Skip to content

Instantly share code, notes, and snippets.

@rezamt

rezamt/acre.yaml Secret

Created March 15, 2020 11:40
Show Gist options
  • Save rezamt/ae239d8d6a02566159ac57167d15ac97 to your computer and use it in GitHub Desktop.
Save rezamt/ae239d8d6a02566159ac57167d15ac97 to your computer and use it in GitHub Desktop.
Gardner setup log
landscape:
name: gardner-jupitercloud-dev # general Gardener landscape identifier, for example, `my-gardener`
domain: gardner.jupitercloud.dev # unique basis domain for DNS entries
cluster: # information about your base cluster
kubeconfig: ./kubeconfig
networks: # CIDR IP ranges of base cluster
pods: 10.20.0.0/14
nodes: 10.132.0.0/20
services: 10.85.0.0/20
iaas:
- name: gcp
type: gcp
region: europe-west1
zones: # remove zones block for Azure
- europe-west1-b
credentials:
serviceaccount.json: |
{
REMOVED FOR SECURITY
}
etcd: # optional, default values based on `landscape.iaas`
backup:
type: gcs
resourceGroup: # Azure resource group you would like to use for your backup
region: europe-west1
credentials:
serviceaccount.json: |
{
REMOVED FOR SECURITY
}
dns: # optional, default values based on `landscape.iaas`
type: google-clouddns
credentials:
serviceaccount.json: |
{
REMOVED FOR SECURITY
}
identity:
users:
- email: rezamt@gmail.com # email (used for Gardener dashboard login)
username: rezamt@gmail.com # username (displayed in Gardener dashboard)
password: password # clear-text password (used for Gardener dashboard login)
~/projects/landscape ❯ sow order -A ⎈ gardner-cluster 21:43:00
namespace
dns-controller
ingress-controller
cert-manager/controller
cert-manager/solver
cert-manager/cert
identity
etcd/backupinfra
etcd/cluster
kube-apiserver
gardener/virtual
gardener/runtime
gardener/extensions
gardencontent/profiles
gardencontent/coreproject
gardencontent/seeds/soils
dashboard
~/projects/landscape ❯ sow deploy -A 7s ⎈ gardner-cluster 21:53:11
*****************************
*** sowing species namespace
no plugins found for action prepare
executing configured plugins for action deploy
using config from path kubectl
Plugin: kubectl[deploy] (/sow/plugins/kubectl/plugin)
manifest for Namespace(v1): garden
namespace/garden created
cluster https://35.190.221.204
found deployed objects: 1
found currect objects: 1
generating exports
*** species namespace deployed
*****************************
*** sowing species dns-controller
executing configured plugins for action prepare
using config from path git
Plugin: git[prepare] (/sow/plugins/git/plugin)
Cloning repo https://github.com/gardener/external-dns-management.git (tag v0.7.6)...
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/dns-controller/git/repo/.git/
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/dns-controller/git/repo/.git/
remote: Enumerating objects: 4693, done.
remote: Counting objects: 100% (4693/4693), done.
remote: Compressing objects: 100% (3597/3597), done.
remote: Total 4693 (delta 1148), reused 3342 (delta 774), pack-reused 0
Receiving objects: 100% (4693/4693), 7.65 MiB | 408.00 KiB/s, done.
Resolving deltas: 100% (1148/1148), done.
From https://github.com/gardener/external-dns-management
* tag v0.7.6 -> FETCH_HEAD
executing configured plugins for action deploy
Plugin: pinned[deploy] (builtin)
using config from path helm
Plugin: helm[deploy] (/sow/plugins/helm/plugin)
using /mounted/Users/reza/projects/landscape/./kubeconfig
Running helm template for garden-setup-dns-controller-manager ...
using config from path kubectl_apply
Plugin: kubectl[deploy]{kubectl_apply} (/sow/plugins/kubectl/plugin)
manifest for ServiceAccount(v1): kube-system/garden-setup-dns-controller-manager
serviceaccount/garden-setup-dns-controller-manager created
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): dnsowners.dns.gardener.cloud
customresourcedefinition.apiextensions.k8s.io/dnsowners.dns.gardener.cloud created
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): dnsproviders.dns.gardener.cloud
customresourcedefinition.apiextensions.k8s.io/dnsproviders.dns.gardener.cloud created
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): dnsentries.dns.gardener.cloud
customresourcedefinition.apiextensions.k8s.io/dnsentries.dns.gardener.cloud created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): garden-setup-dns-controller-manager
clusterrole.rbac.authorization.k8s.io/garden-setup-dns-controller-manager created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): garden-setup-dns-controller-manager
clusterrolebinding.rbac.authorization.k8s.io/garden-setup-dns-controller-manager created
manifest for Role(rbac.authorization.k8s.io/v1beta1): kube-system/garden-setup-dns-controller-manager
role.rbac.authorization.k8s.io/garden-setup-dns-controller-manager created
manifest for RoleBinding(rbac.authorization.k8s.io/v1beta1): kube-system/garden-setup-dns-controller-manager
rolebinding.rbac.authorization.k8s.io/garden-setup-dns-controller-manager created
manifest for Deployment(apps/v1): kube-system/garden-setup-dns-controller-manager
deployment.apps/garden-setup-dns-controller-manager created
cluster https://35.190.221.204
found deployed objects: 9
found currect objects: 9
using config from path kubectl
Plugin: kubectl[deploy] (/sow/plugins/kubectl/plugin)
manifest for Secret(v1): kube-system/garden-setup-dns-controller-manager-google
secret/garden-setup-dns-controller-manager-google created
manifest for DNSProvider(dns.gardener.cloud/v1alpha1): kube-system/google
dnsprovider.dns.gardener.cloud/google created
cluster https://35.190.221.204
found deployed objects: 2
found currect objects: 2
generating exports
*** species dns-controller deployed
*****************************
*** sowing species ingress-controller
no plugins found for action prepare
executing configured plugins for action deploy
Plugin: pinned[deploy] (builtin)
using config from path ingresscontroller
Plugin: helm[deploy]{ingresscontroller} (/sow/plugins/helm/plugin)
using /mounted/Users/reza/projects/landscape/./kubeconfig
Running helm template for nginx-ingress-controller ...
using config from path ingresscontroller
Plugin: kubectl[deploy]{ingresscontroller} (/sow/plugins/kubectl/plugin)
manifest for PodDisruptionBudget(policy/v1beta1): kube-system/nginx-ingress-controller
poddisruptionbudget.policy/nginx-ingress-controller created
manifest for ConfigMap(v1): kube-system/nginx-ingress-controller
configmap/nginx-ingress-controller created
manifest for ServiceAccount(v1): kube-system/nginx-ingress
serviceaccount/nginx-ingress created
manifest for ClusterRole(rbac.authorization.k8s.io/v1): nginx-ingress
clusterrole.rbac.authorization.k8s.io/nginx-ingress created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1): nginx-ingress
clusterrolebinding.rbac.authorization.k8s.io/nginx-ingress created
manifest for Role(rbac.authorization.k8s.io/v1): kube-system/nginx-ingress
role.rbac.authorization.k8s.io/nginx-ingress created
manifest for RoleBinding(rbac.authorization.k8s.io/v1): kube-system/nginx-ingress
rolebinding.rbac.authorization.k8s.io/nginx-ingress created
manifest for Service(v1): kube-system/nginx-ingress-controller
service/nginx-ingress-controller created
manifest for Service(v1): kube-system/nginx-ingress-k8s-backend
service/nginx-ingress-k8s-backend created
manifest for Deployment(apps/v1): kube-system/nginx-ingress-controller
deployment.apps/nginx-ingress-controller created
manifest for Deployment(apps/v1): kube-system/nginx-ingress-k8s-backend
deployment.apps/nginx-ingress-k8s-backend created
cluster https://35.190.221.204
found deployed objects: 11
found currect objects: 11
generating exports
*** species ingress-controller deployed
*****************************
*** sowing species cert-manager/controller
executing configured plugins for action prepare
using config from path git
Plugin: git[prepare] (/sow/plugins/git/plugin)
Cloning repo https://github.com/jetstack/cert-manager.git (tag v0.9.1)...
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/cert-manager/controller/git/repo/.git/
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/cert-manager/controller/git/repo/.git/
remote: Enumerating objects: 6742, done.
remote: Counting objects: 100% (6742/6742), done.
remote: Compressing objects: 100% (5170/5170), done.
remote: Total 6742 (delta 2390), reused 3733 (delta 1391), pack-reused 0
Receiving objects: 100% (6742/6742), 9.56 MiB | 1.38 MiB/s, done.
Resolving deltas: 100% (2390/2390), done.
From https://github.com/jetstack/cert-manager
* tag v0.9.1 -> FETCH_HEAD
using config from path chart-checkout
Plugin: chart-checkout[prepare] (/mounted/Users/reza/projects/landscape/crop/plugins/chart-checkout/plugin)
Downloading chart https://charts.jetstack.io/charts/cert-manager-v0.9.1.tgz
executing configured plugins for action deploy
using config from path namespace
Plugin: kubectl[deploy]{namespace} (/sow/plugins/kubectl/plugin)
manifest for Namespace(v1): cert-manager
namespace/cert-manager created
cluster https://35.190.221.204
found deployed objects: 1
found currect objects: 1
using config from path crds
Plugin: kubectl[deploy]{crds} (/sow/plugins/kubectl/plugin)
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): certificates.certmanager.k8s.io
customresourcedefinition.apiextensions.k8s.io/certificates.certmanager.k8s.io created
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): certificaterequests.certmanager.k8s.io
customresourcedefinition.apiextensions.k8s.io/certificaterequests.certmanager.k8s.io created
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): challenges.certmanager.k8s.io
customresourcedefinition.apiextensions.k8s.io/challenges.certmanager.k8s.io created
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): clusterissuers.certmanager.k8s.io
customresourcedefinition.apiextensions.k8s.io/clusterissuers.certmanager.k8s.io created
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): issuers.certmanager.k8s.io
customresourcedefinition.apiextensions.k8s.io/issuers.certmanager.k8s.io created
manifest for CustomResourceDefinition(apiextensions.k8s.io/v1beta1): orders.certmanager.k8s.io
customresourcedefinition.apiextensions.k8s.io/orders.certmanager.k8s.io created
cluster https://35.190.221.204
found deployed objects: 6
found currect objects: 6
Plugin: pinned[deploy] (builtin)
using config from path helm
Plugin: helm[deploy] (/sow/plugins/helm/plugin)
using /mounted/Users/reza/projects/landscape/./kubeconfig
Running helm template for cert-manager ...
using config from path helm
Plugin: kubectl[deploy]{helm} (/sow/plugins/kubectl/plugin)
manifest for ServiceAccount(v1): cert-manager/cert-manager-cainjector
serviceaccount/cert-manager-cainjector created
manifest for ServiceAccount(v1): cert-manager/cert-manager-webhook
serviceaccount/cert-manager-webhook created
manifest for ServiceAccount(v1): cert-manager/cert-manager
serviceaccount/cert-manager created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-cainjector
clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created
manifest for ClusterRole(rbac.authorization.k8s.io/v1): cert-manager-webhook:webhook-requester
clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:webhook-requester created
manifest for ClusterRole(rbac.authorization.k8s.io/v1): cert-manager-view
clusterrole.rbac.authorization.k8s.io/cert-manager-view created
manifest for ClusterRole(rbac.authorization.k8s.io/v1): cert-manager-edit
clusterrole.rbac.authorization.k8s.io/cert-manager-edit created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-challenges
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-orders
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-clusterissuers
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-leaderelection
clusterrole.rbac.authorization.k8s.io/cert-manager-leaderelection created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-issuers
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-ingress-shim
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
manifest for ClusterRole(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-certificates
clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-cainjector
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-webhook:auth-delegator
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:auth-delegator created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-certificates
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-ingress-shim
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-clusterissuers
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-issuers
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-leaderelection
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-leaderelection created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-challenges
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1beta1): cert-manager-controller-orders
clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created
manifest for RoleBinding(rbac.authorization.k8s.io/v1beta1): kube-system/cert-manager-webhook:webhook-authentication-reader
rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:webhook-authentication-reader created
manifest for Service(v1): cert-manager/cert-manager-webhook
service/cert-manager-webhook created
manifest for Deployment(apps/v1): cert-manager/cert-manager-cainjector
deployment.apps/cert-manager-cainjector created
manifest for Deployment(apps/v1): cert-manager/cert-manager-webhook
deployment.apps/cert-manager-webhook created
manifest for Deployment(apps/v1): cert-manager/cert-manager
deployment.apps/cert-manager created
manifest for APIService(apiregistration.k8s.io/v1beta1): v1beta1.admission.certmanager.k8s.io
apiservice.apiregistration.k8s.io/v1beta1.admission.certmanager.k8s.io created
manifest for Certificate(certmanager.k8s.io/v1alpha1): cert-manager/cert-manager-webhook-ca
certificate.certmanager.k8s.io/cert-manager-webhook-ca created
manifest for Certificate(certmanager.k8s.io/v1alpha1): cert-manager/cert-manager-webhook-webhook-tls
certificate.certmanager.k8s.io/cert-manager-webhook-webhook-tls created
manifest for Issuer(certmanager.k8s.io/v1alpha1): cert-manager/cert-manager-webhook-selfsign
issuer.certmanager.k8s.io/cert-manager-webhook-selfsign created
manifest for Issuer(certmanager.k8s.io/v1alpha1): cert-manager/cert-manager-webhook-ca
issuer.certmanager.k8s.io/cert-manager-webhook-ca created
manifest for ValidatingWebhookConfiguration(admissionregistration.k8s.io/v1beta1): cert-manager-webhook
validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created
cluster https://35.190.221.204
found deployed objects: 34
found currect objects: 34
Using self-signed CA
using config from path issuer
Plugin: kubectl[deploy]{issuer} (/sow/plugins/kubectl/plugin)
manifest for Secret(v1): cert-manager/self-signed-ca
secret/self-signed-ca created
manifest for ClusterIssuer(certmanager.k8s.io/v1alpha1): ca-issuer
Error from server (InternalError): error when creating "/mounted/Users/reza/projects/landscape/gen/cert-manager/controller/issuer/manifests/0-1-ClusterIssuer.ca-issuer.yaml": Internal error occurred: failed calling webhook "clusterissuers.admission.certmanager.k8s.io": the server is currently unable to handle the request
command failed, waiting for 15 seconds and trying again (4 times)
clusterissuer.certmanager.k8s.io/ca-issuer created
cluster https://35.190.221.204
found deployed objects: 2
found currect objects: 2
generating exports
*** species cert-manager/controller deployed
*****************************
*** sowing species cert-manager/solver
executing configured plugins for action prepare
using config from path git
Plugin: git[prepare] (/sow/plugins/git/plugin)
Cloning repo https://github.com/gardener/certificate-dns-bridge.git (tag 1.0.1)...
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/cert-manager/solver/git/repo/.git/
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/cert-manager/solver/git/repo/.git/
remote: Enumerating objects: 29, done.
remote: Counting objects: 100% (29/29), done.
remote: Compressing objects: 100% (26/26), done.
remote: Total 29 (delta 6), reused 16 (delta 1), pack-reused 0
Unpacking objects: 100% (29/29), done.
From https://github.com/gardener/certificate-dns-bridge
* tag 1.0.1 -> FETCH_HEAD
executing configured plugins for action deploy
Using self-signed certificates, no solver deployment necessary.
generating exports
*** species cert-manager/solver deployed
*****************************
*** sowing species cert-manager/cert
no plugins found for action prepare
executing configured plugins for action deploy
using config from path cert
Plugin: kubectl[deploy]{cert} (/sow/plugins/kubectl/plugin)
manifest for Certificate(certmanager.k8s.io/v1alpha1): garden/dashboard-identity-ingress
certificate.certmanager.k8s.io/dashboard-identity-ingress created
cluster https://35.190.221.204
found deployed objects: 1
found currect objects: 1
The export generation waits for the certificate, which may take some time.
generating exports
*** species cert-manager/cert deployed
*****************************
*** sowing species identity
executing configured plugins for action prepare
using config from path git
Plugin: git[prepare] (/sow/plugins/git/plugin)
Cloning repo https://github.com/gardener/dashboard.git (tag 1.39.0)...
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/identity/git/repo/.git/
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/identity/git/repo/.git/
remote: Enumerating objects: 438, done.
remote: Counting objects: 100% (438/438), done.
remote: Compressing objects: 100% (404/404), done.
remote: Total 438 (delta 110), reused 149 (delta 17), pack-reused 0
Receiving objects: 100% (438/438), 2.29 MiB | 1.21 MiB/s, done.
Resolving deltas: 100% (110/110), done.
From https://github.com/gardener/dashboard
* tag 1.39.0 -> FETCH_HEAD
executing configured plugins for action deploy
Plugin: pinned[deploy] (builtin)
using config from path identity
Plugin: helm[deploy]{identity} (/sow/plugins/helm/plugin)
using /mounted/Users/reza/projects/landscape/./kubeconfig
Running helm template for identity ...
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/identity/git/repo/charts/identity/templates/_versions.tpl resolves to /mounted/Users/reza/projects/landscape/gen/identity/git/repo/charts/_versions.tpl
using config from path identity
Plugin: kubectl[deploy]{identity} (/sow/plugins/kubectl/plugin)
manifest for ConfigMap(v1): garden/identity-configmap
configmap/identity-configmap created
manifest for ServiceAccount(v1): garden/identity
serviceaccount/identity created
manifest for ClusterRoleBinding(rbac.authorization.k8s.io/v1): garden.sapcloud.io:identity
clusterrolebinding.rbac.authorization.k8s.io/garden.sapcloud.io:identity created
manifest for Service(v1): garden/identity-service
service/identity-service created
manifest for Deployment(apps/v1): garden/identity
deployment.apps/identity created
manifest for Ingress(extensions/v1beta1): garden/identity-ingress
ingress.extensions/identity-ingress created
cluster https://35.190.221.204
found deployed objects: 6
found currect objects: 6
generating exports
*** species identity deployed
*****************************
*** sowing species etcd/backupinfra
no plugins found for action prepare
executing configured plugins for action deploy
using config from path terraform
Plugin: terraform[deploy] (/sow/plugins/terraform/plugin)
Initializing provider plugins...
- Checking for available provider plugins on https://releases.hashicorp.com...
- Downloading plugin for provider "google" (2.20.3)...
The following providers do not have any version constraints in configuration,
so the latest version was installed.
To prevent automatic upgrades to new major versions that may contain breaking
changes, it is recommended to add version = "..." constraints to the
corresponding provider blocks in configuration, with the constraint strings
suggested below.
* provider.google: version = "~> 2.20"
Terraform has been successfully initialized!
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
google_storage_bucket.bucket: Creating...
bucket_policy_only: "" => "<computed>"
force_destroy: "" => "true"
location: "" => "EUROPE-WEST1"
name: "" => "gardner-jupitercloud-dev-etcd-bucket"
project: "" => "<computed>"
self_link: "" => "<computed>"
storage_class: "" => "COLDLINE"
url: "" => "<computed>"
google_storage_bucket.bucket: Creation complete after 3s (ID: gardner-jupitercloud-dev-etcd-bucket)
Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
Outputs:
bucketName = gardner-jupitercloud-dev-etcd-bucket
generating exports
*** species etcd/backupinfra deployed
*****************************
*** sowing species etcd/cluster
no plugins found for action prepare
executing configured plugins for action deploy
Plugin: pinned[deploy] (builtin)
using config from path etcd.main
Plugin: helm[deploy]{etcd.main} (/sow/plugins/helm/plugin)
using /mounted/Users/reza/projects/landscape/./kubeconfig
Running helm template for garden-etcd-main ...
using config from path etcd.main
Plugin: kubectl[deploy]{etcd.main} (/sow/plugins/kubectl/plugin)
manifest for Secret(v1): garden/garden-etcd-main-backup
secret/garden-etcd-main-backup created
manifest for Secret(v1): garden/garden-etcd-main-ca
secret/garden-etcd-main-ca created
manifest for Secret(v1): garden/garden-etcd-main-client
secret/garden-etcd-main-client created
manifest for Secret(v1): garden/garden-etcd-main-server
secret/garden-etcd-main-server created
manifest for ConfigMap(v1): garden/garden-etcd-main-bootstrap
configmap/garden-etcd-main-bootstrap created
manifest for Service(v1): garden/garden-etcd-main
service/garden-etcd-main created
manifest for StatefulSet(apps/v1): garden/garden-etcd-main
statefulset.apps/garden-etcd-main created
cluster https://35.190.221.204
found deployed objects: 7
found currect objects: 7
Plugin: pinned[deploy] (builtin)
using config from path etcd.events
Plugin: helm[deploy]{etcd.events} (/sow/plugins/helm/plugin)
using /mounted/Users/reza/projects/landscape/./kubeconfig
Running helm template for garden-etcd-events ...
using config from path etcd.events
Plugin: kubectl[deploy]{etcd.events} (/sow/plugins/kubectl/plugin)
manifest for Secret(v1): garden/garden-etcd-events-ca
secret/garden-etcd-events-ca created
manifest for Secret(v1): garden/garden-etcd-events-client
secret/garden-etcd-events-client created
manifest for Secret(v1): garden/garden-etcd-events-server
secret/garden-etcd-events-server created
manifest for ConfigMap(v1): garden/garden-etcd-events-bootstrap
configmap/garden-etcd-events-bootstrap created
manifest for Service(v1): garden/garden-etcd-events
service/garden-etcd-events created
manifest for StatefulSet(apps/v1): garden/garden-etcd-events
statefulset.apps/garden-etcd-events created
cluster https://35.190.221.204
found deployed objects: 6
found currect objects: 6
generating exports
*** species etcd/cluster deployed
*****************************
*** sowing species kube-apiserver
no plugins found for action prepare
executing configured plugins for action deploy
Plugin: pinned[deploy] (builtin)
using config from path kubeapiserver
Plugin: helm[deploy]{kubeapiserver} (/sow/plugins/helm/plugin)
using /mounted/Users/reza/projects/landscape/./kubeconfig
Running helm template for garden-kube-apiserver ...
using config from path kubeapiserver
Plugin: kubectl[deploy]{kubeapiserver} (/sow/plugins/kubectl/plugin)
manifest for PodDisruptionBudget(policy/v1beta1): garden/garden-kube-apiserver
poddisruptionbudget.policy/garden-kube-apiserver created
manifest for Secret(v1): garden/identity-ca
secret/identity-ca created
manifest for Secret(v1): garden/garden-kube-aggregator-ca
secret/garden-kube-aggregator-ca created
manifest for Secret(v1): garden/garden-kube-aggregator
secret/garden-kube-aggregator created
manifest for Secret(v1): garden/garden-kube-apiserver-basic-auth
secret/garden-kube-apiserver-basic-auth created
manifest for Secret(v1): garden/garden-kube-apiserver-ca
secret/garden-kube-apiserver-ca created
manifest for Secret(v1): garden/garden-kube-apiserver
secret/garden-kube-apiserver created
manifest for Secret(v1): garden/garden-kube-controller-manager
secret/garden-kube-controller-manager created
manifest for Secret(v1): garden/garden-kubeconfig-for-admin
secret/garden-kubeconfig-for-admin created
manifest for Secret(v1): garden/garden-service-account-key
secret/garden-service-account-key created
manifest for Service(v1): garden/garden-kube-apiserver
service/garden-kube-apiserver created
manifest for Deployment(apps/v1): garden/garden-kube-apiserver
deployment.apps/garden-kube-apiserver created
manifest for Ingress(extensions/v1beta1): garden/apiserver-ingress
ingress.extensions/apiserver-ingress created
cluster https://35.190.221.204
found deployed objects: 13
found currect objects: 13
generating exports
exporting file kubeconfig
exporting file kubeconfig_internal_merge_snippet
*** species kube-apiserver deployed
*****************************
*** sowing species gardener/virtual
executing configured plugins for action prepare
using config from path git
Plugin: git[prepare] (/sow/plugins/git/plugin)
Cloning repo https://github.com/gardener/gardener.git (tag v1.1.4)...
Initialized empty Git repository in /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/.git/
Reinitialized existing Git repository in /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/.git/
remote: Enumerating objects: 8642, done.
remote: Counting objects: 100% (8642/8642), done.
remote: Compressing objects: 100% (6666/6666), done.
remote: Total 8642 (delta 2363), reused 5074 (delta 1433), pack-reused 0
Receiving objects: 100% (8642/8642), 11.94 MiB | 662.00 KiB/s, done.
Resolving deltas: 100% (2363/2363), done.
From https://github.com/gardener/gardener
* tag v1.1.4 -> FETCH_HEAD
executing configured plugins for action deploy
Plugin: pinned[deploy] (builtin)
using config from path gardener
Plugin: helm[deploy]{gardener} (/sow/plugins/helm/plugin)
using /mounted/Users/reza/projects/landscape/./kubeconfig
Running helm template for gardener ...
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/charts/utils-common resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/utils-common
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/charts/utils-common/charts/utils-templates resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/utils-templates
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/charts/utils-common/values.yaml resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/values.yaml
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/charts/utils-templates resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/utils-templates
walk.go:74: found symbolic link in path: /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/charts/application/values.yaml resolves to /mounted/Users/reza/projects/landscape/gen/gardener/virtual/git/repo/charts/gardener/controlplane/values.yaml
using config from path kubectl_apply
Plugin: kubectl[deploy]{kubectl_apply} (/sow/plugins/kubectl/plugin)
manifest for Namespace(v1): garden
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF
command failed, waiting for 15 seconds and trying again (4 times)
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF
command failed, waiting for 15 seconds and trying again (3 times)
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF
command failed, waiting for 15 seconds and trying again (2 times)
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF
command failed, waiting for 15 seconds and trying again (1 times)
error: unable to recognize "/mounted/Users/reza/projects/landscape/gen/gardener/virtual/kubectl_apply/manifests/0-0-Namespace.garden.yaml": Get https://api.ing.gardner.jupitercloud.dev:443/api?timeout=32s: EOF
Error: kubectl command failed and retry limit reached
~/projects/landscape ❯ sow url 19m 20s ⎈ gardner-cluster 22:12:51
cat: can't open '/mounted/Users/reza/projects/landscape/export/dashboard/dashboard_url': No such file or directory
~/projects/landscape ❯ 7s ⎈ gardner-cluster 22:14:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment