud.io:identity | |
clusterrolebinding.rbac.authorization.k8s.io/garden.sapcloud.io:identity created | |
manifest for Service(v1): garden/identity-service | |
service/identity-service created | |
manifest for Deployment(apps/v1): garden/identity | |
deployment.apps/identity created | |
manifest for Ingress(extensions/v1beta1): garden/identity-ingress | |
ingress.extensions/identity-ingress created | |
cluster https://35.190.221.204 | |
found deployed objects: 6 | |
found currect objects: 6 | |
generating exports | |
*** species identity deployed | |
***************************** | |
*** sowing species etcd/backupinfra | |
no plugins found for action prepare | |
executing configured plugins for action deploy | |
using config from path terraform | |
Plugin: terraform[deploy] (/sow/plugins/terraform/plugin) | |
Initializing provider plugins... | |
- Checking for available provider plugins on https://releases.hashicorp.com... | |
- Downloading plugin for provider "google" (2.20.3)... | |
The following providers do not have any version constraints in configuration, | |
so the latest version was installed. | |
To prevent automatic upgrades to new major versions that may contain breaking | |
changes, it is recommended to add version = "..." constraints to the | |
corresponding provider blocks in configuration, with the constraint strings | |
suggested below. | |
* provider.google: version = "~> 2.20" | |
Terraform has been successfully initialized! | |
You may now begin working with Terraform. Try running "terraform plan" to see | |
any changes that are required for your infrastructure. All Terraform commands | |
should now work. | |
If you ever set or change modules or backend configuration for Terraform, | |
rerun this command to reinitialize your working directory. If you forget, other | |
commands will detect it and remind you to do so if necessary. | |
google_storage_bucket.bucket: Creating... | |
bucket_policy_only: "" => "<computed>" | |
force_destroy: "" => "true" | |
location: "" => "EUROPE-WEST1" | |
name: "" => "gardner-jupitercloud-dev-etcd-bucket" | |
project: "" => "<computed>" | |
self_link: "" => "<computed>" | |
storage_class: "" => "COLDLINE" | |
url: "" => "<computed>" | |
google_storage_bucket.bucket: Creation complete after 3s (ID: gardner-jupitercloud-dev-etcd-bucket) | |
Apply complete! Resources: 1 added, 0 changed, 0 destroyed. | |
Outputs: | |
bucketName = gardner-jupitercloud-dev-etcd-bucket | |
generating exports | |
*** species etcd/backupinfra deployed | |
***************************** | |
*** sowing species etcd/cluster | |
no plugins found for action prepare | |
executing configured plugins for action deploy | |
Plugin: pinned[deploy] (builtin) | |
using config from path etcd.main | |
Plugin: helm[deploy]{etcd.main} (/sow/plugins/helm/plugin) | |
using /mounted/Users/reza/projects/landscape/./kubeconfig | |
Running helm template for garden-etcd-main ... | |
using config from path etcd.main | |
Plugin: kubectl[deploy]{etcd.main} (/sow/plugins/kubectl/plugin) | |
manifest for Secret(v1): garden/garden-etcd-main-backup | |
secret/garden-etcd-main-backup created | |
manifest for Secret(v1): garden/garden-etcd-main-ca | |
secret/garden-etcd-main-ca created | |
manifest for Secret(v1): garden/garden-etcd-main-client | |
secret/garden-etcd-main-client created | |
manifest for Secret(v1): garden/garden-etcd-main-server | |
secret/garden-etcd-main-server created | |
manifest for ConfigMap(v1): garden/garden-etcd-main-bootstrap | |
configmap/garden-etcd-main-bootstrap created | |
manifest for Service(v1): garden/garden-etcd-main | |
service/garden-etcd-main created | |
manifest for StatefulSet(apps/v1): garden/garden-etcd-main | |
statefulset.apps/garden-etcd-main created | |
cluster https://35.190.221.204 | |
found deployed objects: 7 | |
found currect objects: 7 | |
Plugin: pinned[deploy] (builtin) | |
using config from path etcd.events | |
Plugin: helm[deploy]{etcd.events} (/sow/plugins/helm/plugin) | |
using /mounted/Users/reza/projects/landscape/./kubeconfig | |
Running helm template for garden-etcd-events ... | |
using config from path etcd.events | |
Plugin: kubectl[deploy]{etcd.events} (/sow/plugins/kubectl/plugin) | |
manifest for Secret(v1): garden/garden-etcd-events-ca | |
secret/garden-etcd-events-ca created | |
manifest for Secret(v1): garden/garden-etcd-events-client | |
secret/garden-etcd-events-client created | |
manifest for Secret(v1): garden/garden-etcd-events-server | |
secret/garden-etcd-events-server created | |
manifest for ConfigMap(v1): garden/garden-etcd-events-bootstrap | |
configmap/garden-etcd-events-bootstrap created | |
manifest for Service(v1): garden/garden-etcd-events | |
service/garden-etcd-events created | |
manifest for StatefulSet(apps/v1): garden/garden-etcd-events | |
statefulset.apps/garden-etcd-events created | |
cluster https://35.190.221.204 | |
found deployed objects: 6 | |
found currect objects: 6 | |
generating exports | |
*** species etcd/cluster deployed | |
***************************** | |
*** sowing species kube-apiserver | |
no plugins found for action prepare | |
executing configured plugins for action deploy | |
Plugin: pinned[deploy] (builtin) | |
using config from path kubeapiserver | |
Plugin: helm[deploy]{kubeapiserver} (/sow/plugins/helm/plugin) | |
using /mounted/Users/reza/projects/landscape/./kubeconfig | |
Running helm template for garden-kube-apiserver ... | |
using config from path kubeapiserver | |
Plugin: kubectl[deploy]{kubeapiserver} (/sow/plugins/kubectl/plugin) | |
manifest for PodDisruptionBudget(policy/v1beta1): garden/garden-kube-apiserver | |
poddisruptionbudget.policy/garden-kube-apiserver created | |
manifest for Secret(v1): garden/identity-ca | |
secret/identity-ca created | |
manifest for Secret(v1): garden/garden-kube-aggregator-ca | |
secret/garden-kube-aggregator-ca created | |
manifest for Secret(v1): garden/garden-kube-aggregator | |
secret/garden-kube-aggregator created | |
manifest for Secret(v1): garden/garden-kube-apiserver-basic-auth | |
secret/garden-kube-apiserver-basic-auth created | |
manifest for Secret(v1): garden/garden-kube-apiserver-ca | |
secret/garden-kube-apiserver-ca created | |
manifest for Secret(v1): garden/garden-kube-apiserver | |
secret/garden-kube-apiserver created | |
manifest for Secret(v1): garden/garden-kube-controller-manager | |
secret/garden-kube-controller-manager created | |
manifest for Secret(v1): garden/garden-kubeconfig-for-admin | |
secret/garden-kubeconfig-for-admin created | |
manifest for Secret(v1): garden/garden-service-account-key | |
secret/garden-service-account-key created | |
manifest for Service(v1): garden/garden-kube-apiserver | |
service/garden-kube-apiserver created | |
manifest for Deployment(apps/v1): garden/garden-kube-apiserver | |
deployment.apps/garden-kube-apiserver created | |
manifest for Ingress(extensions/v1beta1): garden/apiserver-ingress | |
ingress.extensions/apiserver-ingress created | |
cluster https://35.190.221.204 | |
found deployed objects: 13 | |
found currect objects: 13 | |
generating exports | |
exporting file kubeconfig | |
exporting file kubeconfig_internal_merge_snippet | |
*** species kube-apiserver deployed | |
***************************** | |
*** sowing species gardener/virtual | |
executing configured plugins for action prepare | |
using config from path git | |
Plugin: git[prepare] (/sow/plugins/git/plugin) | |
Cloning repo https://github.com/gardener/gardener.git (tag v1.1.4)... | |
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/.git/ | |
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/.git/ | |
remote: Enumerating objects: 8642, done. | |
remote: Counting objects: 100% (8642/8642), done. | |
remote: Compressing objects: 100% (6666/6666), done. | |
remote: Total 8642 (delta 2363), reused 5074 (delta 1433), pack-reused 0 | |
Receiving objects: 100% (8642/8642), 11.94 MiB | 662.00 KiB/s, done. | |
Resolving deltas: 100% (2363/2363), done. | |
From https://github.com/gardener/gardener | |
* tag v1.1.4 -> FETCH_HEAD | |
executing configured plugins for action deploy | |
Plugin: pinned[deploy] (builtin) | |
using config from path gardener | |
Plugin: helm[deploy]{gardener} (/sow/plugins/helm/plugin) | |
using /mounted/Users/reza/projects/landscape/./kubeconfig | |
Running helm template for gardener ... | |
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/charts/utils-common resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/utils-common | |
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/charts/utils-common/charts/utils-templates resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/utils-templates | |
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/charts/utils-common/values.yaml resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/values.yaml | |
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/charts/utils-templates resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/utils-templates | |
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/values.yaml resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/values.yaml | |
using config from path kubectl_apply | |
Plugin: kubectl[deploy]{kubectl_apply} (/sow/plugins/kubectl/plugin) | |
manifest for Namespace(v1): garden | |
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF | |
command failed, waiting for 15 seconds and trying again (4 times) | |
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF | |
command failed, waiting for 15 seconds and trying again (3 times) | |
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF | |
command failed, waiting for 15 seconds and trying again (2 times) | |
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF | |
command failed, waiting for 15 seconds and trying again (1 times) | |
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF | |
Error: kubectl command failed and retry limit reached | |
~/projects/landscape ❯ sow url 19m 20s ⎈ gardner-cluster 22:12:51 | |
cat: can't open '/mounted/Users/reza/projects/landscape/export/dashboard/dashboard_url': No such file or directory | |
~/projects/landscape ❯ 7s ⎈ gardner-cluster 22:14:07 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment